Comparative analysis of lip with thumbprints: An identification tool in personal authentication
نویسندگان
چکیده
CONTEXT Identification of person living or dead using diverse characteristics is the basis in forensic science. The uniqueness of lip and fingerprints and further, association between them can be useful in establishing facts in legal issues. AIMS The present study was carried out to determine the distribution of different lip print patterns among subjects having different thumbprint patterns and to determine the correlation between lip print patterns and thumbprint patterns. MATERIALS AND METHODS The study sample comprised 100 students randomly selected from Bapuji Dental College Hospital, Davangere, Karnataka, 50 males and 50 females aged between 18 and 20 years. Red colored lipstick was applied on the lips by a lipstick applicator brush. Lip and thumb impressions were made on No. 1 Whatman filter paper and visualized using magnifying lens. Three main types of fingerprints (loop, whorl and arch) were identified; Tsuchihashi Y classification of lip print patterns was followed in the study. Chi-square test was used to see the association between lip and thumbprints. RESULTS The correlation between lip and left thumb print patterns for gender identification was statistically significant. In both males and females, Type II lip pattern associated with loop finger pattern were most significant and in males, Type III lip pattern with whorl type of finger pattern showed statistical significance. CONCLUSION We conclude that the correlation found between lip print and thumbprint can be utilized in the field of forensic science for gender identification.
منابع مشابه
Relationship of thumb prints and lip prints among Nigerians
Establishment of association between two variables in the forensic science is of paramount importance. The study was aimed to determine association of lip prints types and left thumb prints among Nigerians. A total of 820 subjects (414 male and 406 female) participated in the study. The lip prints were obtained on microscopic glass slide and developed using carbon black powder. For finger print...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملIntelligent System for Speaker Identification using Lip features with PCA and ICA
Biometric authentication techniques are more consistent and efficient than conventional authentication techniques and can be used in monitoring, transaction authentication, information retrieval, access control, forensics, etc. In this paper, we have presented a detailed comparative analysis between Principle Component Analysis (PCA) and Independent Component Analysis (ICA) which are used for f...
متن کاملLanguage Sample Analysis of Children With Cleft Lip And Palate: A Comparative Study
Background: Cleft palate (CP) with or without cleft lip (CL/P) are the most common craniofacial birth defects. Cleft lip and palate (CLP) can affect children’s communication skills. The present study aimed to evaluate the language production skills in regards to morphology and syntax (morphosyntactic) of children with CLP . Method: In current cross-sectional study, 58 Persian-language child...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کامل