Digital evidence collection for web image access
ABSTRACT As the volume of multimedia data exchanged over the Internet continues to grow, the problem of preventing the unauthorized duplication of copyright‐protected images or the dissemination of undesirable material such as pornographic pictures has become increasingly important. The majority of...
Saved in:
Published in | Security and communication networks Vol. 6; no. 6; pp. 765 - 776 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
London
Blackwell Publishing Ltd
01.06.2013
Hindawi Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | ABSTRACT
As the volume of multimedia data exchanged over the Internet continues to grow, the problem of preventing the unauthorized duplication of copyright‐protected images or the dissemination of undesirable material such as pornographic pictures has become increasingly important. The majority of the images circulated over the Internet are coded in the JPEG format. Thus, the present study proposes a novel digital feature retrieval scheme designed to detect unlawful dissemination of pre‐selected JPEG images. In the proposed approach, the packet‐level features of the target JPEG image are collected in advance and are stored in a feature database. Thereafter, the features of all the packets passing through a nominated router are compared on‐the‐fly with those in the feature database in order to detect any transmissions of the target images. The experimental results show that the proposed packet‐level forensic scheme is far more efficient than existing application‐level schemes. As a result, the proposed scheme provides a viable solution for the background monitoring of JPEG streams over large‐scale network environments such as the Internet in order to detect unlawful transmissions and to compile digital evidence of such transmissions for possible future legal proceedings. Copyright © 2012 John Wiley & Sons, Ltd.
The study proposes a novel digital feature retrieval scheme designed to detect unlawful dissemination of preselected JPEG images. The packet‐level features of the target JPEG image are collected and are stored in a feature database. The features of all the packets passing through a nominated router are compared on‐the‐fly with those in the feature database to detect any transmissions of the target images. The experimental results show that our scheme is far more efficient than existing application‐level schemes. |
---|---|
Bibliography: | istex:C1B4CAB46AD35DA6A905A00E379F628339EC7107 ark:/67375/WNG-MGS3JQ54-Q ArticleID:SEC610 ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 1939-0114 1939-0122 |
DOI: | 10.1002/sec.610 |