Swearingen, Thomas https://www.aic.gov.au/ en Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos https://www.aic.gov.au/publications/tandi/tandi648 <span>Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos</span> <span><span lang="" about="/user/72" typeof="schema:Person" property="schema:name" datatype="">Yvette Maconachie</span></span> <span>Fri, 2022-03-18 15:11</span> <div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field--item"> <img src="/sites/default/files/styles/max_250_width/public/2022-03/electronic_fingerprint_CY2049724829.jpg?itok=zCrVZKQL" width="250" height="167" alt="Computer screen with electronic fingerprint" loading="lazy" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-field-embed-youtube field--type-text field--label-hidden field--item"> </div> <div class="field field--name-field-author field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/author/westlake-bryce" hreflang="en">Westlake, Bryce</a></div> <div class="field--item"><a href="/author/brewer-russell" hreflang="en">Brewer, Russell</a></div> <div class="field--item"><a href="/author/swearingen-thomas" hreflang="en">Swearingen, Thomas</a></div> <div class="field--item"><a href="/author/ross-arun" hreflang="en">Ross, Arun</a></div> <div class="field--item"><a href="/author/patterson-stephen" hreflang="en">Patterson, Stephen</a></div> <div class="field--item"><a href="/author/michalski-dana" hreflang="en">Michalski, Dana</a></div> <div class="field--item"><a href="/author/hole-martyn" hreflang="en">Hole, Martyn</a></div> <div class="field--item"><a href="/author/logos-katie" hreflang="en">Logos, Katie</a></div> <div class="field--item"><a href="/author/frank-richard" hreflang="en">Frank, Richard</a></div> <div class="field--item"><a href="/author/bright-david" hreflang="en">Bright, David</a></div> <div class="field--item"><a href="/author/afana-erin" hreflang="en">Afana, Erin</a></div> </div> <div class="field field--name-field-issn field--type-string field--label-inline"> <div class="field--label">ISSN</div> <div class="field--items"> <div class="field--item">1836-2206</div> </div> </div> <div class="field field--name-field-isbn field--type-string field--label-inline"> <div class="field--label">ISBN</div> <div class="field--item">9781922478566</div> </div> <div class="field field--name-field-published-date field--type-datetime field--label-inline"> <div class="field--label">Published Date</div> <div class="field--item"><time datetime="2022-03-22T12:00:00Z">22-03-2022</time> </div> </div> <div class="field field--name-field-subject field--type-entity-reference field--label-inline"> <div class="field--label">Subject</div> <div class="field--items"> <div class="field--item"><a href="/subject/child-sexual-exploitation-material" hreflang="en">Child sexual exploitation material</a></div> <div class="field--item"><a href="/subject/victims" hreflang="und">Victims</a></div> <div class="field--item"><a href="/subject/child-sex-offenders" hreflang="und">Child sex offenders</a></div> <div class="field--item"><a href="/subject/technology" hreflang="und">Technology</a></div> <div class="field--item"><a href="/subject/investigations" hreflang="und">Investigations</a></div> <div class="field--item"><a href="/subject/peer-reviewed" hreflang="und">Peer-reviewed</a></div> </div> </div> <div class="field field--name-field-series field--type-entity-reference field--label-inline"> <div class="field--label">Series</div> <div class="field--item">Trends &amp; issues in crime and criminal justice</div> </div> <div class="field field--name-field-series-num field--type-integer field--label-hidden field--item">648</div> <div class="field field--name-field-abstract field--type-text-long field--label-above"> <div class="field--label">Abstract</div> <div class="field--item"><p>The proliferation of child sexual abuse material (CSAM) is outpacing law enforcement’s ability to address the problem. In response, investigators are increasingly integrating automated software tools into their investigations. These tools can detect or locate files containing CSAM, and extract information contained within these files to identify both victims and offenders.</p> <p>Software tools using biometric systems have shown promise in this area but are limited in their utility due to a reliance on a single biometric cue (namely, the face). This research seeks to improve current investigative practices by developing a software prototype that uses both faces and voices to match victims and offenders across CSAM videos. This paper describes the development of this prototype and the results of a performance test conducted on a database of CSAM. Future directions for this research are also discussed.</p> </div> </div> <div class="accordion-group"> <h2 class="accordion-button">References</h2> <div class="field field--name-field-reference-lists field--type-text-long field--label-hidden field--item accordion-container"><p><span><span><span><em><span>URLs correct as at February 2022</span></em></span></span></span></p> <p><span><span><span>Bourke ML &amp; Craun SW 2014. Secondary traumatic stress among Internet Crimes Against Children Task Force personnel. <em><span>Sexual Abuse: A Journal of Research and Treatment</span></em> 26(6): 586–609. <a href="https://doi.org/10.1177/1079063213509411" rel="nofollow">https://doi.org/10.1177/1079063213509411</a></span></span></span></p> <p><span><span><span>Brewer R, Westlake B, Hart T &amp; Arauza O 2021. The ethics of web crawling and web scraping in criminological research: Navigating issues of consent, privacy and other potential harms associated with automated data collection. In A Lavorgna &amp; T Holt (eds), <em><span>Researching cybercrimes</span></em>. Cham: Palgrave: 435–456. <a href="https://doi.org/10.1007/978-3-030-74837-1_22" rel="nofollow">https://doi.org/10.1007/978-3-030-74837-1_22</a></span></span></span></p> <p><span><span><span>Brown R, Napier S &amp; Smith RG 2020. Australians who view live streaming of child sexual abuse: An analysis of financial transactions. <em><span>Trends &amp; issues in crime and criminal justice</span></em> no. 589. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti04336" rel="nofollow">https://doi.org/10.52922/ti04336</a></span></span></span></p> <p><span><span><span>Burns CM, Morley J, Bradshaw R &amp; Domene J 2008. The emotional impact on coping strategies employed by police teams investigating internet child exploitation. <em><span>Traumatology</span></em> 14(2): 20–31. <a href="https://doi.org/10.1177/1534765608319082" rel="nofollow">https://doi.org/10.1177/1534765608319082</a></span></span></span></p> <p><span><span><span>Bursztein E, Clarke E, DeLaune M, Elifff DM, Hsu N, Olson L, Shehan J, Thakur M, Thomas K &amp; Bright T 2019. <em><span>Rethinking the detection of child sexual abuse imagery on the internet</span></em>. World Wide Web Conference, 13 May, pp 2601–2607. <a href="https://doi.org/10.1145/3308558.3313482" rel="nofollow">https://doi.org/10.1145/3308558.3313482</a></span></span></span></p> <p><span><span><span>Canadian Centre for Child Protection 2021. Project Arachnid. <a href="https://projectarachnid.ca/en/" rel="nofollow">https://projectarachnid.ca/en/</a></span></span></span></p> <p><span><span><span>Chowdhury A, Atoum Y, Truan L, Liu X &amp; Ross A 2018. <em><span>MSU-AVIS dataset: Fusing face and voice modalities for biometric recognition in indoor surveillance videos</span></em>. Proceedings of the 24th IAPR International Conference on Pattern Recognition (ICPR), Beijing, pp 3567–3573. <a href="https://doi.org/10.1109/ICPR.2018.8545260" rel="nofollow">https://doi.org/10.1109/ICPR.2018.8545260</a></span></span></span></p> <p><span><span><span>Chowdhury A, Cozzo A &amp; Ross A 2020. <em><span>JukeBox: A multilingual singer recognition dataset</span></em>. Proceedings of Interspeech Conference 2020, Shanghai, China. <a href="https://doi.org/10.21437/Interspeech.2020-2972" rel="nofollow">https://doi.org/10.21437/Interspeech.2020-2972</a></span></span></span></p> <p><span><span><span>Chowdhury A &amp; Ross A 2020. Fusing MFCC and LPC features using 1D Triplet CNN for speaker recognition in severely degraded audio signals. <em><span>IEEE Transactions on Information Forensics and Security</span></em> 15: 1616–1629. <a href="https://doi.org/10.1109/TIFS.2019.2941773" rel="nofollow">https://doi.org/10.1109/TIFS.2019.2941773</a></span></span></span></p> <p><span><span><span>Chung JS, Nagrani A &amp; Zisserman A 2018. VoxCeleb2: <em><span>Deep speaker recognition</span></em>. Proceedings of Interspeech Conference 2018. <a href="https://doi.org/10.21437/Interspeech.2018-1929" rel="nofollow">https://doi.org/10.21437/Interspeech.2018-1929</a></span></span></span></p> <p><span><span><span>Council of Europe 2021. <em><span>Automated detection of child sexual abuse materials</span></em>. Octopus Conference 2021. <a href="https://www.coe.int/en/web/cybercrime/workshop-automated-detection-of-child-sexual-abuse-materials" rel="nofollow">https://www.coe.int/en/web/cybercrime/workshop-automated-detection-of-child-sexual-abuse-materials</a></span></span></span></p> <p><span><span><span>Cubitt T, Napier S &amp; Brown R 2021. Predicting prolific live streaming of child sexual abuse. <em><span>Trends &amp; issues in crime and criminal justice</span></em> no. 634. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti78320" rel="nofollow">https://doi.org/10.52922/ti78320</a></span></span></span></p> <p><span><span><span>Dance GJX &amp; Keller MH 2020. Tech companies detect a surge in online videos of child sexual abuse. <em><span>New York Times</span></em>, 20 February. <a href="https://www.nytimes.com/2020/02/07/us/online-child-sexual-abuse.html" rel="nofollow">https://www.nytimes.com/2020/02/07/us/online-child-sexual-abuse.html</a></span></span></span></p> <p><span><span><span>de Castro Polastro M &amp; da Silva Eleuterio PM 2010. <em><span>NuDetective: A forensic tool to help combat child pornography through automatic nudity detection</span></em>. 2010 Workshops on Database and Expert Systems Applications, pp 349–353. <a href="https://doi.org/10.1109/DEXA.2010.74" rel="nofollow">https://doi.org/10.1109/DEXA.2010.74</a></span></span></span></p> <p><span><span><span>Foley J, Louise K &amp; Massey D 2020. The ‘cost’ of caring in policing: From burnout to PTSD in police officers in England and Wales. <em><span>The Police Journal: Theory, Practice, and Principles</span></em> 94(3): 298–315. <a href="https://doi.org/10.1177/0032258X20917442" rel="nofollow">https://doi.org/10.1177/0032258X20917442</a></span></span></span></p> <p><span><span><span>Gangwar A, González-Castro V, Alegre E &amp; Fidalgo E 2021. AttM-CNN: Attention and metric learning based CNN for pornography, age and child sexual abuse (CSA) detection in images. <em><span>Neurocomputing</span></em> 445: 81–104. <a href="https://doi.org/10.1016/j.neucom.2021.02.056" rel="nofollow">https://doi.org/10.1016/j.neucom.2021.02.056</a></span></span></span></p> <p><span><span><span>Hernandez-Ortega J, Galbally J, Fierrez J, Haraksim R &amp; Beslay L 2019. <em><span>FaceQnet: Quality assessment for face recognition based on deep learning</span></em>. Proceedings of the 12th International Conference on Biometrics, Crete. <a href="https://doi.org/10.1109/ICB45273.2019.8987255" rel="nofollow">https://doi.org/10.1109/ICB45273.2019.8987255</a></span></span></span></p> <p><span><span><span>Huang GB, Mattar M, Berg T &amp; Learned-Miller E 2008. <em><span>Labeled Faces in the Wild: A database for studying face recognition in unconstrained environments</span></em>. Workshop on Faces in ‘Real-Life’ Images: Detection, Alignment, and Recognition. <a href="https://hal.inria.fr/inria-00321923" rel="nofollow">https://hal.inria.fr/inria-00321923</a></span></span></span></p> <p><span><span><span>Internet Watch Foundation 2021. The annual report 2020. <a href="https://annualreport2020.iwf.org.uk/" rel="nofollow">https://annualreport2020.iwf.org.uk/</a></span></span></span></p> <p><span><span><span>Interpol 2022. Victim identification. <a href="https://www.interpol.int/en/Crimes/Crimes-against-children/Victim-identification" rel="nofollow">https://www.interpol.int/en/Crimes/Crimes-against-children/Victim-identification</a></span></span></span></p> <p><span><span><span>Interpol 2018<em><span>. Towards a global indicator on unidentified victims in child sexual exploitation material: Technical report</span></em>. <a href="https://ecpat.org/resource/technical-report-towards-a-global-indicator-on-unidentified-victims-in-child-sexual-exploitation-material/" rel="nofollow">https://ecpat.org/resource/technical-report-towards-a-global-indicator-on-unidentified-victims-in-child-sexual-exploitation-material/</a></span></span></span></p> <p><span><span><span>Islam M, Watters PA &amp; Yearwood J 2011. Real-time detection of children’s skin on social networking sites using markov random field modelling. <em><span>Information Security Technical Report</span></em> 16(2): 51–81. <a href="https://doi.org/10.1016/j.istr.2011.09.004" rel="nofollow">https://doi.org/10.1016/j.istr.2011.09.004</a></span></span></span></p> <p><span><span><span>Islam M, Watters P, Mahmood AN &amp; Alazab M 2019. Toward detection of child exploitation material: A forensic approach. In M Alazab &amp; M Tang (eds), <em><span>Deep learning applications for cyber security</span></em>. Cham: Springer: 221–246. <a href="https://doi.org/10.1007/978-3-030-13057-2_11" rel="nofollow">https://doi.org/10.1007/978-3-030-13057-2_11</a></span></span></span></p> <p><span><span><span>Jain AK, Klare B &amp; Ross A 2015. <em><span>Guidelines for best practices in biometric research</span></em>. Proceedings of the 8th IAPR International Conference on Biometrics (ICB), Phuket, Thailand, pp 541–545. <a href="https://doi.org/10.1109/ICB.2015.7139116" rel="nofollow">https://doi.org/10.1109/ICB.2015.7139116</a></span></span></span></p> <p><span><span><span>Macedo J, Costa F &amp; dos Santos JA 2018. <em><span>A benchmark methodology for child pornography detection</span></em>. 2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), Paraná, Brazil, pp 455–462. <a href="https://doi.org/10.1109/SIBGRAPI.2018.00065" rel="nofollow">https://doi.org/10.1109/SIBGRAPI.2018.00065</a></span></span></span></p> <p><span><span><span>Maxim D, Orlando S, Skinner K &amp; Broadhurst R 2016. <em><span>Online child exploitation material: Trends and emerging issues</span></em>. Canberra: Australian National University Cybercrime Observatory and Office of the Children’s eSafety Commissioner. <a href="https://doi.org/10.2139/ssrn.2861644" rel="nofollow">https://doi.org/10.2139/ssrn.2861644</a></span></span></span></p> <p><span><span><span>Monk B, Allsup R &amp; Frank R 2015. <em><span>LECENing places to hide: Geo-mapping child exploitation material</span></em>. 2015 IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, pp 73–78. <a href="https://doi.org/10.1109/ISI.2015.7165942" rel="nofollow">https://doi.org/10.1109/ISI.2015.7165942</a></span></span></span></p> <p><span><span><span>Moser A, Rybnicek M &amp; Haslinger D 2015. <em><span>Challenges and limitations concerning automatic child pornography classification</span></em>. Proceedings of the 10th International Conference on Computer Vision Theory and Applications, Berlin, pp 492–497. <a href="https://doi.org/10.5220/0005344904920497" rel="nofollow">https://doi.org/10.5220/0005344904920497</a></span></span></span></p> <p><span><span><span>National Center for Missing &amp; Exploited Children 2020. CyberTipline. <a href="https://www.missingkids.org/gethelpnow/cybertipline" rel="nofollow">https://www.missingkids.org/gethelpnow/cybertipline</a></span></span></span></p> <p><span><span><span>Park TJ, Kanda N, Dimitriadis D, Han KJ, Watanabe S &amp; Narayanan S 2022. A review of speaker diarization: Recent advances with deep learning. <em><span>Computer Speech &amp; Language</span></em> 72. <a href="https://doi.org/10.1016/j.csl.2021.101317" rel="nofollow">https://doi.org/10.1016/j.csl.2021.101317</a></span></span></span></p> <p><span><span><span>Phippen A &amp; Bond E 2020. Image recognition in child sexual exploitation material: Capabilities, ethics and rights. In H Jahankhani, B Akhgar, P Cochrane &amp; M Dastbaz (eds), <em><span>Policing in the era of AI and smart societies</span></em>. Advanced Sciences and Technologies for Security Applications. Cham: Springer: 179–198. <a href="https://doi.org/10.1007/978-3-030-50613-1_8" rel="nofollow">https://doi.org/10.1007/978-3-030-50613-1_8</a></span></span></span></p> <p><span><span><span>Powell M, Cassematis P, Benson M, Smallbone S &amp; Wortley R 2015. Police officers’ perceptions of their reactions to viewing internet child exploitation material. <em><span>Journal of Police and Criminal Psychology</span></em> 30(2): 103–111. <a href="https://doi.org/10.1007/s11896-014-9148-z" rel="nofollow">https://doi.org/10.1007/s11896-014-9148-z</a></span></span></span></p> <p><span><span><span>Ross A, Nandakumar K &amp; Jain AK 2006. <em><span>Handbook of multibiometrics</span></em> vol. 6. Springer. <a href="https://doi.org/10.1007/0-387-33123-9" rel="nofollow">https://doi.org/10.1007/0-387-33123-9</a></span></span></span></p> <p><span><span><span>Sae-Bae N, Sun X, Sencar HT &amp; Memon ND 2014. <em><span>Towards automatic detection of child pornography</span></em>. 2014 IEEE International Conference on Image Processing, Paris, pp 5332–5336. <a href="https://doi.org/10.1109/ICIP.2014.7026079" rel="nofollow">https://doi.org/10.1109/ICIP.2014.7026079</a></span></span></span></p> <p><span><span><span>Sanchez L, Grajeda C, Baggili I &amp; Hall C 2019. A practitioner survey exploring the value of forensic tools, AI, filtering, &amp; safer presentation for investigating child sexual abuse material (CSAM). <em><span>Digital Investigation</span></em> 29: S124–S142. <a href="https://doi.org/10.1016/j.diin.2019.04.005" rel="nofollow">https://doi.org/10.1016/j.diin.2019.04.005</a></span></span></span></p> <p><span><span><span>Seigfried-Spellar KC 2018. Assessing the psychological well-being and coping mechanisms of law enforcement investigators vs. digital forensic examiners of child pornography investigations. <em><span>Journal of Police and Criminal Psychology</span></em> 33(3): 215–226. <a href="https://doi.org/10.1007/s11896-017-9248-7" rel="nofollow">https://doi.org/10.1007/s11896-017-9248-7</a></span></span></span></p> <p><span><span><span>Srinivas N, Ricanek K, Michalski D, Bolme DS &amp; King M 2019. <em><span>Face recognition algorithm bias: Performance differences on images of children and adults</span></em>. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp 2269–2277. <a href="https://doi.org/10.1109/CVPRW.2019.00280" rel="nofollow">https://doi.org/10.1109/CVPRW.2019.00280</a></span></span></span></p> <p><span><span><span>Tanwar S, Sudhanshu T, Kumar N &amp; Obaidat MS 2019. Online signature-based biometric recognition. In MS Obaidat, I Traore I &amp; I Woungang (eds), <em><span>Biometric-based physical and cybersecurity systems</span></em>. Cham: Springer: 535–570. <a href="https://doi.org/10.1007/978-3-319-98734-7_10" rel="nofollow">https://doi.org/10.1007/978-3-319-98734-7_10</a></span></span></span></p> <p><span><span><span>Ulges A &amp; Stahl A 2011. <em><span>Automatic detection of child pornography using color visual words</span></em>. 2011 IEEE International Conference on Multimedia and Expo, Barcelona, pp 1–6. <a href="https://doi.org/10.1109/ICME.2011.6011977" rel="nofollow">https://doi.org/10.1109/ICME.2011.6011977</a></span></span></span></p> <p><span><span><span>Vitorino P, Avila S, Perez M &amp; Rocha A 2018. Leveraging deep neural networks to fight child pornography in the age of social media. <em><span>Journal of Visual Communication and Image Representation </span></em>50: 303–313. <a href="https://doi.org/10.1016/j.jvcir.2017.12.005" rel="nofollow">https://doi.org/10.1016/j.jvcir.2017.12.005</a></span></span></span></p> <p><span><span><span>WebRTC 2017. Real-time communication for the web. <a href="https://webrtc.org/" rel="nofollow">https://webrtc.org/</a></span></span></span></p> <p><span><span><span>Westlake BG, Bouchard M &amp; Frank R 2017. Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. <em><span>Sexual Abuse: A Journal of Research and Treatment </span></em>29(7): 685–708. <a href="https://doi.org/10.1177/1079063215616818" rel="nofollow">https://doi.org/10.1177/1079063215616818</a></span></span></span></p> <p><span><span><span>Yaqub W, Mohanty M &amp; Memon N 2018. <em><span>Encrypted domain skin tone detection for pornographic image filtering</span></em>. 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, Auckland, pp 1–5. <a href="https://doi.org/10.1109/AVSS.2018.8639350" rel="nofollow">https://doi.org/10.1109/AVSS.2018.8639350</a></span></span></span></p> <p><span><span><span>Yiallourou E, Demetriou R &amp; Lanitis A 2017. <em><span>On the detection of images containing child-pornographic material</span></em>. 24th International Conference on Telecommunications, Cyprus. <a href="https://doi.org/10.1109/ICT.2017.7998260" rel="nofollow">https://doi.org/10.1109/ICT.2017.7998260</a></span></span></span></p> <p><span><span><span>Yiu SY, Malec C &amp; Michalski D 2021. <em><span>Performance of facial recognition algorithms for the 5RD combating child exploitation network</span></em>. DSTG-CR-2021-0160. Edinburgh, Australia: Defence Science and Technology Group</span></span></span></p> </div> </div> Fri, 18 Mar 2022 04:11:49 +0000 Yvette Maconachie 2535 at https://www.aic.gov.au