Using Perceptual Hashing for Targeted Content Scanning
Titel Konferenzpublikation:
Advances in Digital Forensics XIX
Untertitel Konferenzpublikation:
19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers
Reihentitel:
IFIP Advances in Information and Communication Technology
Bandnummer Reihe:
687
Veranstalter (Körperschaft):
2023 IFIP International Federation for Information Processing
Konferenztitel:
Annual IFIP WG 11.9 International Conference on Digital Forensics (19., 2023, Arlington, Vir.)
Tagungsort:
Arlington, Virginia
Jahr der Konferenz:
2023
Datum Beginn der Konferenz:
30.01.2023
Datum Ende der Konferenz:
31.01.2023
Verlagsort:
Cham
Verlag:
Springer
Jahr:
2023
Seiten von - bis:
125-142
Sprache:
Englisch
Stichwörter:
Perceptual Hashing ; Targeted Content Scanning ; Child Sexual Abuse Material
Abstract:
The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often disseminated via end-to-end-encrypted channels. Such encryption defeats network- and server-based scanning measures used by law enforcement. A trade-off is to enable confidential communications channels for users and scanning opportunities for law enforcement by employing perceptual-hashing-based targeted content scanning on user devices. This has generated intense discussions between policymakers, privacy advocates and child protection organizations.
This chapter summarizes the current state of reserch in perceptual-hashing-based targeted content scanning with a focus on classical metrics such as false positives, false negatives and privacy aspects. Insights are provided into the most relevant perceptual hashing methods and an attack taxonomy for perceptual-hashing-based targeted content scanning is presented. The complexity in generating false negatives is evaluated and the feasibility of evading perceptual-hashing-based targeted content scanning is demonstrated. «
The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often disseminated via end-to-end-encrypted channels. Such encryption defeats network- and server-based scanning measures used by law enforcement. A trade-off is to enable confidential communications channels for users and scanning opportunities for law enforcement by employing perceptual-hashing-based targeted content scanning on user devices. This has generated... »