Using Perceptual Hashing for Targeted Content Scanning
Title of conference publication:
Advances in Digital Forensics XIX
Subtitle of conference publication:
19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers
Series title:
IFIP Advances in Information and Communication Technology
Series volume:
687
Organizer (entity):
2023 IFIP International Federation for Information Processing
Conference title:
Annual IFIP WG 11.9 International Conference on Digital Forensics (19., 2023, Arlington, Vir.)
Venue:
Arlington, Virginia
Year of conference:
2023
Date of conference beginning:
30.01.2023
Date of conference ending:
31.01.2023
Place of publication:
Cham
Publisher:
Springer
Year:
2023
Pages from - to:
125-142
Language:
Englisch
Keywords:
Perceptual Hashing ; Targeted Content Scanning ; Child Sexual Abuse Material
Abstract:
The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often disseminated via end-to-end-encrypted channels. Such encryption defeats network- and server-based scanning measures used by law enforcement. A trade-off is to enable confidential communications channels for users and scanning opportunities for law enforcement by employing perceptual-hashing-based targeted content scanning on user devices. This has generated intense discussions between policymakers, privacy advocates and child protection organizations.
This chapter summarizes the current state of reserch in perceptual-hashing-based targeted content scanning with a focus on classical metrics such as false positives, false negatives and privacy aspects. Insights are provided into the most relevant perceptual hashing methods and an attack taxonomy for perceptual-hashing-based targeted content scanning is presented. The complexity in generating false negatives is evaluated and the feasibility of evading perceptual-hashing-based targeted content scanning is demonstrated. «
The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often disseminated via end-to-end-encrypted channels. Such encryption defeats network- and server-based scanning measures used by law enforcement. A trade-off is to enable confidential communications channels for users and scanning opportunities for law enforcement by employing perceptual-hashing-based targeted content scanning on user devices. This has generated... »