DocumentCode :
178469
Title :
SOFIR: Securely outsourced Forensic image recognition
Author :
Bosch, Christoph ; Peter, Adrian ; Hartel, Pieter ; Jonker, Willem
Author_Institution :
Univ. of Twente, Enschede, Netherlands
fYear :
2014
fDate :
4-9 May 2014
Firstpage :
2694
Lastpage :
2698
Abstract :
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images. To detect and mitigate the distribution of illegal images, for instance in network traffic of companies or Internet service providers, it is desirable to outsource the recognition of illegal images to these companies. However, law enforcement agencies want to keep their hash databases secret at all costs as an unwanted release may result in misuse which could ultimately render these databases useless. We present SOFIR, a tool for the Secure Outsourcing of Forensic Image Recognition allowing companies and law enforcement agencies to jointly detect illegal network traffic at its source, thus facilitating immediate regulatory actions. SOFIR cryptographically hides the hash database from the involved companies. At fixed intervals, SOFIR sends out an encrypted report to the law enforcement agency that only contains the number of found illegal images in the given interval, while otherwise keeping the company´s legal network traffic private. Our experimental results show the effectiveness and practicality of our approach in the real-world.
Keywords :
Internet; cryptography; image forensics; image recognition; law administration; telecommunication traffic; Internet service providers; SOFIR; automatic illegal image detection; confidential database; hash database; homomorphic encryption; illegal image distribution mitigation; illegal network traffic detection; law enforce- ment agencies; securely outsourced forensic image recognition; Companies; Databases; Encryption; Forensics; Law enforcement; Forensics; law enforcement; network monitoring; somewhat homomorphic encryption;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Conference_Location :
Florence
Type :
conf
DOI :
10.1109/ICASSP.2014.6854089
Filename :
6854089
Link To Document :
بازگشت