M Steinebach - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
PhotoDNA is a popular hash used to combat CSAM. So far, only limited information has been provided about this hash in terms of its performance. In this paper, we provide an …
As end-to-end encrypted messaging services become widely adopted, law enforcement agencies have increasingly expressed concern that such services interfere with their ability …
End-to-end encryption (E2EE) prevents online services from accessing user content. This important security property is also an obstacle for content moderation methods that involve …
S McKeown, WJ Buchanan - Forensic Science International: Digital …, 2023 - Elsevier
Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media …
I Levy, C Robinson - arXiv preprint arXiv:2207.09506, 2022 - arxiv.org
The explosion of global social media and online communication platforms has changed how we interact with each other and as a society, bringing with it new security and privacy …
R Grimm - arXiv preprint arXiv:2402.14625, 2024 - arxiv.org
This paper explores a lightweight, quantitative audit methodology for transparency disclosures called scrappy audits. It amounts to little more than treating redundant and …
S Sharma - Journal of Visual Communication and Image …, 2024 - Elsevier
Perceptual image hashing refers to a class of algorithms that produce content-based image hashes. These systems use specialized perceptual hash algorithms like Phash, Microsoft's …
Content scanning systems employ perceptual hashing algorithms to scan user content for illicit material, such as child pornography or terrorist recruitment flyers. Perceptual hashing …
Content scanning systems employ perceptual hashing algorithms to scan user content for illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing …