A Photo Forensics-Based Prototype to Combat Revenge Porn

被引:9
|
作者
Mohanty, Manoranjan [1 ]
Zhang, Ming [2 ]
Russello, Giovanni [1 ]
机构
[1] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[2] Auckland Univ Technol, Sch Engn Comp & Math Sc, Auckland, New Zealand
关键词
Revenge Porn; Nudity Detection; Face Recognition; Robust Hashing;
D O I
10.1109/MIPR.2019.00009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of image- and video-sharing websites has increased revenge porn images. In this paper, we propose a photo forensic-based prototype to aid revenge porn victims to automatically retrieve offending images. Our prototype combines a deep learning-based nude detection filter with a face recognition filter to find if a nude image containing the victim's face is posted on targeted social media accounts. After finding revenge porn images from the targeted accounts, our prototype iteratively finds other accounts containing potential revenge porn images. Revenge porn images from these newly identified accounts are then filtered out. Experiment with 1254 images shows that our method can filter revenge porn images in 91% cases.
引用
收藏
页码:5 / 8
页数:4
相关论文
共 16 条
  • [1] Key Resource Forensics-Based Network Surveillance System Design and Implementation
    Lin, Qin-Ying
    Gui, Xiao-Lin
    Shi, De-Qin
    Wang, Xiao-Ping
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 351 - 356
  • [2] Analyzing Deviant Behaviors on Social Media using Cyber Forensics-based Methodologies
    Dalton, Brandon
    Agarwal, Nitin
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 378 - 379
  • [3] Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
    Dimitriadis, Athanasios
    Lontzetidis, Efstratios
    Kulvatunyou, Boonserm
    Ivezic, Nenad
    Gritzalis, Dimitris
    Mavridis, Ioannis
    [J]. IEEE ACCESS, 2023, 11 : 728 - 743
  • [4] Delivering (up) a copyright-based remedy for revenge porn
    Lee, Yin Harn
    [J]. JOURNAL OF INTELLECTUAL PROPERTY LAW & PRACTICE, 2019, 14 (02) : 99 - 111
  • [5] Memory Forensics-Based Malware Detection Using Computer Vision and Machine Learning
    Shah, Syed Shakir Hameed
    Ahmad, Abd Rahim
    Jamil, Norziana
    Khan, Atta Ur Rehman
    [J]. ELECTRONICS, 2022, 11 (16)
  • [6] Chemistry of crime: A forensics-based laboratory course for non-science majors.
    Theberge, SM
    King, DW
    Millard, JT
    Fekete, B
    Miller, L
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2000, 220 : U184 - U184
  • [7] Beyond 'Revenge Porn': The Continuum of Image-Based Sexual Abuse
    McGlynn, Clare
    Rackley, Erika
    Houghton, Ruth
    [J]. FEMINIST LEGAL STUDIES, 2017, 25 (01) : 25 - 46
  • [8] Beyond ‘Revenge Porn’: The Continuum of Image-Based Sexual Abuse
    Clare McGlynn
    Erika Rackley
    Ruth Houghton
    [J]. Feminist Legal Studies, 2017, 25 : 25 - 46
  • [9] The pathology of lethal exposure to the Riot Control Agents: Towards a forensics-based methodology for determining misuse
    Toprak, Sadik
    Ersoy, Gokhan
    Hart, John
    Clevestig, Peter
    [J]. JOURNAL OF FORENSIC AND LEGAL MEDICINE, 2015, 29 : 36 - 42
  • [10] Blockchain-based photo forensics with permissible transformations
    Zou, Renpeng
    Lv, Xixiang
    Wang, Baocang
    [J]. COMPUTERS & SECURITY, 2019, 87