It is utilized to looks at a face pictures against a Template face pictures, whose identity being claimed. On the complement, face identification is a 1: N problem. It is used compares a query face image against all image templates in a face database. Face recognition has distinct advantages over biometrics systems using finger print/palm print and iris, because of its non-contact process. It is mainly used in security systems.
This information capacity problem is resolved through the approach of the forensic format and container information on the acquisition and disk imaging process; this is as discussed by . As for the second issue of the digital chain of custody information standard is as discussed by  about what kind of information should be available for the chain of custody. In particular, some other researchers such as    reinforce opinions about the 5W and 1 H concepts as the basis for information on digital chain of custody. Unfortunately, from an industry point of view, the ISO 27037: 2012 document on the Collection of Digital Evidence does not discuss the metadata standard for digital evidence and chain of custody  . The document only provides an overview of the minimum information required for documentation of digital evidence.
Smith and Kosslyn (2007) define memory as a set of representations and processes by which information is encoded, consolidated, and retrieved. (p. 538). Models have been developed to show processes such as short-term storage that allows for problem solving and for how memory is processed from sensory input to long-term storage. Although, there are many representations of these types of processes, only a few will be discussed in this paper. As credit is due to all the theories and tasks that have been completed to give evidence that these processes do exist; at the present day moment experts still are not sure exactly how our brain works.
Schema theory itself has many strengths, such as there are a lot studies that support the theory. "The theory is useful for understanding how people categorize information, interpreted stories, make inferences and make logic among other things". (Crane, Hannibal 72). The theory equally has its weaknesses or limitations in respects to memory and overall approach of the theory. One of which is that the theory talks about memory being reconstructive, but there is no solid proof of it and it does not show any process of that.
However, a biased opinion does not indicate a false opinion. Experience and observation are depended on each other in order to gain knowledge. To the people who consider looking at to be the best and only option, Lewis states, “If you will only step inside, the things that look to you like instincts and taboos will suddenly reveal their real and transcendental nature” (1). Only considering one point of view can cause someone to be misled which leads to narrowmindedness. One point of view may be inferior depending on the situation but this is not always constant, and both should be considered to develop the most informed understanding.
Warren also stated that “If we judged ourselves by how our actions are perceived by others, we may become more sensitive and understanding of any hurtful responses by them” (Warren 1). Even judging by actions is not right because things can be meant to help, but can instead result in something going wrong. Something that one person sees as disastrous could be seen as good by another person based on what each person knows and the intention. Thus, judging by actions is still not an effective way to judge a person, one must only judge by what is unseen; personality, morals, and intentions. There are many places where one can see how judging based on appearance affects people.
This is not the case. One problem with the current understanding of memory, is that the study of memory is limited by advancements in neurophysiology (Radvansky, 2015). While not every aspect of memory is dependent on an understanding of neurophysiology, some certainly are. Computer metaphors have been used by memory theorists to reduce complicated processes, involving neurophysiology and cognition, into easily understandable
Keywords were generated from case specific information. • Known good/bad hash sets were rarely used.Known bad hash sets were used primarily during operations. NSRL3 and similar hash sets were also rarely used to remove or classify known-good. • If no suspicious material were discovered in the manual image and video preview, keyword search or signature analysis, the investigator would normally check for installed programs, specifically for encryption or anti-forensic software. • If no suspicious software were found, the digital investigator would generally look at Internet history, with various automated tools, depending on the unit’s software licensing.
To study visual subliminal perception, participants are usually primed with specific visual stimuli, often images, the researchers then determine the responses they elicit.  Images could be as simple as geometric figures or complex as various human facial expressions. Large amounts of research have accumulated which demonstrate how visual cues could affect emotions . But more importantly is that it also showed no clues for forcing the participants to perform any unintended act, and that the most it can do is to trigger previously intended actions. 
Conclusion All in all, the characteristics of a person can be approximately determined by their facial nature. Physiognomy is a skill that needs less yet continuous practice. Ultimately, judging a person solely on the basis of personology is not a right thing to do. There are several personology factors that are psychological and impractical to judge. However, since the domain of face reading uncovers certain characteristic traits of individuals it 's beneficial to utilize these physiognomy skills.