Abstract
Child exploitation through the use of the Internet as a delivery and exchange tool is a growing method of abuse towards children. It is shown that a Stochastic Learning Weak Estimator learning algorithm and a Maximum Likelihood Estimator learning algorithm can be applied against Linear Classifiers to identify and filter illicit pornographic images. In this paper, these two learning algorithms were combined with distance algorithms such as the Non-negative Vector Similarity Coefficient-based Distance algorithm, Euclidian Distance, and a Weighted Euclidian Distance algorithm. Experimental results showed that classification accuracies and the network overhead did have a significant effect on routing devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Internet Pornography Statistics, http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
Warner, B.: Police to Launch International Cyber Child Porn Sting (2003), http://www.castlecops.com/a4498Police_to_Launch_International_Cyber_Child_Porn_Sting.html
Kevin, J.: FBI Arrests 40 in Child Porn Sting (2002), http://www.usatoday.com/tech/news/2002/03/18/net-porn.htm
Che-Jen, H., Wei-Cheng, L., Jung-Shian, L.: An Efficient Packet-level JPEG Forensic Data Collection. Future Generation Communication and Networking 2, 108–113 (2007)
Ryan, M.P., Whitehead, A.D.: Method and Device for Classifying Internet Objects and Objects Stored on Computer-readable Media. US patent document No: 7383282, Application No: 09/978,182, Application Date, October 17 (2001)
Forsyth, D., Fleck, M.: Automatic Detection of Human Nudes. International Journal of Computer Vision, 63–77 (August 1999)
Hammami, M., Chahir, Y., Chen, L.: WebGuard: Web Based Adult Content Detection and Filtering System. In: IEEE/WIC International Conference on Web Intelligence, October 13-17, vol. 2, pp. 574–578 (2003)
Shupo, A., Martin, M.V., Rueda, L., Bulkan, A., Chen, Y., Hung, P.C.K.: Toward Efficient Detection of Child Pornography in the Network Infrastructure. IADIS International Journal on Computer Science and Information Systems 1, 15–31 (2006)
Munish, C., Martin, M.V., Rueda, L., Hung, P.C.K.: Toward New Paradigms to Combating Internet Child Pornography. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May. 2006, pp. 1012–1015 (2006)
Chopra, M., Martin, M.V., Rueda, L., Hung, P.C.K.: A Source Address Reputation System to Combating Child Pornography at the Network Level. In: IADIS International Conference on Applied Computing (February 2006)
Oommen, B.J., Rueda, L.: Stochastic Learning-based Weak estimation of Multinomial Random Variables and its Applications to Pattern Recognition in Non-stationary Environments. Pattern Recognition 39, 328–341 (2006)
Oommen, B.J., Rueda, L.: On Utilizing Stochastic Learning Weak Estimators for Training and Classification of Patterns with Non-stationary Distributions. In: Proceeding of the 28th German Conference on Artificial Intelligence, Koblenz, Germany, pp. 107–120. Springer, Heidelberg (2005)
Xue, Y., Tong, C.S., Zhang, W.: Evaluation of Distance Measures for NMF-based Face Recognition. In: International Conference on Computational Intelligence and Security, November 2006, vol. 1, pp. 651–656 (2006)
Qian, G., Sural, S., Gu, Y.: Pramanik: Similarity Between Euclidean and Cosine Angle Distance for Nearest Neighbor Queries. In: Proceedings of the 2004 ACM Symposium on Applied Computing, March 2004, pp. 1232–1237. New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ibrahim, A., Martin, M.V. (2010). Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-11534-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11533-2
Online ISBN: 978-3-642-11534-9
eBook Packages: Computer ScienceComputer Science (R0)