Title : 
A novel way of identifying suspect picture files
         
        
            Author : 
Shaw, R.J. ; Atkins, A.S.
         
        
            Author_Institution : 
Fac. of Comput., Eng. & Technol., Staffordshire Univ., Stafford, UK
         
        
        
        
        
        
            Abstract : 
Current procedures for the detection and identification of suspect picture files relies on the use of MD5 hashing and then using the resultant hash value to search a database of known hash values for a match, to identify any suspect file. Even a slight modification to the suspect file causes a different hash value to be created which will then fail to generate a match from the records in the database. A novel approach is proposed by converting the suspect picture file to a sound file, generating a `fingerprint´ for this sound wave and using a matching algorithm to identify the file from a suspect file database.
         
        
            Keywords : 
audio signal processing; cryptography; electronic data interchange; image coding; visual databases; MD5 hashing; fingerprint generation; hash value database; matching algorithm; resultant hash value; sound file; sound wave; suspect file database; suspect picture files; Databases; Fingerprint recognition; Fourier transforms; Image color analysis; Robustness; Signal processing algorithms; Standards; Audio; Detection; Digital Forensics; Fingerprinting; Image; Sound Wave;
         
        
        
        
            Conference_Titel : 
Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on
         
        
            Conference_Location : 
Klaipeda City
         
        
            Print_ISBN : 
978-1-4673-1106-9
         
        
        
            DOI : 
10.1109/ICDIPC.2012.6257294