Skip to main content

Ballistic Imaging (2008) / Chapter Skim
Currently Skimming:

11 Best Standards for Future Developments in Computer-Assisted Firearms Identification
Pages 272-280

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 272...
... Properly used, the committee believes that the current National Integrated Ballistic Information Network (NIBIN) can be a valuable investigative tool, providing important leads to law enforcement through searches of ballistics evidence images stored in a database.
From page 273...
... For instance, it is a considerably easier task to determine whether two particular fingerprints match each other than it is to find potentially matching fingerprints from a large database. A central distinction between verification and search is that in a verification task one can be quite conservative, not accepting a match unless there is overwhelming evidence.
From page 274...
... A given false alarm rate and true detection rate may even produce acceptable performance for a particular database size but still not scale up effectively to larger databases. For instance, if a database grows by a factor of 100, for a given false alarm rate the number of incorrect matches reported will also be expected to grow by a factor of 100.
From page 275...
... However, this kind of approach only works for relatively small datasets. More sophisticated methods include hierarchical search methods, in which one first uses a coarse set of features to roughly rank the targets and then a refined comparison is performed only on the top few selections, or hashing function methods, in which a small set of features are used to index into a precomputed arrangement of the targets, focusing on a small set of most likely matches.
From page 276...
... on the accuracy of fingerprint recognition systems found that the best pattern recognition methods are able to achieve a 98.6 percent correct detection rate using a single finger and a 99.9 percent correct detection rate using four fingers, with a false alarm rate of 0.01 percent (Wilson et al., 2004)
From page 277...
... FpVTE 2003 consists of multiple tests performed with combinations of fingers (e.g., single fingers, 2 index fingers, 4 to 10 ­fingers) and different types and qualities of operational fingerprints (e.g., flat livescan images from visa applicants, multifinger slap livescan images from presentday booking or background check systems, or rolled and flat inked fingerprints from legacy criminal databases)
From page 278...
... The development portion of the FERET database has been distributed to more than 100 groups outside the original program. The final, and most recognized, part of the FERET program involved the FERET evaluations that compared the abilities of various facial recognition algorithms using the FERET database.
From page 279...
... Just as automated fingerprint and facial recognition systems were considered to be nonmature technologies in the 1990s, automated ballistic imaging can today be considered as a nonmature technology. The use of large-scale evaluations of the fingerprint and face recognition technologies through controlled competitive vendor tests has advanced those technologies tremendously.
From page 280...
... For example, image acquisition could be investigated separately from search and pattern recognition. In addition, the competitive vendor tests approach could be used to test the safety, durability, and cost-effectiveness of engraving identifiers on firearms parts and or bullets and cartridge cases, such as the microstamping approaches discussed in Chapter 10.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.