Abstract
Child Pornography is an increasingly visible rising cybercrime in the world today. Over the past decade, with rapid growth in smart phone usage, readily available free Cloud Computing storage, and various mobile communication apps, child pornographers have found a convenient and reliable mobile platform for instantly sharing pictures or videos of children being sexually abused. Within this new paradigm, law enforcement officers are finding that detecting, gathering, and processing evidence for the prosecution of child pornographers is becoming increasingly challenging. Deep learning is a machine learning method that models high-level abstractions in data and extracts hierarchical representations of data by using a deep graph with multiple processing layers. This paper presents a conceptual model of deep learning approach for detecting child pornography within the new paradigm by using log analysis, file name analysis and cell site analysis which investigate text logs of events that have happened in the smart phone at the scene of the crime using physical and logical acquisition to assists law enforcement officers in gathering and processing child pornography evidence for prosecution. In addition, this paper shows an illustrative example of logical and physical acquisition on smart phones using forensics tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schell, B.H., Martin, M.V., Hung, P.C.K., Rueda, L.: Cyber child pornography: a review paper of the social and legal issues and remedies. Aggression Violent Behav. 12(1), 45–63 (2007). Elsevier
Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: The 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)
Moore, J., Baggili, I., Marrington, A., Rodrigues, A.: Preliminary forensic analysis of the Xbox One. Digit. Invest. 11, 57–65 (2014)
Ho, A.T.S., Li, S.: A Machine learning-based approach to digital triage. In: Handbook of Digital Forensics of Multimedia Data and Devices, pp. 92–132 (2015)
Mutawa, N.A., Bryce, J., Franqueira, V.N.L., Marrington, A.: Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks. In: The 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 293–302 (2015)
Chen, L., Shashidhar, N., Rawat, D., Yang, M., Kadlec, C.: Investigating the security and digital forensics of video games and gaming systems: a study of PC games and PS4 console. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1–5 (2016)
Sae-Bae, N., Sun, X., Sencar, H.T., Memon, N.D.: Towards automatic detection of child pornography. In: The 2014 IEEE International Conference on Image Processing (ICIP), pp. 5332–5336 (2014)
Liu, Y., Li, X., Kong, A.W.K.: Speeding up the knowledge-based deblocking method for efficient forensic analysis. In: The 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 185–194 (2014)
Nurhudatiana, A., Kong, A.W.K.: On criminal identification in color skin images using skin marks (RPPVSM) and fusion with inferred vein patterns. IEEE Trans. Inf. Forensics Secur. 10(5), 916–931 (2015)
Sharifzadeh, H.R., Zhang, H., Kong, A.W.K.: Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation. In: The 2014 22nd International Conference on Pattern Recognition (ICPR), pp. 160–165 (2014)
Su, H., Kong, A.W.-K.: A study on low resolution androgenic hair patterns for criminal and victim identification. IEEE Trans. Inf. Forensics Secur. 9(4), 666–680 (2014)
Liberatore, M., Levine, B.N., Shields, C., Lynn, B.: Efficient tagging of remote peers during child pornography investigations. IEEE Trans. Dependable Secure Comput. 11(5), 425–439 (2014)
Zhang, H., Tang, C., Kong, A.W.K., Craft, N.: Matching vein patterns from color images for forensic investigation. In: The 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 77–84 (2012)
Polastro, M.d.C., Eleuterio, P.M.d.S.: A statistical approach for identifying videos of child pornography at crime scenes. In: The 2012 Seventh International Conference on Availability, Reliability and Security (ARES), pp. 604–612 (2012)
Allix, K., Jerome, Q., Bissyandé, T.F., Klein, J., State, R., Traon, Y.L.: A forensic analysis of android malware – how is malware written and how it could be detected? In: The 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC), pp. 384–393 (2014)
Schell, B., Martin, C.: Contemporary world Issues: Cybercrime. ABC-CLIO, Santa Barbara (2004)
Kherfi, M., Ziou, D., Bernardi, A.: Image retrieval from the world wide web: Issues, techniques, and systems. ACM Comput. Surv. (CSUR) 36, 35–67 (2004)
Adrian, U., Stahl, A.: Automatic detection of child pornography using color visual words. In: The 2011 IEEE International Conference on Multimedia and Expo, pp. 1–6 (2011)
Castro, M.d., Silva Eleuterio, P.M.d.: NuDetective: a forensic tool to help combat child pornography through automatic nudity detection. In: The 2010 Workshops on Database and Expert Systems Applications, pp. 349–353 (2010)
Kiyohara, R., Matsumoto, M., Shimizu, N., Mii, S., Numao, M., Kurihara, S.: Context-aware middle ware for mobile phone based on operational logs. In: The International Conference on Consumer Electronics 2008 Digest of Technical Papers, pp. 1–2 (2008)
Ascione, P., Cinque, M., Cotroneo, D.: Automated logging of mobile phones failures data. In: The Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC 2006), 8 pages (2006)
Hasegawa, T., Koshino, M., Kimura, H.: Analysis of actual smartphone logs for predicting the user’s routine settings of application volume. In: The 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2654–2659 (2015)
Yamada, Y., Hirakawa, M.: A case study of analyzing logs of LMS in flipped classroom. In: The 2015 IIAI 4th International Congress on Advanced Applied Informatics (IIAI-AAI), pp. 374–378 (2015)
Jonathan, M.: A developer’s guide to audit logging. IEEE Secur. Priv. 13(3), 84–86 (2015)
Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., Ray, I.: Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In: The 2013 IEEE Ninth World Congress on Services, pp. 75–83 (2013)
Huemer, D., Tjoa, A.M.: A stepwise approach towards an interoperable and flexible logging principle for audit trails. In: The 2010 Seventh International Conference on Information Technology: New Generations (ITNG), pp. 114–119 (2010)
Memisevic, R.: Deep learning: architectures, algorithms, applications. In: The 2015 IEEE Hot Chips 27 Symposium (HCS), pp. 1–127 (2015)
Chang, C.Y., Li, J.J.: Application of deep learning for recognizing infant cries. In: The 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp. 1–2 (2016)
Richard, W., Smallbone, S.: The problem of internet child pornography. Problem-Oriented Guides for Police, Problem-Specific Guides Series, No. 41 U.S. Department of Justice, Office of Community Oriented Policing Services, May 2006. https://www.justice.gov/criminal-ceos/child-pornography
Ayers, R., Brothers, S., Jansen, W.: Guidelines on mobile device forensics. National Institute of Standards and Technology (NIST) Special Publication 800–101, Revision 1, May 2014. http://csrc.nist.gov/publications/PubsSPs.html#800-101
WhatsApp Inc., WhatsApp Legal Info. WhatsApp.com, 2017. https://www.whatsapp.com/legal/#key-updates. Accessed 23 Mar 2017
Dewangan, S.K., Pandey, S., Verma, T.: A distributed framework for event log analysis using MapReduce. In: The 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 503–506 (2016)
NowSecure, VTS for Android (2017). https://www.nowsecure.com/open-source/vts-for-android/
TensorFlow (2017). https://www.tensorflow.org/
RJR News, Police using WhatsApp to aid in catching child pornographers, 3 March 2017. http://rjrnewsonline.com/local/police-using-whatsapp-to-aid-in-catching-child-pornographers
Deccan Chronicle, Techie posts child porn in WhatsApp group, 13 August 2015. http://www.deccanchronicle.com/150813/technology-latest/article/techie-posts-child-porn-whatsapp-group-held
Daily Sun, Report Child Porn on WhatsApp! 24 February 2017. http://www.dailysun.co.za/Speakup/Letters/report-child-porn-on-whatsapp-20170223/comments
Poulsen, K.: The FBI used the Web’s favorite hacking tool to unmask Tor user, 16 December 2014. https://www.wired.com/2014/12/fbi-metasploit-tor/
Hurley, R., Prusty, S., Soroush, H., Walls, R.J., Albrecht, J., Cecchet, E., Levine, B.N., Liberatore, M., Lynn, B., Wolak, J.: Measurement and analysis of child pornography trafficking on P2P networks. In: The 22nd International Conference on World Wide Web (WWW 2013), pp. 631–642 (2013)
Acknowledgement
This work was supported by the Research Office - Zayed University, Abu Dhabi, United Arab Emirates, under Research Incentive Funds# R16096, R15048 and Cluster Award project# R16083.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Iqbal, F. et al. (2018). A Study of Detecting Child Pornography on Smart Phone. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-65521-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65520-8
Online ISBN: 978-3-319-65521-5
eBook Packages: EngineeringEngineering (R0)