Detecting and preventing the electronic transmission of illicit images
dc.contributor.advisor | Vargas Martin, Miguel | |
dc.contributor.author | Ibrahim, Amin Abdurahman | |
dc.date.accessioned | 2009-05-11T18:20:32Z | |
dc.date.accessioned | 2022-03-29T16:33:29Z | |
dc.date.available | 2009-05-11T18:20:32Z | |
dc.date.available | 2022-03-29T16:33:29Z | |
dc.date.issued | 2009-04-01 | |
dc.degree.discipline | Computer Engineering | |
dc.degree.level | Master of Applied Science (MASc) | |
dc.description.abstract | The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This work focuses on the current methods employed by criminals to generate and distribute child pornography, the methods used by law enforcement agencies to deter them, and the drawbacks of currently used methods, as well as the surrounding legal and privacy issues. A proven method to detect the transmission of illicit images at the network layer is presented within this paper. With this research, it is now possible to actively filter illicit pornographic images as they are transmitted over the network layer in real-time. It is shown that a Stochastic Learning Weak Estimator learning algorithm and a Maximum Likelihood Estimator learning algorithm can be applied against Linear Classifiers to identify and filter illicit pornographic images. In this thesis, these two learning algorithms were combined with algorithms such as the Non-negative Vector Similarity Coefficient-based Distance algorithm, Euclidian Distance, and Weighted Euclidian Distance. Based upon this research, a prototype was developed using the abovementioned system, capable of performing classification on both compressed and uncompressed images. Experimental results showed that classification accuracies and the overhead of network-based approaches did have a significant effect on routing devices. All images used in our experiments were legal. No actual child pornography images were ever collected, seen, sought, or used. | en |
dc.description.sponsorship | University of Ontario Institute of Technology | en |
dc.identifier.uri | https://hdl.handle.net/10155/23 | |
dc.language.iso | en | en |
dc.subject | Sexual exploitation - - Children | en |
dc.subject | Illicit images - - Network-based | en |
dc.subject | Stochastic Learning Weak Estimator learning algorithm | en |
dc.subject | Child pornography | en |
dc.subject | Maximum Likelihood Estimator learning algorithm | en |
dc.subject | Euclidian distance | en |
dc.subject | Coefficient-based distance algorithm | en |
dc.title | Detecting and preventing the electronic transmission of illicit images | en |
dc.type | Thesis | en |
thesis.degree.discipline | Computer Engineering | |
thesis.degree.grantor | University of Ontario Institute of Technology | |
thesis.degree.name | Master of Applied Science (MASc) |