Page 45 - VERITAS Vol.2 Issue 2
P. 45

identification. Any flaw in fingerprint development or procedural

          error will almost certainly result in the assailant being released or

          an innocent person being imprisoned rather than a proper convic-

          tion.



          REFERENCES

          •  Cadd, S., Islam, M., Manson, P., & Bleay, S. (2015). Fin-

              gerprint composition and aging: A literature review. Science

              & Justice, 55(4), 219–238. https://doi.org/10.1016/j.sci-

              jus.2015.02.004

          •  Lennard, Chris. (2001). The Detection and Enhancement of La-

              tent Fingerprints.
          •  Fundamentals of Fingerprint Analysis by Hillary Moses Daluz

              (2014–12-01). (2022). CRC Press.

          •  Kumari, V., Thakar, M. K., Mondal, B., & Pal, S. K. (2021). Ef-

              fects of oils, lotions, hand sanitizers, and mehendi on fingerprints

              captured through digital fingerprint scanner. Egyptian Journal of

              Forensic Sciences, 11(1). https://doi.org/10.1186/s41935-021-

              00222-w
          •  Chadwick, S., Neskoski, M., Spindler, X., Lennard, C., & Roux,

              C. (2017). Effect of hand sanitizer on the performance of finger-

              mark detection techniques. Forensic Science International, 273,

              153–160. https://doi.org/10.1016/j.forsciint.2017.02.018

          •  Merkel R, Dittmann J, Vielhauer C (2011) How contact pres-

              sure, contact time, smearing and oil/skin lotion influence the ag-
              ing of latent fingerprint traces: first results for the binary pixel

              feature using a CWL sensor. In: Paper presented at the Interna-

              tional Workshop on Information Forensics and Security, Igua-

              cu Falls, Brazil, 29 Nov- 2 Dec 2011. https://doi.org/10.1109/

              WIFS.2011.6123153

          •  Win, K. N., Li, K., Chen, J., Viger, P. F., & Li, K. (2020). Finger-
              print classification and identification algorithms for criminal


                                                          36
                                                                                    Veritas Volume: 2, Issue: 2
   40   41   42   43   44   45   46   47   48   49   50