Comparative analysis of lip with thumbprints: An identification tool in personal authentication

نویسندگان

  • Rashmi Naik
  • B R Ahmed Mujib
  • Neethu Telagi
  • Jaydeva Hallur
چکیده

CONTEXT Identification of person living or dead using diverse characteristics is the basis in forensic science. The uniqueness of lip and fingerprints and further, association between them can be useful in establishing facts in legal issues. AIMS The present study was carried out to determine the distribution of different lip print patterns among subjects having different thumbprint patterns and to determine the correlation between lip print patterns and thumbprint patterns. MATERIALS AND METHODS The study sample comprised 100 students randomly selected from Bapuji Dental College Hospital, Davangere, Karnataka, 50 males and 50 females aged between 18 and 20 years. Red colored lipstick was applied on the lips by a lipstick applicator brush. Lip and thumb impressions were made on No. 1 Whatman filter paper and visualized using magnifying lens. Three main types of fingerprints (loop, whorl and arch) were identified; Tsuchihashi Y classification of lip print patterns was followed in the study. Chi-square test was used to see the association between lip and thumbprints. RESULTS The correlation between lip and left thumb print patterns for gender identification was statistically significant. In both males and females, Type II lip pattern associated with loop finger pattern were most significant and in males, Type III lip pattern with whorl type of finger pattern showed statistical significance. CONCLUSION We conclude that the correlation found between lip print and thumbprint can be utilized in the field of forensic science for gender identification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relationship of thumb prints and lip prints among Nigerians

Establishment of association between two variables in the forensic science is of paramount importance. The study was aimed to determine association of lip prints types and left thumb prints among Nigerians. A total of 820 subjects (414 male and 406 female) participated in the study. The lip prints were obtained on microscopic glass slide and developed using carbon black powder. For finger print...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Intelligent System for Speaker Identification using Lip features with PCA and ICA

Biometric authentication techniques are more consistent and efficient than conventional authentication techniques and can be used in monitoring, transaction authentication, information retrieval, access control, forensics, etc. In this paper, we have presented a detailed comparative analysis between Principle Component Analysis (PCA) and Independent Component Analysis (ICA) which are used for f...

متن کامل

Language Sample Analysis of Children With Cleft Lip And Palate: A Comparative Study

Background: Cleft palate (CP) with or without cleft lip (CL/P) are the most common  craniofacial birth defects.  Cleft lip and palate (CLP) can affect children’s communication skills.  The present study aimed to evaluate the language production skills in regards to morphology and syntax (morphosyntactic) of children with CLP . Method: In current cross-sectional study, 58 Persian-language child...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2017