Tool makes scanning the internet for illegal images possible

Mar 25, 2014 by Kim Bekmann

Researchers at the University of Twente have developed a system that makes it possible to scan traffic on the Internet for illegal photographs. The system can, for example, help trace child pornography on the Internet without infringing on the privacy of Internet users. Internet service providers could use the tool to keep their network 'clean'.

The police use a standard database to detect illegal photographs, like child pornography, on equipment they seize, such as computers or USB sticks. For security reasons, the database cannot be used to scan networks such as the Internet. Were the database to end up in criminal hands, criminals could use it to make their own illegal photographs untraceable. With the system of the University of Twente, the police database can, from now on, be used to scan a network as well. This makes it possible to search for illegal photographs without the risk of the database ending up in wrong hands. Another advantage of this system is that the police can only see the number of illegal photographs to be found on the Internet; they cannot see the actual photographs. Therefore, the privacy of the owner of the photographs remains safeguarded. Despite the technical possibilities of the system, it is not yet clear what the consequences are in terms of current Dutch legislation. The researchers still want this verified from a legal point of view.

Hash values

The standard police database does not contain any truly illegal photographs but only features of these photographs expressed in numbers (hash values). When the police seize equipment, such as a PC, the database is brought into action to compare the known hash values with those of the photographs on the PC. In this way, the police are able to verify whether the equipment contains any illegal photographs. The new system is a special encryption of the police database. Researcher Andreas Peter says: "You can compare it with a sort of safe, the contents of which you cannot see but in which you can place photographs. Subsequently, it is the 'safe' alone that scans the photographs and then sends a confidential report to the police. The police can open this report with a special key. The report indicates how many illegal photographs are in the safe."

With this new system, Internet service providers can also use the police database to scan their network for illegal . At this time, the University of Twente is consulting with companies that are interested in starting to work with the system. A scientific article about the prototype will soon be published during ICASSP 2014, an international conference on signal processing.

Explore further: Solid data to ensue from citizen app platform

add to favorites email to friend print save as pdf

Related Stories

Ark. police photograph license plates, store data

Mar 02, 2013

(AP)—Little Rock may not be a likely terrorism target or a gang crime hotspot, but the Arkansas capital is following the example of high-security cities by expanding electronic surveillance of its streets.

Facial recognition in use after riots

Aug 11, 2011

(AP) -- Facial recognition technology being considered for London's 2012 Games is getting a workout in the wake of Britain's riots, a law enforcement official told The Associated Press on Thursday, with officers ...

Solid data to ensue from citizen app platform

Dec 04, 2013

The burgeoning 'citizen science' movement could be enlisted to survey wildlife right around the world, thanks to a new app designed by a team at Murdoch University.

Recommended for you

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

Nov 21, 2014

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

( —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

Converting data into knowledge

Nov 17, 2014

When a movie-streaming service recommends a new film you might like, sometimes that recommendation becomes a new favorite; other times, the computer's suggestion really misses the mark. Yisong Yue, assistant ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Mar 25, 2014
Catch the people that are harmful.
not rated yet Mar 25, 2014
There are other very useful applications for this technology:
- Image deduplication for online services that want to efficiently use their storage capabilities.
- Image hosting sites can scan images to combat copycats without attribution or other copyright infringement.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.