Privacy verification of photoDNA based on machine learning
Book chapter
Authors | Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L. and Zhai, Xiaojun |
---|---|
Abstract | PhotoDNA is a perceptual fuzzy hash technology designed and developed by Microsoft. It is deployed by all major big data service providers to detect Indecent Images of Children (IIOC). Protecting the privacy of individuals is of paramount importance in such images. Microsoft claims that a PhotoDNA hash cannot be reverse engineered into the original image; therefore, it is not possible to identify individuals or objects depicted in the image. In this chapter, we evaluate the privacy protection capability of PhotoDNA by testing it against machine learning. Specifically, our aim is to detect the presence of any structural information that might be utilized to compromise the privacy of the individuals via classification. Due to the widespread usage of PhotoDNA as a deterrent to IIOC by big data companies, ensuring its ability to protect privacy would be crucial. In our experimentation, we achieved a classification accuracy of 57.20%.This result indicates that PhotoDNA is resistant to machine-learning-based classification attacks. |
Keywords | Privacy; PhotoDNA; Machine Learning; Security |
Year | 2019 |
Publisher | The Institution of Engineering and Technology (IET) |
ISBN | 9781785617478 |
Web address (URL) | http://hdl.handle.net/10545/624203 |
hdl:10545/624203 | |
File | File Access Level Open |
Publication dates | 09 Oct 2019 |
Publication process dates | |
Deposited | 08 Oct 2019, 07:55 |
Accepted | Mar 2019 |
Contributors | University of Derby, College of Engineering and Technology and University of Essex, School of Computer Science and Electronic Engineering |
https://repository.derby.ac.uk/item/93y41/privacy-verification-of-photodna-based-on-machine-learning
Download files
253
total views0
total downloads3
views this month0
downloads this month
Export as
Related outputs
Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5
Integration and evaluation of QUIC and TCP-BBR in longhaul science data transfers
Lopes, Raul H. C., Franqueira, Virginia N. L. and Duncan, Rand 2019. Integration and evaluation of QUIC and TCP-BBR in longhaul science data transfers. EPJ Web of Conferences. 214, p. 08026. https://doi.org/10.1051/epjconf/201921408026
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes
Al Mutawa, Noora, Bryce, Joanne, Franqueira, Virginia N.L., Marrington, Andrew and Read, Janet C. 2018. Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digital Investigation. https://doi.org/10.1016/j.diin.2018.12.003
Analytical tools for blockchain: review, taxonomy and open challenges.
Balaskas, Anastasios and Franqueira, Virginia N. L. 2018. Analytical tools for blockchain: review, taxonomy and open challenges. IEE Explore. https://doi.org/10.1109/CyberSecPODS.2018.8560672
Blockchain-Based Distributed Marketplace.
Kabi, Oliver R. and Franqueira, Virginia N. L. 2019. Blockchain-Based Distributed Marketplace. in: Springer Nature.
A survey of deep learning solutions for multimedia visual content analysis.
Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L., Zhai, Xiaojun and Kurugollu, Fatih 2019. A survey of deep learning solutions for multimedia visual content analysis. IEEE Access. https://doi.org/10.1109/ACCESS.2019.DOIHD number plate localization and character segmentation on the Zynq heterogeneous SoC.
Al-Zawqari, Ali, Hommos, Omar, Al-Qahtani, Abdulhadi, Farhat, Ali, Bensaali, Faycal, Zhai, Xiaojun and Amira, Abbes 2018. HD number plate localization and character segmentation on the Zynq heterogeneous SoC. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-017-0747-7
A tutorial introduction to IoT design and prototyping with examples.
Meruje, Manuel, Sumaila, Musa, Franqueira, Virginia N. L., Freire, Mario M. and Inacio, Pedro R. M. 2018. A tutorial introduction to IoT design and prototyping with examples. in: Wiley-IEEE Press.
Real-time automated image segmentation technique for cerebral aneurysm on reconfigurable system-on-chip.
Zhai, Xiaojun, Eslami, Mohammad, Hussein, Ealaf Sayed, Filali, Maroua Salem, Shalaby, Salma Tarek, Amira, Abbes, Bensaali, Faycal, Dakua, Sarada, Abinahed, Julien, Al-Ansari, Abdulla and Ahmed, Ayman Z. 2018. Real-time automated image segmentation technique for cerebral aneurysm on reconfigurable system-on-chip. Journal of Computational Science. https://doi.org/10.1016/j.jocs.2018.05.002
Service-oriented system engineering
Bessis, Nik, Zhai, Xiaojun and Sotiriadis, Stelios 2017. Service-oriented system engineering. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.11.025
Cloud forensics and security
Franqueira, Virginia N. L., Lopes, Raul, Jones, Andrew and Storer, Tim 2017. Cloud forensics and security. SpringerOpen.
On Locky ransomware, Al Capone and Brexit
MacRae, John and Franqueira, Virginia N. L. 2018. On Locky ransomware, Al Capone and Brexit. in: Springer.
Inequality indexes as sparsity measures applied to ventricular ectopic beats detection and its efficient hardware implementation.
Baali, Hamza, Zhai, Xiaojun, Djelouat, Hamza, Amira, Abbes and Bensaali, Faycal 2017. Inequality indexes as sparsity measures applied to ventricular ectopic beats detection and its efficient hardware implementation. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2780190
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887
Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches.
Franqueira, Virginia N. L., Bryce, Joanne, Al Mutawa, Noora and Marrington, Andrew 2017. Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches. Digital Investigation. https://doi.org/10.1016/j.diin.2017.11.002Parallel Monte Carlo search for Hough Transform.
Lopes, Raul, Franqueira, Virginia N. L., Reid, Ivan D. and Hobson, Peter 2017. Parallel Monte Carlo search for Hough Transform. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/898/7/072052ECG encryption and identification based security solution on the Zynq SoC for connected health systems
Zhai, Xiaojun, Ait Si Ali, Amine, Amira, Abbes and Bensaali, Faycal 2017. ECG encryption and identification based security solution on the Zynq SoC for connected health systems. Journal of Parallel and Distributed Computing. https://doi.org/10.1016/j.jpdc.2016.12.016
Verifiable public key encryption scheme with equality test in 5G networks
Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu and Franqueira, Virginia N. L. 2017. Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2716971Special issue on cyberharassment investigation: Advances and trends
Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2016. Special issue on cyberharassment investigation: Advances and trends. Journal of Digital Forensics, Security and Law (JDFSL).
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.
Detecting compromised programs for embedded system applications
Zhai, Xiaojun, Appiah, Kofi, Ehsan, Shoaib, Cheung, Wah M, Howells, Gareth, Hu, Huosheng, Gu, Dongbing and McDonald-Maier, Klaus 2014. Detecting compromised programs for embedded system applications. in: Springer.
Space Wireless Sensor Networks for planetary exploration: Node and network architectures
Rodrigues, Pedro, Oliveira, Andre, Oddi, Guido, Liberati, Francesco, Alvarez, Francisco, Cabas, Ramiro, Vladimirova, Tanya, Zhai, Xiaojun, Jing, Hongyuan and Crosnier, Michael 2014. Space Wireless Sensor Networks for planetary exploration: Node and network architectures. IEEE. https://doi.org/10.1109/AHS.2014.6880175
Multi-sensor data fusion in wireless sensor networks for planetary exploration
Zhai, Xiaojun, Jing, Hongyuan and Vladimirova, Tanya 2014. Multi-sensor data fusion in wireless sensor networks for planetary exploration. IEEE. https://doi.org/10.1109/AHS.2014.6880176
Hardware acceleration of an image processing system for dielectrophoretic loading of single neurons inside micro-wells of microelectrode arrays
Zhai, Xiaojun, Jaber, Fadi, Bensaali, Faycal and Mishra, Arti 2015. Hardware acceleration of an image processing system for dielectrophoretic loading of single neurons inside micro-wells of microelectrode arrays. IEEE. https://doi.org/10.1109/UKSim.2015.28
Data aggregation in wireless sensor networks for lunar exploration
Zhai, Xiaojun and Vladimirova, Tanya 2015. Data aggregation in wireless sensor networks for lunar exploration. IEEE. https://doi.org/10.1109/EST.2015.9
ECG security identification system on the Zynq SoC Platform
Zhai, Xiaojun, Amira, Abbes and Bensaali, Faycal 2015. ECG security identification system on the Zynq SoC Platform. IEEE. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.174
OCR based feature extraction and template matching algorithms for Qatari number plate
Farhat, Ali, Al-Zawqari, Ali, Al-Qahtani, Abdulhadi, Hommos, Omar, Bensaali, Faycal, Amira, Abbes and Zhai, Xiaojun 2016. OCR based feature extraction and template matching algorithms for Qatari number plate. IEEE. https://doi.org/10.1109/ICCSII.2016.7462419
HD Qatari ANPR system
Hommos, Omar, Al-Qahtani, Abdulhadi, Al-Zawqari, Ali, Bensaali, Faycal, Amira, Abbes and Zhai, Xiaojun 2016. HD Qatari ANPR system. IEEE. https://doi.org/10.1109/ICCSII.2016.7462420
Heterogeneous implementation of ECG encryption and identification on the Zynq SoC
Ait Si Ali, Amine, Zhai, Xiaojun, Amira, Abbes, Bensaali, Faycal and Ramzan, Naeem 2016. Heterogeneous implementation of ECG encryption and identification on the Zynq SoC. IEEE. https://doi.org/10.1109/FCCM.2016.44
Efficient data-processing algorithms for wireless-sensor-networks-based planetary exploration
Zhai, Xiaojun and Vladimirova, Tanya 2016. Efficient data-processing algorithms for wireless-sensor-networks-based planetary exploration. Journal of Aerospace Information Systems. https://doi.org/10.2514/1.I010373
MLP neural network based gas classification system on Zynq SoC
Zhai, Xiaojun, Ait Si Ali, Amine, Amira, Abbes and Bensaali, Faycal 2016. MLP neural network based gas classification system on Zynq SoC. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2619181Forensically-sound analysis of security risks of using local password managers
Gray, Joshua, Franqueira, Virginia N. L. and Yu, Yijun 2016. Forensically-sound analysis of security risks of using local password managers. IEEE Computer Society. https://doi.org/10.1109/REW.2016.034
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis
Al Mutawa, Noora, Bryce, Joanne, Marrington, Andrew and Franqueira, Virginia N. L. 2016. Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. Digital Investigation. https://doi.org/10.1016/j.diin.2016.01.012
To flip or not to flip: a critical interpretive synthesis of flipped teaching
Franqueira, Virginia N. L. and Tunnicliffe, Peter 2015. To flip or not to flip: a critical interpretive synthesis of flipped teaching. in: Springer International Publishing.Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases
Al Awadhi, Ibtesam, Read, Janet C., Marrington, Andrew and Franqueira, Virginia N. L. 2015. Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases. Journal of Digital Forensics, Security and Law (JDFSL).
A systematic approach for cyber security in vehicular networks
Ahmad, F., Adnane, Asma and Franqueira, Virginia N. L. 2016. A systematic approach for cyber security in vehicular networks. Journal of Computer and Communications. https://doi.org/10.4236/jcc.2016.416004
Introduction to special issue on risk and trust in embedded critical systems
Rossebø, Judith E. Y., Houmb, Siv H., Georg, Geri, Franqueira, Virginia N. L. and Serpanos, Dimitrios 2014. Introduction to special issue on risk and trust in embedded critical systems. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2659008
Real-time optical character recognition on field programmable gate array for automatic number plate recognition system
Sotudeh, Reza, Zhai, Xiaojun and Bensaali, Faycal 2013. Real-time optical character recognition on field programmable gate array for automatic number plate recognition system. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0339
Exploring ICMetrics to detect abnormal program behaviour on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Gu, Dongbing, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. Exploring ICMetrics to detect abnormal program behaviour on embedded devices. Journal of Systems Architecture. https://doi.org/10.1016/j.sysarc.2015.07.007Efficient computation of hashes
Lopes, Raul, Franqueira, Virginia N. L. and Hobson, Peter 2014. Efficient computation of hashes. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/513/3/032042
Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems
Zhai, Xiaojun, Bensaali, Faycal and Sotudeh, Reza 2013. Field programmable gate arrays-based number plate binarization and adjustment for automatic number plate recognition systems. Journal of Electronic Imaging. https://doi.org/10.1117/1.JEI.22.1.013009
Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation
Zhai, Xiaojun, Ramalingam, Soodamani and Bensaali, Faycal 2013. Improved number plate localisation algorithm and its efficient field programmable gate arrays implementation. IET Circuits, Devices & Systems. https://doi.org/10.1049/iet-cds.2012.0064
Improved number plate character segmentation algorithm and its efficient FPGA implementation
Zhai, Xiaojun and Bensaali, Faycal 2012. Improved number plate character segmentation algorithm and its efficient FPGA implementation. Journal of Real-Time Image Processing. https://doi.org/10.1007/s11554-012-0258-5
Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks
Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2015. Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.49
Challenges of data provenance for cloud forensic investigations
Katilu, Victoria M., Franqueira, Virginia N. L. and Angelopoulou, Olga 2015. Challenges of data provenance for cloud forensic investigations. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.54
A method for detecting abnormal program behavior on embedded devices
Zhai, Xiaojun, Ehsan, Shoaib, Howells, Gareth, Dongbing, Gu, McDonald-Maier, Klaus, Appiah, Kofi and Hu, Huosheng 2015. A method for detecting abnormal program behavior on embedded devices. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2015.2422674