Skip to main content

Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2009)

Abstract

Child exploitation through the use of the Internet as a delivery and exchange tool is a growing method of abuse towards children. It is shown that a Stochastic Learning Weak Estimator learning algorithm and a Maximum Likelihood Estimator learning algorithm can be applied against Linear Classifiers to identify and filter illicit pornographic images. In this paper, these two learning algorithms were combined with distance algorithms such as the Non-negative Vector Similarity Coefficient-based Distance algorithm, Euclidian Distance, and a Weighted Euclidian Distance algorithm. Experimental results showed that classification accuracies and the network overhead did have a significant effect on routing devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Internet Pornography Statistics, http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html

  2. Warner, B.: Police to Launch International Cyber Child Porn Sting (2003), http://www.castlecops.com/a4498Police_to_Launch_International_Cyber_Child_Porn_Sting.html

  3. Kevin, J.: FBI Arrests 40 in Child Porn Sting (2002), http://www.usatoday.com/tech/news/2002/03/18/net-porn.htm

  4. Che-Jen, H., Wei-Cheng, L., Jung-Shian, L.: An Efficient Packet-level JPEG Forensic Data Collection. Future Generation Communication and Networking 2, 108–113 (2007)

    Google Scholar 

  5. Ryan, M.P., Whitehead, A.D.: Method and Device for Classifying Internet Objects and Objects Stored on Computer-readable Media. US patent document No: 7383282, Application No: 09/978,182, Application Date, October 17 (2001)

    Google Scholar 

  6. Forsyth, D., Fleck, M.: Automatic Detection of Human Nudes. International Journal of Computer Vision, 63–77 (August 1999)

    Google Scholar 

  7. Hammami, M., Chahir, Y., Chen, L.: WebGuard: Web Based Adult Content Detection and Filtering System. In: IEEE/WIC International Conference on Web Intelligence, October 13-17, vol. 2, pp. 574–578 (2003)

    Google Scholar 

  8. Shupo, A., Martin, M.V., Rueda, L., Bulkan, A., Chen, Y., Hung, P.C.K.: Toward Efficient Detection of Child Pornography in the Network Infrastructure. IADIS International Journal on Computer Science and Information Systems 1, 15–31 (2006)

    Google Scholar 

  9. Munish, C., Martin, M.V., Rueda, L., Hung, P.C.K.: Toward New Paradigms to Combating Internet Child Pornography. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May. 2006, pp. 1012–1015 (2006)

    Google Scholar 

  10. Chopra, M., Martin, M.V., Rueda, L., Hung, P.C.K.: A Source Address Reputation System to Combating Child Pornography at the Network Level. In: IADIS International Conference on Applied Computing (February 2006)

    Google Scholar 

  11. Oommen, B.J., Rueda, L.: Stochastic Learning-based Weak estimation of Multinomial Random Variables and its Applications to Pattern Recognition in Non-stationary Environments. Pattern Recognition 39, 328–341 (2006)

    Article  MATH  Google Scholar 

  12. Oommen, B.J., Rueda, L.: On Utilizing Stochastic Learning Weak Estimators for Training and Classification of Patterns with Non-stationary Distributions. In: Proceeding of the 28th German Conference on Artificial Intelligence, Koblenz, Germany, pp. 107–120. Springer, Heidelberg (2005)

    Google Scholar 

  13. Xue, Y., Tong, C.S., Zhang, W.: Evaluation of Distance Measures for NMF-based Face Recognition. In: International Conference on Computational Intelligence and Security, November 2006, vol. 1, pp. 651–656 (2006)

    Google Scholar 

  14. Qian, G., Sural, S., Gu, Y.: Pramanik: Similarity Between Euclidean and Cosine Angle Distance for Nearest Neighbor Queries. In: Proceedings of the 2004 ACM Symposium on Applied Computing, March 2004, pp. 1232–1237. New York (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ibrahim, A., Martin, M.V. (2010). Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics