EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


24732 SOFIR: Securely Outsourced Forensic Image Recognition
Home Policy Brochure Browse Search User Area Contact Help

Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4

Full text available as:

PDF

337 Kb
Open Access



Official URL: http://dx.doi.org/10.1109/ICASSP.2014.6854089

Exported to Metis

Abstract

Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash values of known illegal images. To detect and mitigate the distribution of illegal images, for instance in network traffic of companies or Internet service providers, it is desirable to outsource the recognition of illegal images to these companies. However, law enforcement agencies want to keep their hash databases secret at all costs as an unwanted release may result in misuse which could ultimately render these databases useless.
We present SOFIR, a tool for the Secure Outsourcing of Forensic Image Recognition allowing companies and law enforcement agencies to jointly detect illegal network traffic at its source, thus facilitating immediate regulatory actions. SOFIR cryptographically hides the hash database from the involved companies. At fixed intervals, SOFIR sends out an encrypted report to the law enforcement agency that only contains the number of found illegal images in the given interval, while otherwise keeping the company’s legal network traffic private. Our experimental results show the effectiveness and practicality of our approach in the real-world.

Item Type:Conference or Workshop Paper (Full Paper, Poster)
Research Group:EWI-DB: Databases, EWI-SCS: Services, Cyber security and Safety
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:SPCMHD: Secure Patient-Centric Management of Health Data
Uncontrolled Keywords:Forensics, law enforcement, network monitoring, somewhat homomorphic encryption.
ID Code:24732
Status:Published
Deposited On:21 May 2014
Refereed:Yes
International:Yes
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item