Skip to main content

Design of a Digital Forensics Image Mining System

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

Abstract

Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper discusses the requirements of digital image forensics which underpin the design of our forensic image mining system. This system can be trained by a hierarchical Support Vector Machine (SVM) to detect objects and scenes which are made up of components under spatial or non-spatial constraints. Forensic investigators can communicate with the system via a grammar which allows object description for training, searching, querying and relevance feedback. In addition, we propose to use a Bayesian networks approach to deal with information uncertainties which are inherent in forensic work. These inference networks will be constructed to model probability interactions between beliefs, adapt to different users’ retrieval patterns, and mimic human judgement of semantic content of image patches. An analysis of the performance of the first prototype of the system is also provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CSI/FBI, 2003 Computer Crime and Security Survey. Computer Security Institute, San Fransisco, USA (2003)

    Google Scholar 

  2. Open Systems, http://www.opensystems.com.au (visited on October 15, 2003)

  3. Niblack, W., Zhu, X., Hafner, J., et al.: Updates to the QBIC system. In: Storage and Retrieval for Image and Video Databases, vol. 3312, pp. 150–161 (1997)

    Google Scholar 

  4. Mohay, G., Anderson, A., Collie, B., de Vel, O., McKemmish, R.: Computer and Intrusion Forensics. Artech House Publishers, Norwood (2003)

    Google Scholar 

  5. Muller, H., Muller, W., Marchand-Maillet, S., et al.: Strategies for positive and negative relevance feedback in image retrieval. In: Proc. International Conference on Pattern Recognition ICPR 2000, vol. 1, pp. 1043–1046 (2000)

    Google Scholar 

  6. Brown, R., Pham, B., de Vel, O.: A grammar for the specification of forensic image mining searches. In: Proc. 8th Australian and New Zealand Conference on Intelligent Information Systems, Sydney, Australia (2003)

    Google Scholar 

  7. Brown, R., Pham, B.: Image Mining and Retrieval Using Hierarchical Support Vector Machines. In: Proc 11th International, Multimedia Modelling Conference (MMM 2005), January 12-14, pp. 446–451 (2005)

    Google Scholar 

  8. Yow, K., Cipolla, R.: Feature-based human face detection. Image and Vision Computing 15(9), 713–735 (1997)

    Article  Google Scholar 

  9. Haritaoglu, Harwood, D., Davis, L.: W-4: Real-Time surveillance of people and their activities. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), 809–830 (2000)

    Article  Google Scholar 

  10. Camurri, Ricchetti, M., Trocca, R.: EyesWeb-toward gesture and affect recognition in dance/music interactive systems. In: IEEE International Conference on Multimedia Computing and Systems, Florence, Italy (1999)

    Google Scholar 

  11. Miyamori, H., Iisaku, S.: Video annotation for content-based retrieval using human behavior analysis and domain knowledge. In: Proc. Fourth IEEE International Conference on Automatic Face and Gesture Recognition, Grenoble, France (2000)

    Google Scholar 

  12. Tomita, A., Echigo, T., et al.: A visual tracking system for sports video annotation in unconstrained environments. In: International Conference on Image Processing, Vancouver, Canada (2000)

    Google Scholar 

  13. Oliver, N., Rosario, B., Pentland, A.: A Bayesian computer vision system for modeling human interactions. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), 831–843 (2000)

    Article  Google Scholar 

  14. Ivanov, Y., Aaron, F.: Recognition of visual activities and interactions by stochastic parsing. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), 852–872 (2000)

    Article  Google Scholar 

  15. Wada, T., Matsuyama, T.: Multi-object behavior recognition by event-driven selective attention method. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), 873–887 (2000)

    Article  Google Scholar 

  16. Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–285 (1989)

    Article  Google Scholar 

  17. Mohan, Papageorgiou, C., Poggio, T.: Example-based object detection in images by components. IEEE Transactions on Pattern Analysis and Machine Intelligence 23(4), 349–361 (2001)

    Article  Google Scholar 

  18. Pearl, J.: Probabilistic Reasoning in Intelligent Systems. Morgan Kaufmann, San Mateo (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brown, R., Pham, B., de Vel, O. (2005). Design of a Digital Forensics Image Mining System. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_57

Download citation

  • DOI: https://doi.org/10.1007/11553939_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics