SlideShare a Scribd company logo
1 of 4
Download to read offline
International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 13|
Removal of Artefact from Shoe Print Image
Prof. (Dr.) Samir Kumar Bandyopadhyay1
, Ms. Nabanita Basu2
1
Professor, Department of Computer Science & Engineering, University of Calcutta
2
Research Scholar, Department of Computer Science &Engineering, University of Calcutta
I. INTRODUCTION
Locard [1] believed that no matter what a perpetrator does or where he goes ,by coming in contact
with things at or around a crimescene he can leave all sorts of evidence , including DNA, fingerprints,
footprints, hair , skin cells, blood, body fluids, pieces ofclothing fibers and more[1]. While the criminal leaves
something at the crime scene he is also expected to take something awayfrom the scene with him[1]. On a very
loose connect it might be said that when killing an individual with a hammer hit thecriminal might take away the
murder weapon with him but at the same time he might end up leaving behind bloody stains of theblood bearing
hammer at the crime scene . ‘A bloodstain resulting from contact between a blood-bearing surface and
anothersurface’ has been termed as ‘Transfer Stain’ by the International Association of Bloodstain Pattern
Analysts (IABPA)[2-4]. Thusthis work is particularly directed at studying hammer transfer stain patterns at a
crime scene.Many image processing techniques have been developed over the past two decades to help
forensicscientist in detection of footprint image boundary. Most studies conducted have proven that
measurementof parameters may help detection of crime scenario. In this paper we present initially pre-
processing offootprint image after digitization and then find out the artefacts present. Segmentation of Region of
Interest (ROI) is used. Further we useDivide and Conquer Homogeneity algorithm, followed by edge detection.
We obtain the image boundaryby using our proposed algorithm. A RGB image taken as an input, but here the
methodsdeals with grayimage, thus input RGB image converted intogray image first. Binarization is very
effective preprocessingmethodsfor most of the segmentation. Due to largevariation on background and
foreground ofshoe print imagesmaximum binarization fails but here a binarization methodhas been proposed
and a globalthreshold value has beenselected by standard deviation of the image. Globalthresholding using
standarddeviation gives very goodresults and binarize each component of the image.Shoeprint is the mark made
by the outside surface of the soleof a shoe (consist of distinctive geometric patterns) found atcrime scenes. Shoe
marks can be broadly classified into twoclasses: 1) shoe impressions which contain 3-dimensionalinformation
(e.g. shoe impression at the beach) and 2) shoeprints which contain 2-dimensional information (e.g.shoeprint on
a floor). Probability of occurrence of shoe marksat the place of crime is higher than that of fingerprints since
ahigh proportion of burglars wear gloves [1]. In severaljurisdictions of Switzerland it was revealed that 35
percent ofcrime scenes had shoeprints usable in forensic science, andfound that 30 percent of all burglaries
provide usableshoeprints [2, 3]. It is known that majority of the crimes arecommitted by repeat offenders. It is
common for burglars tocommit a number of offences on the same day. As it would beunusual for offenders to
discard their footwear betweencommitting different crimes [4]; timely identification andmatching of shoeprints
helps in linking various crime scenes.
Often it is the case when number of crimes has beencommitted; the investigating officers have an idea
of who hascommitted the crime(s). Indeed, they have suspect in custodywhose modus operandi fits the crime.
II. BRIEF REVIEW
In the IABPA Conference held in Tucson, Arizona, 2004, Peter Lamb presented the investigation
report of the late night assault of a young man who was intoxicated at the time of attack and could only recollect
part of the savagery that he had been subjected to[5]. Due to rain drop that had soaked the garment at the time of
the assault it was difficult to examine the bloodstains on the soaked garment and shoe print image on the
ABSTRACT: Shoe marks at the place of crime provide valuable forensic evidence. Many different
artefacts can occur during processing of shoe print images. This paper proposed a methodology to
remove the artefacts from shoe print images. The proposed methodology is very simple with the
combination of statistical and computational geometric approach. Statistical methods like standard
deviation are used to calculate the global threshold to binarize the image and computational geometry
like convex hull is used to produce final output. It is possible to remove artefacts if it is present either in
front side of the image or rear of the image.
Keywords: Artefact, Standard Deviation, Global Thresholding, and Convex Hull.
Removal of Artefact from Shoe Print Image
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 14|
floor[5]. However there was evidence of kicking and stomping[5]. Based on the evidence the case finally
proceeded for trial and the accused was proved guilty and hence imprisoned [5]. In his review of the Windsor
city homicide case Scott Lamont pointed out that barefoot transfer impressions and footwear transfer
impressions were found on the floor[6]. Foot morphology confirmed that the prints were left by the suspect who
was wearing boots[6]. In the words of LeeAnnSingley, in the murder case of 2 women (74 year old mother and
her 48 year old daughter) in their holiday home in a small town in Pennsylvania, while DNA evidence answered
‘who ?’ in identifying the perpetrator at the trial, the bloodstain pattern evidence proved to be valuable to the
jury in answering the ‘how?’[7]. To add to the list, in the case of Regina vs. Sion Jenkins, expirated and other
bloodstains on clothing were used as relevant evidence within the legal setting to acquit Sion Jenkins of the
murder of his 13 year old daughter Billie Jo[8]. In the case presented by Paul Treudson, at a particular crime
scene bloody transfer impressions of an apparent right hand holding a knife was found on top of a sheet that lay
at the foot of the bed [9]. The impressions included knuckles and a blade [9]. As Erin Sims puts it, for one
particular case the evidence particularly the bloodstain pattern evidence was the only honest teller of the course
of events that had led to the victim’s injury[10]. Initially, the Birkett system of coding shoeprint patterns
wasdevised by John Birkett of the metropolitan Police ForensicScience Laboratory by allocating alphanumerical
values tovarious pattern elements. This system failed uniquely toidentify a pattern because of the multitude of
new patternsfrom manufacturers in the late 1980s. The major problemwith the Birkett system was the volume of
new patterns, whichthen addressed by prefixing the coding elements with twonumerical digits for the year and a
3 digit numerical suffix in1993. Again, as per the Federal Bureau of Investigation (FBI) Chart reports each year
more people are killed by hammer, club or blunt ended object hit as compared to the number of people killed wt
rifle or shotgun[11]. In this respect it might be interesting to mention that, in a case reviewed by Stuart H. James
at the 2008 IABPA Annual Training conference, he reiterated that bodies of 4 Mexican construction workers
were found in a rented apartment at Ohio [12]. The bodies of the victims remained undiscovered for almost a
week [12]. When examined the victims were found to have suffered blunt and sharp force injuries [12-14]. The
highlight of the case review were the interesting bloodstain patterns found at the crime scene which were studied
in conjunction with the wounds suffered/sustained by the victims[12]. In their study, the authors came across
many such cases where victims suffered blunt force injuries. Given the large possibility of instruments that can
be easily obtained and hence deliver blunt force injuries to the human skull, the authors decided to particularly
focus on the possible Transfer and Saturation stain patterns formed at a crime scene as a result of assault
particularly with blunt ended objects.
III. METHODOLOGY USED
A statistical method i.e.standarddeviation is used to calculate the threshold value. In this processing
statistical descriptions separate foreground images and background images. A digitized image I[m,n] and h is
the intensity of each pixel of the gray image. Here Quickhull Algorithm for Convex Hulls is used. Quickhull
Algorithm for Convex Hulls runs faster when the input contains non-extreme points and it uses merged facets to
guarantee that the output is clearly convex.
IV. ALGORITHM (PSEUDO CODE)
Step 1. Grayscale shoe print image is taken as input.
Step 2.Threshold value of the image is calculated using the standard deviation technique described above.
Step 3. The image is binarized using the threshold value. i.e. pixels having value greater than the threshold is set
to 1 and pixels less than the threshold are set to 0.
/* [A B]=size(I);
BI =zeros(a,b);
STD = std2(I);
FORi = 1 to A DO
FOR j=1 to B DO
IF I(i,j) > STD THEN
Set BI(i,j)=1
END IF
END FOR
END FOR*/
Step 4. The binarized image is labelled and areas of connected components are calculated using equivalence
classes.
Step 5. The connected component with the maximum area and the connected component with the second highest
area are found out.
Removal of Artefact from Shoe Print Image
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 15|
Step 6. The ratio of the maximumarea to that of second maximum area are calculated if the ratio is high and if
ratio is low
Step 7. On the basis of the ratio if ratio is high only the component with highest area is kept and all others are
removed otherwise if ratio is low the component with the highest and second highest area are kept and all others
are removed.
Step 8. A convex hull is calculated for the one pixel in the image and all regions within the convexhull are set to
one.
Step 9.Now the above obtained image matrix is multiplied to the original image matrix to obtain an image
consisting of only shoe print without any artefact.
V. CORRECTNESS
Loop invariant: At start of every iteration of outer loop, each row of image i = 1, 2, . . . . . . , A and inner loop ,
each column j = 1, 2, . . . . . . , B; in the end of the iteration it follows same process.
Initialization: Since i = 1 i.e. it is at first row of the image before the first iteration of the outer loop, so, the
invariant is initially true and is same for the inner loop; some variable are initialize with the image size and
dimension which is finite.
Maintenance: In each successive iteration loop invariant moves to next row by incrementing loop variable.
Loop works by moving Image [i + 1][j], Image [i + 2][j], Image [i + 3][j] and so on.
Termination: The outer loop ends when outer loop >height, i.e. all the row of the image is already traversed.
Complexity Analysis
Assuming the height = width =n, the running time for both for loop is O(n × n) for all cases;At each level of the
recursion, partitioning requires O(n) time. If partitions were guaranteed to havea size equal to a fixed portion,
and this held at each level, the worst case time would be O(n log n). However, those criteria do not apply;
Partitions may have size in O(n) (they are not balanced). Hence the worst case running time is O(n2). Thus if
we consider worst case time: O(n 2) and expected time: O(n log n). To calculate the area of each component it
requires O(n × n) running time.T(n)= O(n2) + O(n log n) + O(n2) = O(n2).
Figure 1(a) Shoe Print with artefact Figure 1(b) Shoe Print without artefact
Figure 2(a) Shoe Print with artefact Figure 2(b) Shoe Print without artefact(45 Degree rotation)
Removal of Artefact from Shoe Print Image
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 16|
VI. CONCLUSIONS
Removing artefact by calculating each component and the binarized output is shown in figure1 (b) and
2 (b). Maximum number of artefacts (mainly letter) removed from this step but if any metal or Gibbs artefact are
present then those are removed by applying Quickhull convex hull and shown in figure 2(b). In figure 1(b) no
artefact present i.e. all artefacts are removed by proposed algorithms. Artefact removal from shoe print is a pre-
processing step. Here intelligence system for artefact removal on shoe print has been implemented. The
automated system remove artefact using low time complexity. Proposed methods are based on a combination of
statistical and geometric methods and it give very good results for different kinds of shoe print images.
REFERENCES
[1]. Welding, S. (2012, 12). Locard's Exchange Principle - Forensic HandbookForensic Handbook. Retrieved October 22,
2014, from http://www.forensichandbook.com/locards-exchange-principle/
[2]. Nordby, J. J. (2006). Final Analysis Forensics. Retrieved from
http://www.finalanalysisforensics.com/media/pdfs/BasicBloodstainPatternAnalysisTEXT.pdf
[3]. Scientific Working Group On Bloodstain Pattern Analysis. (2009, April). FBI — Standards and Guidelines -
Scientific Working Group on Bloodstain Pattern Analysis: Recommended Terminology - April 2009. Retrieved from
http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/april2009/standards/2009_04_standards01.htm
[4]. http://www.iabpa.org/journal
[5]. December News 2004, The Use of BPA Modeling in Investigations, Peter Lamb,Page 8
[6]. December News 2004, City of Windsor Homicide Case, Scott Lamont, Page 11
[7]. December News 2006, We Got Our Man (in more ways than one), LeeAnnSingley,Page 23
[8]. December News 2007, Regina v. Sion Jenkins, Joe Slemko, Page 8-9
[9]. December News 2007, Case Presentation, Paul Treudson, Page 12
[10]. December News 2008, Bloodstain Patterns Help Tell the Story When the Victim Can’t… or Won’t, Erin Sims Page
19
[11]. Toplikar, D. (2010, December 13). Blood stain with hammer imprint shown in ex-FBI agent's murder trial - Las
Vegas Sun News. Retrieved from http://www.lasvegassun.com/news/2010/dec/13/blood-stain-showed-imprint-
hammer-says-analyst-ex-/
[12]. December News 2008 Page 17
[13]. December News 2005 Page 4
[14]. December News 2005 Page 11

More Related Content

Viewers also liked

Control Chart Analysis of Ek/M/1 Queueing Model
Control Chart Analysis of Ek/M/1 Queueing Model Control Chart Analysis of Ek/M/1 Queueing Model
Control Chart Analysis of Ek/M/1 Queueing Model IJMER
 
E04012533
E04012533E04012533
E04012533IJMER
 
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...IJMER
 
Ijmer 46050106
Ijmer 46050106Ijmer 46050106
Ijmer 46050106IJMER
 
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...IJMER
 
Dy3212291237
Dy3212291237Dy3212291237
Dy3212291237IJMER
 
Ec3212561262
Ec3212561262Ec3212561262
Ec3212561262IJMER
 
Seismic Pounding Effect in Framed Structures
Seismic Pounding Effect in Framed Structures Seismic Pounding Effect in Framed Structures
Seismic Pounding Effect in Framed Structures IJMER
 
Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relie...
Modeling and Reduction of Root Fillet Stress in Spur Gear Using  Stress Relie...Modeling and Reduction of Root Fillet Stress in Spur Gear Using  Stress Relie...
Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relie...IJMER
 
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...
Optimization of Factors Affecting Glucuronic Acid Production in  Yogurt Ferme...Optimization of Factors Affecting Glucuronic Acid Production in  Yogurt Ferme...
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...IJMER
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a surveyIJMER
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...IJMER
 
Internet 2036
Internet 2036Internet 2036
Internet 2036samipague
 
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three  Phase InverterDesign and Development of Gate Signal for 36 Volt 1000Hz Three  Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase InverterIJMER
 
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsNonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsIJMER
 

Viewers also liked (18)

Control Chart Analysis of Ek/M/1 Queueing Model
Control Chart Analysis of Ek/M/1 Queueing Model Control Chart Analysis of Ek/M/1 Queueing Model
Control Chart Analysis of Ek/M/1 Queueing Model
 
E04012533
E04012533E04012533
E04012533
 
1. grados conj y ac. i grado
1. grados conj y ac. i grado1. grados conj y ac. i grado
1. grados conj y ac. i grado
 
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...
Design and Implmentation of Circular Cross Sectional Pressure Vessel Using Pr...
 
Ijmer 46050106
Ijmer 46050106Ijmer 46050106
Ijmer 46050106
 
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...
Stakeholders’ Perception of the Causes and Effect of Construction Delays on P...
 
Swuni2012 cyberdoc
Swuni2012 cyberdocSwuni2012 cyberdoc
Swuni2012 cyberdoc
 
Dy3212291237
Dy3212291237Dy3212291237
Dy3212291237
 
Ec3212561262
Ec3212561262Ec3212561262
Ec3212561262
 
Seismic Pounding Effect in Framed Structures
Seismic Pounding Effect in Framed Structures Seismic Pounding Effect in Framed Structures
Seismic Pounding Effect in Framed Structures
 
Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relie...
Modeling and Reduction of Root Fillet Stress in Spur Gear Using  Stress Relie...Modeling and Reduction of Root Fillet Stress in Spur Gear Using  Stress Relie...
Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relie...
 
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...
Optimization of Factors Affecting Glucuronic Acid Production in  Yogurt Ferme...Optimization of Factors Affecting Glucuronic Acid Production in  Yogurt Ferme...
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
 
Sience academy
Sience academySience academy
Sience academy
 
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
A Technique by using Neuro-Fuzzy Inference System for Intrusion Detection and...
 
Internet 2036
Internet 2036Internet 2036
Internet 2036
 
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three  Phase InverterDesign and Development of Gate Signal for 36 Volt 1000Hz Three  Phase Inverter
Design and Development of Gate Signal for 36 Volt 1000Hz Three Phase Inverter
 
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area OscillationsNonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
Nonlinear Control of UPFC in Power System for Damping Inter Area Oscillations
 

Similar to Removal of Artefact from Shoe Print Image

Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelEditor IJMTER
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxfaithxdunce63732
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of CrimeIRJET Journal
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsTELKOMNIKA JOURNAL
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...cscpconf
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...csandit
 
Conversion of Commercial Shoe print to Reference and Recovery of Images
Conversion of Commercial Shoe print to Reference and Recovery of ImagesConversion of Commercial Shoe print to Reference and Recovery of Images
Conversion of Commercial Shoe print to Reference and Recovery of ImagesCSCJournals
 
A voting based approach to detect recursive order number of photocopy documen...
A voting based approach to detect recursive order number of photocopy documen...A voting based approach to detect recursive order number of photocopy documen...
A voting based approach to detect recursive order number of photocopy documen...sipij
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrptpramod naik
 
Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)MUSAAB HASAN
 
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGFOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGsipij
 
Detection of fabrication in photocopy document using texture features through...
Detection of fabrication in photocopy document using texture features through...Detection of fabrication in photocopy document using texture features through...
Detection of fabrication in photocopy document using texture features through...sipij
 
Research on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese TextResearch on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese TextIOSR Journals
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Object video tracking using a pan tilt-zoom system
Object video tracking using a pan tilt-zoom systemObject video tracking using a pan tilt-zoom system
Object video tracking using a pan tilt-zoom systemMohammed Abdalhakam Taha
 

Similar to Removal of Artefact from Shoe Print Image (20)

Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
 
IRJET- Survey on Detection of Crime
IRJET-  	  Survey on Detection of CrimeIRJET-  	  Survey on Detection of Crime
IRJET- Survey on Detection of Crime
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic tools
 
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
SURVEILLANCE VIDEO BASED ROBUST DETECTION AND NOTIFICATION OF REAL TIME SUSPI...
 
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
Surveillance Video Based Robust Detection and Notification of Real Time Suspi...
 
Conversion of Commercial Shoe print to Reference and Recovery of Images
Conversion of Commercial Shoe print to Reference and Recovery of ImagesConversion of Commercial Shoe print to Reference and Recovery of Images
Conversion of Commercial Shoe print to Reference and Recovery of Images
 
A voting based approach to detect recursive order number of photocopy documen...
A voting based approach to detect recursive order number of photocopy documen...A voting based approach to detect recursive order number of photocopy documen...
A voting based approach to detect recursive order number of photocopy documen...
 
Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)
 
U24149153
U24149153U24149153
U24149153
 
Microstamping
MicrostampingMicrostamping
Microstamping
 
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDINGFOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
FOOT ANTHROPOMETRY DEVICE AND SINGLE OBJECT IMAGE THRESHOLDING
 
Detection of fabrication in photocopy document using texture features through...
Detection of fabrication in photocopy document using texture features through...Detection of fabrication in photocopy document using texture features through...
Detection of fabrication in photocopy document using texture features through...
 
Research on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese TextResearch on Clustering Method of Related Cases Based On Chinese Text
Research on Clustering Method of Related Cases Based On Chinese Text
 
C017152427
C017152427C017152427
C017152427
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Object video tracking using a pan tilt-zoom system
Object video tracking using a pan tilt-zoom systemObject video tracking using a pan tilt-zoom system
Object video tracking using a pan tilt-zoom system
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 

Recently uploaded (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Removal of Artefact from Shoe Print Image

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 13| Removal of Artefact from Shoe Print Image Prof. (Dr.) Samir Kumar Bandyopadhyay1 , Ms. Nabanita Basu2 1 Professor, Department of Computer Science & Engineering, University of Calcutta 2 Research Scholar, Department of Computer Science &Engineering, University of Calcutta I. INTRODUCTION Locard [1] believed that no matter what a perpetrator does or where he goes ,by coming in contact with things at or around a crimescene he can leave all sorts of evidence , including DNA, fingerprints, footprints, hair , skin cells, blood, body fluids, pieces ofclothing fibers and more[1]. While the criminal leaves something at the crime scene he is also expected to take something awayfrom the scene with him[1]. On a very loose connect it might be said that when killing an individual with a hammer hit thecriminal might take away the murder weapon with him but at the same time he might end up leaving behind bloody stains of theblood bearing hammer at the crime scene . ‘A bloodstain resulting from contact between a blood-bearing surface and anothersurface’ has been termed as ‘Transfer Stain’ by the International Association of Bloodstain Pattern Analysts (IABPA)[2-4]. Thusthis work is particularly directed at studying hammer transfer stain patterns at a crime scene.Many image processing techniques have been developed over the past two decades to help forensicscientist in detection of footprint image boundary. Most studies conducted have proven that measurementof parameters may help detection of crime scenario. In this paper we present initially pre- processing offootprint image after digitization and then find out the artefacts present. Segmentation of Region of Interest (ROI) is used. Further we useDivide and Conquer Homogeneity algorithm, followed by edge detection. We obtain the image boundaryby using our proposed algorithm. A RGB image taken as an input, but here the methodsdeals with grayimage, thus input RGB image converted intogray image first. Binarization is very effective preprocessingmethodsfor most of the segmentation. Due to largevariation on background and foreground ofshoe print imagesmaximum binarization fails but here a binarization methodhas been proposed and a globalthreshold value has beenselected by standard deviation of the image. Globalthresholding using standarddeviation gives very goodresults and binarize each component of the image.Shoeprint is the mark made by the outside surface of the soleof a shoe (consist of distinctive geometric patterns) found atcrime scenes. Shoe marks can be broadly classified into twoclasses: 1) shoe impressions which contain 3-dimensionalinformation (e.g. shoe impression at the beach) and 2) shoeprints which contain 2-dimensional information (e.g.shoeprint on a floor). Probability of occurrence of shoe marksat the place of crime is higher than that of fingerprints since ahigh proportion of burglars wear gloves [1]. In severaljurisdictions of Switzerland it was revealed that 35 percent ofcrime scenes had shoeprints usable in forensic science, andfound that 30 percent of all burglaries provide usableshoeprints [2, 3]. It is known that majority of the crimes arecommitted by repeat offenders. It is common for burglars tocommit a number of offences on the same day. As it would beunusual for offenders to discard their footwear betweencommitting different crimes [4]; timely identification andmatching of shoeprints helps in linking various crime scenes. Often it is the case when number of crimes has beencommitted; the investigating officers have an idea of who hascommitted the crime(s). Indeed, they have suspect in custodywhose modus operandi fits the crime. II. BRIEF REVIEW In the IABPA Conference held in Tucson, Arizona, 2004, Peter Lamb presented the investigation report of the late night assault of a young man who was intoxicated at the time of attack and could only recollect part of the savagery that he had been subjected to[5]. Due to rain drop that had soaked the garment at the time of the assault it was difficult to examine the bloodstains on the soaked garment and shoe print image on the ABSTRACT: Shoe marks at the place of crime provide valuable forensic evidence. Many different artefacts can occur during processing of shoe print images. This paper proposed a methodology to remove the artefacts from shoe print images. The proposed methodology is very simple with the combination of statistical and computational geometric approach. Statistical methods like standard deviation are used to calculate the global threshold to binarize the image and computational geometry like convex hull is used to produce final output. It is possible to remove artefacts if it is present either in front side of the image or rear of the image. Keywords: Artefact, Standard Deviation, Global Thresholding, and Convex Hull.
  • 2. Removal of Artefact from Shoe Print Image | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 14| floor[5]. However there was evidence of kicking and stomping[5]. Based on the evidence the case finally proceeded for trial and the accused was proved guilty and hence imprisoned [5]. In his review of the Windsor city homicide case Scott Lamont pointed out that barefoot transfer impressions and footwear transfer impressions were found on the floor[6]. Foot morphology confirmed that the prints were left by the suspect who was wearing boots[6]. In the words of LeeAnnSingley, in the murder case of 2 women (74 year old mother and her 48 year old daughter) in their holiday home in a small town in Pennsylvania, while DNA evidence answered ‘who ?’ in identifying the perpetrator at the trial, the bloodstain pattern evidence proved to be valuable to the jury in answering the ‘how?’[7]. To add to the list, in the case of Regina vs. Sion Jenkins, expirated and other bloodstains on clothing were used as relevant evidence within the legal setting to acquit Sion Jenkins of the murder of his 13 year old daughter Billie Jo[8]. In the case presented by Paul Treudson, at a particular crime scene bloody transfer impressions of an apparent right hand holding a knife was found on top of a sheet that lay at the foot of the bed [9]. The impressions included knuckles and a blade [9]. As Erin Sims puts it, for one particular case the evidence particularly the bloodstain pattern evidence was the only honest teller of the course of events that had led to the victim’s injury[10]. Initially, the Birkett system of coding shoeprint patterns wasdevised by John Birkett of the metropolitan Police ForensicScience Laboratory by allocating alphanumerical values tovarious pattern elements. This system failed uniquely toidentify a pattern because of the multitude of new patternsfrom manufacturers in the late 1980s. The major problemwith the Birkett system was the volume of new patterns, whichthen addressed by prefixing the coding elements with twonumerical digits for the year and a 3 digit numerical suffix in1993. Again, as per the Federal Bureau of Investigation (FBI) Chart reports each year more people are killed by hammer, club or blunt ended object hit as compared to the number of people killed wt rifle or shotgun[11]. In this respect it might be interesting to mention that, in a case reviewed by Stuart H. James at the 2008 IABPA Annual Training conference, he reiterated that bodies of 4 Mexican construction workers were found in a rented apartment at Ohio [12]. The bodies of the victims remained undiscovered for almost a week [12]. When examined the victims were found to have suffered blunt and sharp force injuries [12-14]. The highlight of the case review were the interesting bloodstain patterns found at the crime scene which were studied in conjunction with the wounds suffered/sustained by the victims[12]. In their study, the authors came across many such cases where victims suffered blunt force injuries. Given the large possibility of instruments that can be easily obtained and hence deliver blunt force injuries to the human skull, the authors decided to particularly focus on the possible Transfer and Saturation stain patterns formed at a crime scene as a result of assault particularly with blunt ended objects. III. METHODOLOGY USED A statistical method i.e.standarddeviation is used to calculate the threshold value. In this processing statistical descriptions separate foreground images and background images. A digitized image I[m,n] and h is the intensity of each pixel of the gray image. Here Quickhull Algorithm for Convex Hulls is used. Quickhull Algorithm for Convex Hulls runs faster when the input contains non-extreme points and it uses merged facets to guarantee that the output is clearly convex. IV. ALGORITHM (PSEUDO CODE) Step 1. Grayscale shoe print image is taken as input. Step 2.Threshold value of the image is calculated using the standard deviation technique described above. Step 3. The image is binarized using the threshold value. i.e. pixels having value greater than the threshold is set to 1 and pixels less than the threshold are set to 0. /* [A B]=size(I); BI =zeros(a,b); STD = std2(I); FORi = 1 to A DO FOR j=1 to B DO IF I(i,j) > STD THEN Set BI(i,j)=1 END IF END FOR END FOR*/ Step 4. The binarized image is labelled and areas of connected components are calculated using equivalence classes. Step 5. The connected component with the maximum area and the connected component with the second highest area are found out.
  • 3. Removal of Artefact from Shoe Print Image | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 15| Step 6. The ratio of the maximumarea to that of second maximum area are calculated if the ratio is high and if ratio is low Step 7. On the basis of the ratio if ratio is high only the component with highest area is kept and all others are removed otherwise if ratio is low the component with the highest and second highest area are kept and all others are removed. Step 8. A convex hull is calculated for the one pixel in the image and all regions within the convexhull are set to one. Step 9.Now the above obtained image matrix is multiplied to the original image matrix to obtain an image consisting of only shoe print without any artefact. V. CORRECTNESS Loop invariant: At start of every iteration of outer loop, each row of image i = 1, 2, . . . . . . , A and inner loop , each column j = 1, 2, . . . . . . , B; in the end of the iteration it follows same process. Initialization: Since i = 1 i.e. it is at first row of the image before the first iteration of the outer loop, so, the invariant is initially true and is same for the inner loop; some variable are initialize with the image size and dimension which is finite. Maintenance: In each successive iteration loop invariant moves to next row by incrementing loop variable. Loop works by moving Image [i + 1][j], Image [i + 2][j], Image [i + 3][j] and so on. Termination: The outer loop ends when outer loop >height, i.e. all the row of the image is already traversed. Complexity Analysis Assuming the height = width =n, the running time for both for loop is O(n × n) for all cases;At each level of the recursion, partitioning requires O(n) time. If partitions were guaranteed to havea size equal to a fixed portion, and this held at each level, the worst case time would be O(n log n). However, those criteria do not apply; Partitions may have size in O(n) (they are not balanced). Hence the worst case running time is O(n2). Thus if we consider worst case time: O(n 2) and expected time: O(n log n). To calculate the area of each component it requires O(n × n) running time.T(n)= O(n2) + O(n log n) + O(n2) = O(n2). Figure 1(a) Shoe Print with artefact Figure 1(b) Shoe Print without artefact Figure 2(a) Shoe Print with artefact Figure 2(b) Shoe Print without artefact(45 Degree rotation)
  • 4. Removal of Artefact from Shoe Print Image | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 5 | Iss.1| Jan. 2015 | 16| VI. CONCLUSIONS Removing artefact by calculating each component and the binarized output is shown in figure1 (b) and 2 (b). Maximum number of artefacts (mainly letter) removed from this step but if any metal or Gibbs artefact are present then those are removed by applying Quickhull convex hull and shown in figure 2(b). In figure 1(b) no artefact present i.e. all artefacts are removed by proposed algorithms. Artefact removal from shoe print is a pre- processing step. Here intelligence system for artefact removal on shoe print has been implemented. The automated system remove artefact using low time complexity. Proposed methods are based on a combination of statistical and geometric methods and it give very good results for different kinds of shoe print images. REFERENCES [1]. Welding, S. (2012, 12). Locard's Exchange Principle - Forensic HandbookForensic Handbook. Retrieved October 22, 2014, from http://www.forensichandbook.com/locards-exchange-principle/ [2]. Nordby, J. J. (2006). Final Analysis Forensics. Retrieved from http://www.finalanalysisforensics.com/media/pdfs/BasicBloodstainPatternAnalysisTEXT.pdf [3]. Scientific Working Group On Bloodstain Pattern Analysis. (2009, April). FBI — Standards and Guidelines - Scientific Working Group on Bloodstain Pattern Analysis: Recommended Terminology - April 2009. Retrieved from http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/april2009/standards/2009_04_standards01.htm [4]. http://www.iabpa.org/journal [5]. December News 2004, The Use of BPA Modeling in Investigations, Peter Lamb,Page 8 [6]. December News 2004, City of Windsor Homicide Case, Scott Lamont, Page 11 [7]. December News 2006, We Got Our Man (in more ways than one), LeeAnnSingley,Page 23 [8]. December News 2007, Regina v. Sion Jenkins, Joe Slemko, Page 8-9 [9]. December News 2007, Case Presentation, Paul Treudson, Page 12 [10]. December News 2008, Bloodstain Patterns Help Tell the Story When the Victim Can’t… or Won’t, Erin Sims Page 19 [11]. Toplikar, D. (2010, December 13). Blood stain with hammer imprint shown in ex-FBI agent's murder trial - Las Vegas Sun News. Retrieved from http://www.lasvegassun.com/news/2010/dec/13/blood-stain-showed-imprint- hammer-says-analyst-ex-/ [12]. December News 2008 Page 17 [13]. December News 2005 Page 4 [14]. December News 2005 Page 11