ChaSAM an Architecture Based on Perceptual Hashing for Image Detection in Computer Forensics
ChaSAM an Architecture Based on Perceptual Hashing for Image Detection in Computer Forensics
The growing prevalence of digital crimes, especially those involving Child Sexual
Abuse Material (CSAM) and revenge pornography, highlights the need for advanced
forensic techniques to identify and analyze illicit content. While cryptographic
hashing is commonly used in computer forensics, its effectiveness is often challenged
because criminals can modify original information to create a new cryptographic
hash. Perceptual hashes address this problem by focusing on the visual identity of the
file rather than its bit-by-bit representation. This study introduces ChaSAM
Forensics, a methodology that efficiently identifies illicit material using perceptual
hashing techniques to track and identify illicit content, with a focus on child abuse
material. Two new perceptual hashing algorithms, chHash and domiHash, were
designed for integration into ChaSAM. The results showed that, under the tested
conditions, the proposed chHash algorithm was more accurate than the established
pHash algorithm when applied in a single iteration. Combinations of algorithms in
two iterations were also assessed.
EXISTING SYSTEM
An overview of perceptual hashing was presented by Farid [35], which addressed the
persistence of harmful online content such as terror-related materials and child sexual
abuse imagery. The paper reviews the mechanisms, advantages, disadvantages, and
real-world applications of perceptual hashing.
Samanta and Jain [22] analyzed the detection of image manipulations using
perceptual hash algorithms and discussed the efficiency of the algorithms in
detecting image similarity. They mentioned that simple modifications such as
changes in color, brightness, and texture are perfectly detected by the algorithms.
However, the same does not occur when drastic changes are present, such as
cropping, rotations, and mirroring.
Faria [15] argues that the analysis of files performed by computer experts is limited
to the hash-to-hash comparison of cryptographic algorithms, mainly in examinations
where files of child pornography are sought, and there is a lack of methods that allow
the computational expert to compare similar files. He also mentions free software
tools and general-purpose similarity hashes; however, they are not very performative.
The work by Menezes and Silva [26] addressed what the authors called the problem
of the modern world, which is the accumulation of various identical or similar files at
the expense of disk storage space. The author argues that programs can compare files
for similarity; some are available for free download on the Internet. However, he
points out that these programs are slow.
In light of this problem, the work of Santos [8] discusses the exponential increase in
crimes related to the production, storage, and sharing of child sexual abuse material
on the internet, which, after police operations, will be subject to forensic
examination to seek the criminal materiality, thus requiring computational methods
capable of supporting the work of the criminal expert.
Hao et al. [39] examined the robustness of perceptual hashing algorithms used in
digital forensics and cybercrime studies. The study highlighted the vulnerabilities of
perceptual hashing algorithms and demonstrated the need for more robust designs to
protect against such attacks It is observed, therefore, that the studies converge to the
increasing existence of devices and files to be analyzed by criminal experts, with the
aggravating factor that many of these files undergo some anti-forensic technique for
their malicious manipulation, aiming to cover up or produce adverse results from the
truth.
Disadvantages
An existing system didn’t explore Implementation of ESTABLISHED
PERCEPTUAL HASHING ALGORITHMS.
An existing system didn't implement Architecture Based on Perceptual
Hashing for Image Detection.
Proposed System
This paper presents a forensic methodology named ChaSAM Forensics and the
chHash algorithm, which consists of a computational architecture capable of
identifying images based on their similarities, particularly in the search for CSAM
files and revenge pornography on computer devices seized in police operations. To
achieve this, ChaSAMsearches for files within the target folder only if they have
similar counterparts in the candidate files folder within the source folder.
Additionally, we propose two perceptual hashes to minimize false negative results.
The main contribution of this work lies in the development and integration of two
novel perceptual hashing algorithms, chHash and domiHash, within the ChaSAM
Forensics tool. Unlike existing perceptual hash algorithms, chHash is particularly
effective in identifying similar images while minimizing false positives, especially
when used in combination with dHash or dHash-v algorithms. This dual-iteration
approach significantly enhances accuracy and efficiency in detecting manipulated
images, such as those found in CSAM. Additionally, the use of parallel processing
routines within ChaSAM further improves performance, making it a robust tool for
forensic investigations involving large volumes of digital images.
Advantages
SYSTEM REQUIREMENTS
Software Requirements:
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL