PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework

被引:1
作者
McKeown, Sean [1 ]
Aaby, Peter [1 ]
Steyven, Andreas [1 ]
机构
[1] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, Edinburgh, Midlothian, Scotland
来源
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | 2024年 / 48卷
关键词
Evaluation framework; Perceptual hashing; Hashing; Content matching; Image forensics; TOOL;
D O I
10.1016/j.fsidi.2023.301680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similarity algorithms often have weaknesses and anomalous edge cases that may not be clearly documented. Additionally, it is a complex task to perform an evaluation of such tools in order to best utilise them. To address this, we present PHASER, a still-image perceptual hashing framework enabling forensics specialists and scientists to conduct experiments on bespoke datasets for their individual deployment scenarios. The framework utilises a modular approach, allowing users to specify and define a perceptual hash/image transform/distance metric triplet, which can be explored to better understand their behaviour and interactions. PHASER is open-source and we demonstrate its utility via case studies which briefly explore setting an appropriate dataset size and the potential to optimise the performance of existing algorithms by utilising learned weight vectors for comparing hashes.
引用
收藏
页数:8
相关论文
共 41 条
  • [1] Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms
    Alkhowaiter, Mohammed
    Almubarak, Khalid
    Zou, Cliff
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 149 - 156
  • [2] Apple, 2022, Csam Detection Technical Summary
  • [3] Athalye A., 2021, inverting PhotoDNA
  • [4] Beebe N., 2005, International Federation for Information Processing, V2005, P3, DOI DOI 10.1007/0-387-31163-7_1
  • [5] Towards a Process Model for Hash Functions in Digital Forensics
    Breitinger, Frank
    Liu, Huajian
    Winter, Christian
    Baier, Harald
    Rybalchenko, Alexey
    Steinebach, Martin
    [J]. DIGITAL FORENSICS AND CYBER CRIME, (ICDF2C 2013), 2014, 132 : 170 - 186
  • [6] FRASH: A framework to test algorithms of similarity hashing
    Breitinger, Frank
    Stivaktakis, Georgios
    Baier, Harald
    [J]. DIGITAL INVESTIGATION, 2013, 10 : S50 - S58
  • [7] Buchner J., Image hash
  • [8] Rethinking the Detection of Child Sexual Abuse Imagery on the Internet
    Bursztein, Elie
    Bright, Travis
    Clarke, Einat
    DeLaune, Michelle
    Eliff, David M.
    Hsu, Nick
    Olson, Lindsey
    Shehan, John
    Thakur, Madhukar
    Thomas, Kurt
    [J]. WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 2601 - 2607
  • [9] The chequered past and risky future of digital forensics
    Casey, Eoghan
    [J]. AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2019, 51 (06) : 649 - 664
  • [10] Drmic A, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P995, DOI 10.23919/MIPRO.2017.7973569