An overview of perceptual hashing

H Farid - Journal of Online Trust and Safety, 2021 - tsjournal.org
It is said that what happens on the internet stays on the internet, forever. In some cases this
may be considered a feature. Reports of human rights violations and corporate corruption …

Falcon: Honest-majority maliciously secure framework for private deep learning

S Wagh, S Tople, F Benhamouda, E Kushilevitz… - arXiv preprint arXiv …, 2020 - arxiv.org
We propose Falcon, an end-to-end 3-party protocol for efficient private training and
inference of large machine learning models. Falcon presents four main advantages-(i) It is …

An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders

CMS Steel, E Newman, S O'Rourke… - Forensic Science …, 2020 - Elsevier
Abstract Starting with electronic Bulletin Board Systems (BBSs), Usenet and email, the
adoption and continued use of technology to facilitate the viewing and possession of child …

Trauma-informed social media: Towards solutions for reducing and healing online harm

CF Scott, G Marcu, RE Anderson… - Proceedings of the …, 2023 - dl.acm.org
Social media platforms exacerbate trauma, and many users experience various forms of
trauma unique to them (eg, doxxing and swatting). Trauma is the psychological and physical …

[PDF][PDF] Bugs in our pockets: The risks of client-side scanning

H Abelson, R Anderson, SM Bellovin… - Journal of …, 2024 - academic.oup.com
Our increasing reliance on digital technology for personal, economic, and government
affairs has made it essential to secure the communications and devices of private citizens …

“There's so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment

M Wei, S Consolvo, PG Kelley, T Kohno… - Proceedings of the …, 2023 - dl.acm.org
Online hate and harassment poses a threat to the digital safety of people globally. In light of
this risk, there is a need to equip as many people as possible with advice to stay safer …

Prevention, disruption and deterrence of online child sexual exploitation and abuse

E Quayle - Era Forum, 2020 - Springer
European law has recognised the need for international cross-disciplinary collaboration to
both identify, locate and safeguard victims and prevent, investigate and prosecute online …

AttM-CNN: Attention and metric learning based CNN for pornography, age and Child Sexual Abuse (CSA) Detection in images

A Gangwar, V González-Castro, E Alegre, E Fidalgo - Neurocomputing, 2021 - Elsevier
Nowadays, the growing number of cases of possession and distribution of Child Sexual
Abuse (CSA) material pose a significant challenge for Law Enforcement Agencies (LEAs). In …

Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

It's not what it looks like: Manipulating perceptual hashing based applications

Q Hao, L Luo, STK Jan, G Wang - … of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Perceptual hashing is widely used to search or match similar images for digital forensics and
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …