Fig 1: Minister of Defense for Germany, Ursula von der Leyen
Fig 2: Source fingerprint
Fig 3: Suspect: Justin Adams
My Thoughts
From the list of thirty-two suspects provided, at least three had a close resemblance to the source fingerprint; the rest were highly varied. Hence, the rest of the prints were quickly discarded and the focus centered on the three suspects; Juan Ferrero, Justin Adams, and Yousef Kaliff which portrayed the whorl pattern similar to the source in Fig 2 above. By use of the Fingerprint Minutiae viewer, a closer inspection of the three sets of fingerprints was performed ( Draschl, Hämmerle-Uhl & Uhl, 2016) . And the result of the examination led to the identification of the suspect Justin Adams who had more than 25 matching markers, as indicated in Fig 3 above.
The validity of Fingerprints as a Choice of Identification
Fingerprints have become increasingly significant in the identification of criminals and have been used exceptionally with no reservations as there is no other better technique that can compare. More research has been conducted on the subject with more detailed results such as the density of the ridges in females being different from those of the male ( Cappelli, Ferrara & Maltoni, 2015) . Moreover, technology has been integrated into the process, and fingerprinting in most developed countries is computerized. The computerized matching of the fingerprints is believed to have better and extremely accurate outcomes compared to the manual matching.
Delegate your assignment to our experts and they will do the rest.
As much as the manual matching of the fingerprints is slowly becoming obsolete, the accuracy of the method cannot be overlooked. To improve the efficiency of the technique, experts have examined on the foundation of three conclusions. Additionally, a second examiner is obliged to verify the results of the first examiner in a separate and independent exercise ( Sarkar & Singh, 2019) . Furthermore, the creation of databases like the Automated System of Fingerprint Identification has been a great assistance in the fingerprint identification process as they offer a rapid means of sorting through unlikely matches.
References
Cappelli, R., Ferrara, M., & Maltoni, D. (2015). Large-scale fingerprint identification on GPU. Information Sciences, 306, 1-20.
Draschl, M., Hämmerle-Uhl, J., & Uhl, A. (2016, November). Assessment of Efficient Fingerprint Image Protection Principles using different Types of AFIS. In International Conference on Information and Communications Security (pp. 241-253). Springer, Cham.
Sarkar, A., & Singh, B. K. (2019). A cancelable fingerprint biometric-based session key establishment protocol. Multimedia Tools and Applications, 1-27.