CFP last date
20 May 2024
Reseach Article

Image Cataloguing Tool using Descriptor for Forensic Application

by Shubhangi T Patil, Nikita A Chavan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 23
Year of Publication: 2013
Authors: Shubhangi T Patil, Nikita A Chavan
10.5120/11225-6423

Shubhangi T Patil, Nikita A Chavan . Image Cataloguing Tool using Descriptor for Forensic Application. International Journal of Computer Applications. 65, 23 ( March 2013), 25-29. DOI=10.5120/11225-6423

@article{ 10.5120/11225-6423,
author = { Shubhangi T Patil, Nikita A Chavan },
title = { Image Cataloguing Tool using Descriptor for Forensic Application },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 23 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number23/11225-6423/ },
doi = { 10.5120/11225-6423 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:20:40.130467+05:30
%A Shubhangi T Patil
%A Nikita A Chavan
%T Image Cataloguing Tool using Descriptor for Forensic Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 23
%P 25-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Child pornography is the fastest growing criminal activity in all over the world. This crime is regarded as being extremely harmful; its prosecution is of the highest priority for police forces and law enforcement organizations around the world. The law of possession and distribution of CP images not only applies to regular citizens, but also to police units that they not allowed to gather and catalogue evidence for future reference. To overcome from this problem, the paper presents a tool which is able to catalogue high- and low-level metadata of the evidence material and provides fast search to retrieve such evidence in suspect's system. It also provides the relation between the previous cases and current cases. That would be helpful to provide the protection to victims, capturing the offenders in effective manner and also reduce the tedious works of police units.

References
  1. Nadernejad E. Sharifazadesh S. Hassanpur H (2008) Edge detection techniques: evalution and compression. Appl Math Sci 2(2-31):1507-1520
  2. Rogers MK, Goldman J, Mislam R, Wedge T, Debrota s (2006) Computer forensic field triage process model In: Conference on digital forensics, security and law.
  3. Wong KM, Cheung KW, Po LM (2005) Mirror: and interactive content based image retrieval system In: ISCAS (2) IEEE, pp 1541-1544.
  4. Pham DT, Ghanbarzadeh A(2007) Multiobjective optimization using the Bees algorithm. In: Innovative production machines and systems virtual conference.
  5. Pham DT, Ghanbarzadeh A, Koc, E, Otri S, Rahim S, Zaidi M (2006) The Bees Algorithm—a novel tool for complex optimizationproblem. In: Proceeding of the 2nd international virtual conference on intelligent production machines and system (IPROMS 2006). Elsevier, Oxford, pp 454-459.
  6. AccessData: Forensic Toolkit (FTK) computer forensic software http:\accessdata. com/products/forensicinvestigation/ftk. Accessed 30 Sept 2011.
  7. Mohand-SaoEd Hacid. Cyril Decleir, and Jacques Kouloumdjian, A Databse Approach for Modeling and Querying Video Data IEEE Transaction on Knowledge And Data Engineering, Vol. 12, No. 5, September/October 2000 729.
  8. Eleuterio P, Polastro M (2010) Optimization of automatic nudity detection in high-resolution images with the use of NuDetective Forensic Tool. In: Proceeding of the fifth international conference on forensic computer science— ICoFCS 2010, Brasilia, Brazil.
  9. Osama A. Lotfallah, Martin Reisslein, and Sethuraman Panchanathan, Fellow, Adaptive Video Transmission Schemes Using MPEG-7 Motion Intensity Descriptor IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 8, August 2006 929.
  10. International Center for Missing and Exploited Children (2006) Child pornography: model legislation and global review, 6th edn. http://books. google. pl/books?id=8iqq OwAACAAJ. Accessed 30 Sept2011
  11. Stefan Berchtold, Daniel A. Keim, Indexing the Solution Space: A New Technique for Nearest Neighbor Search in High-Dimensional Space IEEE Transactions On Knowledge And Data Engineering, Vol. 12, No. 1, January/February 2000 45
  12. Ludtke A, Gottfried B, Herzog O, Ioannidis G, Leszczuk M, Simko V (2009) Accessing libraries of media art through metadata. In: International workshop on database and expert systems applications, pp 269273
  13. Javier Ruiz Hidalgo, and Philippe Salembier, On the Use of Indexing Metadata to Improve the Efficiency of Video Compression IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 3, March 2006
  14. Pardo A (2006) Probabilistic shot boundary detection using interframe histogram differences. In: CIARP'06: Proceedings of the 11th Iberoamerican conference on progress in pattern recognition, image analysis and applications. Springer-Verlag, Berlin, Heidelberg, pp 726–732. doi:10. 1007/11892755_75
  15. Manjunath BS, Salembier P, Sikora Th (2002) Introduction to MPEG-7 media content description interface. Wiley, Chichester
  16. Tanase-Avatavului, M. , 2005. Shape Decomposition and Retrieval. Doctoral Thesis, University of Utrecht. Available online: http://www. cs. uu. nl/groups/AA/multimedia/publications/pdf/mindshade. pdf [Accessed: June 24, 2005]
  17. Borland, J. , 2004. P2P Group Launches Site to Combat Child Porn. CNet News. com. Available online: http://news. com. com/P2P+group+launches+site+to+combat+child+porn/2100-1025_3-5488290. html [Accessed: June 24, 2005]
  18. Tand, C. , et al. , 2003. Peer-to-Peer Information Retrieval Using Self Organizing Semantic Overlay Networks. Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Karlsruhe, Germany, pp. 175-186.
  19. Wikipedia contributors, 2005. Winny. Wikipedia, The Free Encyclopedia. Available online: http://en. wikipedia. org/w/index. php?title=Winny&oldid=31980964 [Accessed: June 24, 2005]
  20. Ohzahata, S. et al. , 2005. A Traffic Identification Method and Evaluations for a Pure P2P Application. Proceedings of Passive & Active Networks Measurement Workshop, Boston, USA, pp. 55-68.
  21. Moore, A. W. and Papagiannaki, K. , 2005. Toward the accurate Identification of network applications," Proc. Passive & Active Networks Measurement Workshop, Boston, USA, 2005
Index Terms

Computer Science
Information Sciences

Keywords

Child pornography Forensic analysis MPEG-7 descriptor