Skip to main content

A Study of Detecting Child Pornography on Smart Phone

  • Conference paper
  • First Online:
Book cover Advances in Network-Based Information Systems (NBiS 2017)

Abstract

Child Pornography is an increasingly visible rising cybercrime in the world today. Over the past decade, with rapid growth in smart phone usage, readily available free Cloud Computing storage, and various mobile communication apps, child pornographers have found a convenient and reliable mobile platform for instantly sharing pictures or videos of children being sexually abused. Within this new paradigm, law enforcement officers are finding that detecting, gathering, and processing evidence for the prosecution of child pornographers is becoming increasingly challenging. Deep learning is a machine learning method that models high-level abstractions in data and extracts hierarchical representations of data by using a deep graph with multiple processing layers. This paper presents a conceptual model of deep learning approach for detecting child pornography within the new paradigm by using log analysis, file name analysis and cell site analysis which investigate text logs of events that have happened in the smart phone at the scene of the crime using physical and logical acquisition to assists law enforcement officers in gathering and processing child pornography evidence for prosecution. In addition, this paper shows an illustrative example of logical and physical acquisition on smart phones using forensics tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schell, B.H., Martin, M.V., Hung, P.C.K., Rueda, L.: Cyber child pornography: a review paper of the social and legal issues and remedies. Aggression Violent Behav. 12(1), 45–63 (2007). Elsevier

    Article  Google Scholar 

  2. Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: The 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244–1248 (2014)

    Google Scholar 

  3. Moore, J., Baggili, I., Marrington, A., Rodrigues, A.: Preliminary forensic analysis of the Xbox One. Digit. Invest. 11, 57–65 (2014)

    Article  Google Scholar 

  4. Ho, A.T.S., Li, S.: A Machine learning-based approach to digital triage. In: Handbook of Digital Forensics of Multimedia Data and Devices, pp. 92–132 (2015)

    Google Scholar 

  5. Mutawa, N.A., Bryce, J., Franqueira, V.N.L., Marrington, A.: Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks. In: The 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 293–302 (2015)

    Google Scholar 

  6. Chen, L., Shashidhar, N., Rawat, D., Yang, M., Kadlec, C.: Investigating the security and digital forensics of video games and gaming systems: a study of PC games and PS4 console. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1–5 (2016)

    Google Scholar 

  7. Sae-Bae, N., Sun, X., Sencar, H.T., Memon, N.D.: Towards automatic detection of child pornography. In: The 2014 IEEE International Conference on Image Processing (ICIP), pp. 5332–5336 (2014)

    Google Scholar 

  8. Liu, Y., Li, X., Kong, A.W.K.: Speeding up the knowledge-based deblocking method for efficient forensic analysis. In: The 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), pp. 185–194 (2014)

    Google Scholar 

  9. Nurhudatiana, A., Kong, A.W.K.: On criminal identification in color skin images using skin marks (RPPVSM) and fusion with inferred vein patterns. IEEE Trans. Inf. Forensics Secur. 10(5), 916–931 (2015)

    Article  Google Scholar 

  10. Sharifzadeh, H.R., Zhang, H., Kong, A.W.K.: Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation. In: The 2014 22nd International Conference on Pattern Recognition (ICPR), pp. 160–165 (2014)

    Google Scholar 

  11. Su, H., Kong, A.W.-K.: A study on low resolution androgenic hair patterns for criminal and victim identification. IEEE Trans. Inf. Forensics Secur. 9(4), 666–680 (2014)

    Article  MathSciNet  Google Scholar 

  12. Liberatore, M., Levine, B.N., Shields, C., Lynn, B.: Efficient tagging of remote peers during child pornography investigations. IEEE Trans. Dependable Secure Comput. 11(5), 425–439 (2014)

    Article  Google Scholar 

  13. Zhang, H., Tang, C., Kong, A.W.K., Craft, N.: Matching vein patterns from color images for forensic investigation. In: The 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 77–84 (2012)

    Google Scholar 

  14. Polastro, M.d.C., Eleuterio, P.M.d.S.: A statistical approach for identifying videos of child pornography at crime scenes. In: The 2012 Seventh International Conference on Availability, Reliability and Security (ARES), pp. 604–612 (2012)

    Google Scholar 

  15. Allix, K., Jerome, Q., Bissyandé, T.F., Klein, J., State, R., Traon, Y.L.: A forensic analysis of android malware – how is malware written and how it could be detected? In: The 2014 IEEE 38th Annual Computer Software and Applications Conference (COMPSAC), pp. 384–393 (2014)

    Google Scholar 

  16. Schell, B., Martin, C.: Contemporary world Issues: Cybercrime. ABC-CLIO, Santa Barbara (2004)

    Google Scholar 

  17. Kherfi, M., Ziou, D., Bernardi, A.: Image retrieval from the world wide web: Issues, techniques, and systems. ACM Comput. Surv. (CSUR) 36, 35–67 (2004)

    Article  Google Scholar 

  18. Adrian, U., Stahl, A.: Automatic detection of child pornography using color visual words. In: The 2011 IEEE International Conference on Multimedia and Expo, pp. 1–6 (2011)

    Google Scholar 

  19. Castro, M.d., Silva Eleuterio, P.M.d.: NuDetective: a forensic tool to help combat child pornography through automatic nudity detection. In: The 2010 Workshops on Database and Expert Systems Applications, pp. 349–353 (2010)

    Google Scholar 

  20. Kiyohara, R., Matsumoto, M., Shimizu, N., Mii, S., Numao, M., Kurihara, S.: Context-aware middle ware for mobile phone based on operational logs. In: The International Conference on Consumer Electronics 2008 Digest of Technical Papers, pp. 1–2 (2008)

    Google Scholar 

  21. Ascione, P., Cinque, M., Cotroneo, D.: Automated logging of mobile phones failures data. In: The Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC 2006), 8 pages (2006)

    Google Scholar 

  22. Hasegawa, T., Koshino, M., Kimura, H.: Analysis of actual smartphone logs for predicting the user’s routine settings of application volume. In: The 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2654–2659 (2015)

    Google Scholar 

  23. Yamada, Y., Hirakawa, M.: A case study of analyzing logs of LMS in flipped classroom. In: The 2015 IIAI 4th International Congress on Advanced Applied Informatics (IIAI-AAI), pp. 374–378 (2015)

    Google Scholar 

  24. Jonathan, M.: A developer’s guide to audit logging. IEEE Secur. Priv. 13(3), 84–86 (2015)

    Article  Google Scholar 

  25. Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., Ray, I.: Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In: The 2013 IEEE Ninth World Congress on Services, pp. 75–83 (2013)

    Google Scholar 

  26. Huemer, D., Tjoa, A.M.: A stepwise approach towards an interoperable and flexible logging principle for audit trails. In: The 2010 Seventh International Conference on Information Technology: New Generations (ITNG), pp. 114–119 (2010)

    Google Scholar 

  27. Memisevic, R.: Deep learning: architectures, algorithms, applications. In: The 2015 IEEE Hot Chips 27 Symposium (HCS), pp. 1–127 (2015)

    Google Scholar 

  28. Chang, C.Y., Li, J.J.: Application of deep learning for recognizing infant cries. In: The 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp. 1–2 (2016)

    Google Scholar 

  29. Richard, W., Smallbone, S.: The problem of internet child pornography. Problem-Oriented Guides for Police, Problem-Specific Guides Series, No. 41 U.S. Department of Justice, Office of Community Oriented Policing Services, May 2006. https://www.justice.gov/criminal-ceos/child-pornography

  30. Ayers, R., Brothers, S., Jansen, W.: Guidelines on mobile device forensics. National Institute of Standards and Technology (NIST) Special Publication 800–101, Revision 1, May 2014. http://csrc.nist.gov/publications/PubsSPs.html#800-101

  31. WhatsApp Inc., WhatsApp Legal Info. WhatsApp.com, 2017. https://www.whatsapp.com/legal/#key-updates. Accessed 23 Mar 2017

  32. Dewangan, S.K., Pandey, S., Verma, T.: A distributed framework for event log analysis using MapReduce. In: The 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 503–506 (2016)

    Google Scholar 

  33. NowSecure, VTS for Android (2017). https://www.nowsecure.com/open-source/vts-for-android/

  34. TensorFlow (2017). https://www.tensorflow.org/

  35. RJR News, Police using WhatsApp to aid in catching child pornographers, 3 March 2017. http://rjrnewsonline.com/local/police-using-whatsapp-to-aid-in-catching-child-pornographers

  36. Deccan Chronicle, Techie posts child porn in WhatsApp group, 13 August 2015. http://www.deccanchronicle.com/150813/technology-latest/article/techie-posts-child-porn-whatsapp-group-held

  37. Daily Sun, Report Child Porn on WhatsApp! 24 February 2017. http://www.dailysun.co.za/Speakup/Letters/report-child-porn-on-whatsapp-20170223/comments

  38. Poulsen, K.: The FBI used the Web’s favorite hacking tool to unmask Tor user, 16 December 2014. https://www.wired.com/2014/12/fbi-metasploit-tor/

  39. Hurley, R., Prusty, S., Soroush, H., Walls, R.J., Albrecht, J., Cecchet, E., Levine, B.N., Liberatore, M., Lynn, B., Wolak, J.: Measurement and analysis of child pornography trafficking on P2P networks. In: The 22nd International Conference on World Wide Web (WWW 2013), pp. 631–642 (2013)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Research Office - Zayed University, Abu Dhabi, United Arab Emirates, under Research Incentive Funds# R16096, R15048 and Cluster Award project# R16083.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick C. K. Hung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Iqbal, F. et al. (2018). A Study of Detecting Child Pornography on Smart Phone. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65521-5_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65520-8

  • Online ISBN: 978-3-319-65521-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics