Computational criminology: Difference between revisions
m clean up, removed stub tag using AWB |
|||
Line 48: | Line 48: | ||
*[http://stl.sfu.ca/projects/mastermind.php The Mastermind Project] |
*[http://stl.sfu.ca/projects/mastermind.php The Mastermind Project] |
||
*[http://pages.cs.wisc.edu/~huangyz The digital photo authentication project at CS Dept. University of Wisconsin-Madison] |
*[http://pages.cs.wisc.edu/~huangyz The digital photo authentication project at CS Dept. University of Wisconsin-Madison] |
||
*[http://www.tmba.tv/forensic-animation/ The Art of Forensic Animation] |
|||
[[Category:Computational science]] |
[[Category:Computational science]] |
Revision as of 19:16, 1 January 2014
Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.
Methods
Computing science methods being used include:
Areas of usage
Computational criminology is interdisciplinary in the sense that both criminologists and computing scientists work together to ensure that computational models properly match their theoretical and real-world counterparts. Areas of criminology for which computational approaches are being used include:
Forensics
Computational forensics (CF) is a quantitative approach to the methodology of the forensic sciences. It involves computer-based modeling, computer simulation, analysis, and recognition in studying and solving problems posed in various forensic disciplines. CF integrates expertise from computational science and forensic sciences.
A broad range of objects, substances and processes are investigated, which are mainly based on pattern evidence, such as toolmarks, fingerprints, shoeprints, documents etc.,[1] but also physiological and behavioral patterns, DNA, digital evidence and crime scenes.
Computational methods find a place in the forensic sciences in several ways,[2][3][4][5][6] as for example:
- rigorous quantification of individuality,
- definition and establishment of likelihood ratio,
- increase of efficiency and effectiveness in daily forensic casework.
Algorithms implemented are from the fields of signal and image processing, computer vision,[7] computer graphics, data visualization, statistical pattern recognition, data mining, machine learning, and robotics.
Computer forensics (also referred to as "digital forensics" or "forensic information technology") is one specific discipline that could use computational science to study digital evidence. Computational Forensics examines diverse types of evidence.
Forensic animation
Forensic animation is a branch of forensic science in which audio-visual reconstructions of incidents or accidents are created to aid investigators. Examples include the use of computer animation, stills, and other audio visual aids. Application of computer animation in courtrooms today is becoming more popular.
The first use of forensic animation was in Connors v. United States, both sides used computer re-creations and animations in a case surrounding the crash of Delta Flight 191 on August 2, 1985.[8] The crash resulted in the deaths of 137 people and extensive property damage.[9] In the resulting lawsuit a method was required to explain complicated information and situations to the jury. As part of the prosecution presentation, a 45-minute computer generated presentation was created to explain the intricacies of the evidence and thus began forensic animation. [10]
The first reported use of computer animation in a U.S. criminal trial was in the 1991 Marin County, CA homicide trial of James Mitchell (of the porno-businessman Mitchell Brothers) [11] The prosecution used the animation to explain the complex details of the shooting incident to the jury. It showed the positions of James Mitchell, Artie Mitchell (the victim), the bullet impact points, and the path taken by bullets as they entered Artie's body. The animation was admitted, over objection by the defense, and the case resulted in a conviction. The use of the animation was upheld on appeal and the success of the forensic animation led to its use in many other trials.
References
- ^ S. N. Srihari, "Beyond CSI: The Rise of Computational Forensics", IEEE Spectrum, pp. 38-43, December 2010.
- ^ Computational Forensics Project - Automated Reconstruction of Human Faces (Archival page 6/2002 )
- ^ Wong, J.L. (2004). "Computational forensic techniques for intellectual property protection". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 23 (6): 987–994. doi:10.1109/TCAD.2004.828122.
{{cite journal}}
: Unknown parameter|coauthors=
ignored (|author=
suggested) (help) DIO 10.1109/TCAD.2004.828122 - ^ Propelled Into Computational Forensics by 9/11, NCBI Preps QA Software to ID Katrina Victims (November 28, 2005)
- ^ Franke, Katrin (2007). "Computational Forensics: Towards Hybrid-Intelligent Crime Investigation". Third International Symposium on Information Assurance and Security, 2007. IAS 2007: 383–386.
{{cite journal}}
: Unknown parameter|coauthors=
ignored (|author=
suggested) (help) DOI 10.1109/IAS.2007.84. - ^ Book Announcement: Statistical DNA Forensics: Theory, Methods and Computation (January 2008), Researchandmarkets.com
- ^ YiZhen Huang and YangJing Long (2008). "Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model" (PDF). Proc. IEEE Conference on Computer Vision and Pattern Recognition: 1–8.
- ^ http://digitalcommons.law.msu.edu/cgi/viewcontent.cgi?article=1102&context=king
- ^ http://www.expertlaw.com/library/animation/forensic_animation.html
- ^ http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/abaj75&div=261&id=&page=
- ^ http://articles.latimes.com/1993-12-17/news/mn-2822_1_computer-animation