scispace - formally typeset
Open AccessPosted Content

An Illustration of Hashing and Its Effect on Illegal File Content in the Digital Age

Reads0
Chats0
TLDR
It is argued that this system causes numerous problems in tracking internet criminals, and further allows even “newbies” to avoid detection, so cryptologists and computer forensics experts need to focus on this as they develop the next generation of hashing algorithms.
Abstract
In this article, I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as discuss that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different hash values. While such a cryptological system is important in authenticating files and ensuring that a given file is the one sought by an internet user, I argue that this system causes numerous problems in tracking internet criminals, and further allows even “newbies” to avoid detection. In conclusion, I state that cryptologists and computer forensics experts need to focus on this as they develop the next generation of hashing algorithms.

read more

Citations
More filters
Journal ArticleDOI

Finding the Key Players in Online Child Exploitation Networks

TL;DR: Results show that network capital — a combination between severity of content and connectivity and connectivity — is a more reliable measure of target prioritization than more traditional measures of network centrality taken alone.
Journal ArticleDOI

Detecting child sexual abuse material: A comprehensive survey

TL;DR: The findings suggest that CSAM detection applications yield the best results if multiple approaches are used in combination, such as deep-learning algorithms with multi-modal image or video descriptors merged together, andDeep-learning techniques were shown to outperform other detection methods for unknown CSAM.
Proceedings ArticleDOI

Comparing Methods for Detecting Child Exploitation Content Online

TL;DR: Results show that the three million images found in the authors' hash value database were not common enough on public websites for the hash value method to produce meaningful result, and websites with code words commonly known to be used by child pornographers to identify or discuss exploitative content were found to be much larger than others, with extensive visual and textual content.

Post-payment copyright service for digital music: a multi-disciplinary study

TL;DR: The mathematical analysis reveals that the post-payment boosts the impact of the rights holders’ anti-piracy actions by decreasing the number of illegal files and increasing the revenue of therights holders.
References
More filters
Journal ArticleDOI

Finding the Key Players in Online Child Exploitation Networks

TL;DR: Results show that network capital — a combination between severity of content and connectivity and connectivity — is a more reliable measure of target prioritization than more traditional measures of network centrality taken alone.
Journal ArticleDOI

Detecting child sexual abuse material: A comprehensive survey

TL;DR: The findings suggest that CSAM detection applications yield the best results if multiple approaches are used in combination, such as deep-learning algorithms with multi-modal image or video descriptors merged together, andDeep-learning techniques were shown to outperform other detection methods for unknown CSAM.
Proceedings ArticleDOI

Comparing Methods for Detecting Child Exploitation Content Online

TL;DR: Results show that the three million images found in the authors' hash value database were not common enough on public websites for the hash value method to produce meaningful result, and websites with code words commonly known to be used by child pornographers to identify or discuss exploitative content were found to be much larger than others, with extensive visual and textual content.

Post-payment copyright service for digital music: a multi-disciplinary study

TL;DR: The mathematical analysis reveals that the post-payment boosts the impact of the rights holders’ anti-piracy actions by decreasing the number of illegal files and increasing the revenue of therights holders.
Related Papers (5)