PhotoDNA is a proprietary image-identification and content filtering technology [1] widely used by online service providers. [2] [3]
PhotoDNA was developed by Microsoft Research and Hany Farid, professor at Dartmouth College, beginning in 2009. From a database of known images and video files, it creates unique hashes to represent each image, which can then be used to identify other instances of those images. [4]
The hashing method initially relied on converting images into a black-and-white format, dividing them into squares, and quantifying the shading of the squares, [5] did not employ facial recognition technology, nor could it identify a person or object in the image.[ citation needed ] The method sought to be resistant to alterations in the image, including resizing and minor color alterations. [4] Since 2015, [6] similar methods are used for individual video frames in video files. [7]
Microsoft donated[ failed verification ] the PhotoDNA technology to Project VIC, managed and supported by the International Centre for Missing & Exploited Children (ICMEC) and used as part of digital forensics operations [8] [9] by storing "fingerprints" that can be used to uniquely identify an individual photo. [9] [10] The database includes hashes for millions of items. [11]
In December 2014, Microsoft made PhotoDNA available to qualified organizations in a software as a service model for free through the Azure Marketplace. [12]
In the 2010s and 2020s, PhotoDNA was put forward in connection with policy proposals relating to content moderation and internet censorship, [13] including US Senate hearings (2019 on "digital responsibility", [2] 2022 on the EARN IT Act [14] ) and various proposals by the European Commission dubbed "upload filters" by civil society [15] [16] such as so-called voluntary codes (in 2016 [17] on hate speech [18] after 2015 events, 2018 [19] and 2022 [20] on disinformation), copyright legislation (chiefly the 2019 copyright directive debated between 2014 [21] and 2021 [22] ), terrorism-related regulations (TERREG) [23] and internet wiretapping regulations (2021 "chat control"). [24]
In 2016, Hany Farid proposed to extend usage of the technology to terrorism-related content. [25] In December 2016, Facebook, Twitter, Google and Microsoft announced plans to use PhotoDNA to remove extremist content such as terrorist recruitment videos or violent terrorist imagery. [26] In 2018 Facebook stated that PhotoDNA was used to automatically remove al-Qaeda videos. [13]
By 2019, big tech companies including Microsoft, Facebook and Google publicly announced that since 2017 they were running the GIFCT as a shared database of content to be automatically censored. [2] As of 2021, Apple was thought to be using NeuralHash for similar purposes. [27]
In 2022, The New York Times covered the story of two dads whose Google accounts were closed after photos they took of their child for medical purposes were automatically uploaded to Google's servers. [28] The article compares PhotoDNA, which requires a database of known hashes, with Google's AI-based technology, which can recognize previously unseen exploitative images. [29] [30]
Microsoft originally used PhotoDNA on its own services including Bing and OneDrive. [31] As of 2022, PhotoDNA was widely used by online service providers for their content moderation efforts [10] [32] [33] including Google's Gmail, Twitter, [34] Facebook, [35] Adobe Systems, [36] Reddit, [37] and Discord. [38]
The UK Internet Watch Foundation, which has been compiling a reference database of PhotoDNA signatures, reportedly had over 300,000 hashes of known child sexual exploitation materials.[ citation needed ] Another source of the database was the National Center for Missing & Exploited Children (NCMEC). [39] [40]
PhotoDNA is widely used to remove content, [2] disable accounts, and report people. [7]
In 2021, Anish Athalye was able to partially invert PhotoDNA hashes with a neural network, which raises concerns about the reversibility of a PhotoDNA hash. [41]
The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the President of the United States reauthorized the allocation of $40 million in funding for the organization as part of Missing Children's Assistance Reauthorization Act of 2013. The current chair of the organization is Jon Grosso of Kohl's. NCMEC handles cases of missing minors from infancy to young adults through age 20.
The International Centre for Missing & Exploited Children (ICMEC), headquartered in Alexandria, Virginia, USA, with a regional presence in the United Kingdom, Europe, Turkey, Africa, Canada, Latin America, Caribbean, Southeast Asia, India, Japan, South Korea, Taiwan and Australasia, is a private 501(c)(3) non-governmental, nonprofit global organization. It combats child sexual exploitation, child pornography, child trafficking and child abduction.
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behavior rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.
Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts and then summarizes characteristic components of a video as a unique or a set of multiple perceptual hashes or fingerprints, enabling that video to be uniquely identified. This technology has proven to be effective at searching and comparing video files.
Internet censorship in the United Kingdom is conducted under a variety of laws, judicial processes, administrative regulations and voluntary arrangements. It is achieved by blocking access to sites as well as the use of laws that criminalise publication or possession of certain types of material. These include English defamation law, the Copyright law of the United Kingdom, regulations against incitement to terrorism and child pornography.
The Internet Watch Foundation (IWF) is a global registered charity based in Cambridge, England. It states that its remit is "to minimise the availability of online sexual abuse content, specifically child sexual abuse images and videos hosted anywhere in the world and non-photographic child sexual abuse images hosted in the UK." Content inciting racial hatred was removed from the IWF's remit after a police website was set up for the purpose in April 2011. The IWF used to also take reports of criminally obscene adult content hosted in the UK. This was removed from the IWF's remit in 2017. As part of its function, the IWF says that it will "supply partners with an accurate and current URL list to enable blocking of child sexual abuse content". It has "an excellent and responsive national Hotline reporting service" for receiving reports from the public. In addition to receiving referrals from the public, its agents also proactively search the open web and deep web to identify child sexual abuse images and videos. It can then ask service providers to take down the websites containing the images or to block them if they fall outside UK jurisdiction.
Internet censorship in New Zealand refers to the New Zealand Government's system for filtering website traffic to prevent Internet users from accessing certain selected sites and material. While there are many types of objectionable content under New Zealand law, the filter specifically targets content depicting the sexual abuse or exploitation of children and young persons. The Department of Internal Affairs runs the filtering system, dubbed the Digital Child Exploitation Filtering System (DCEFS). It is voluntary for Internet Service Providers (ISPs) to join.
Child pornography is erotic material that depicts persons under the designated age of majority. The precise characteristics of what constitutes child pornography varies by criminal jurisdiction.
Hany Farid is an American university professor who specializes in the analysis of digital images and the detection of digitally manipulated images such as deepfakes. Farid served as Dean and Head of School for the UC Berkeley School of Information. In addition to teaching, writing, and conducting research, Farid acts as a consultant for non-profits, government agencies, and news organizations. He is the author of the book Photo Forensics (2016).
Kik Messenger, commonly called Kik, is a freeware instant messaging mobile app from the Canadian company Kik Interactive, available on iOS and Android operating systems.
Thorn: Digital Defenders of Children, previously known as DNA Foundation, is a nonprofit organization that builds technology to defend children from sexual abuse. Founded in 2012, the organization creates products and programs to empower the platforms and people who have the ability to defend children.
The child abuse image content list is a list of URLs and image hashes provided by the Internet Watch Foundation to its partners to enable the blocking of child pornography & criminally obscene adult content in the UK and by major international technology companies.
Perceptual hashing is the use of a fingerprinting algorithm that produces a snippet, hash, or fingerprint of various forms of multimedia. A perceptual hash is a type of locality-sensitive hash, which is analogous if features of the multimedia are similar. This is in contrast to cryptographic hashing, which relies on the avalanche effect of a small change in input value creating a drastic change in output value. Perceptual hash functions are widely used in finding cases of online copyright infringement as well as in digital forensics because of the ability to have a correlation between hashes so similar data can be found.
The Counter Extremism Project (CEP) is a non-profit non-governmental organization that combats extremist groups "by pressuring financial support networks, countering the narrative of extremists and their online recruitment, and advocating for strong laws, policies and regulations".
Big Tech, also known as the Tech Giants or Tech Titans, are the largest IT companies in the world. The concept of Big Tech is similar to the grouping of dominant companies in other sectors. It typically refers to the Big Five United States tech companies: Alphabet, Amazon, Apple, Meta, and Microsoft; or the Magnificent Seven, which includes Nvidia and Tesla. Big Tech can also include Chinese companies such as Baidu, Alibaba, Tencent, and Xiaomi (BATX).
OnlyFans is an internet content subscription service based in London, England. The service is used primarily by sex workers who produce pornography, but it also hosts the work of other content creators, such as physical fitness experts and musicians.
Deepfake pornography, or simply fake pornography, is a type of synthetic pornography that is created via altering already-existing photographs or video by applying deepfake technology to the images of the participants. The use of deepfake porn has sparked controversy because it involves the making and sharing of realistic videos featuring non-consenting individuals, typically female celebrities, and is sometimes used for revenge porn. Efforts are being made to combat these ethical concerns through legislation and technology-based solutions.
Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam.
The Global Internet Forum to Counter Terrorism (GIFCT) is an Internet industry initiative to share proprietary information and technology for automated content moderation.
The Regulation to Prevent and Combat Child Sexual Abuse is a European Union regulation proposed by the European Commissioner for Home Affairs Ylva Johansson on 11 May 2022. The stated aim of the legislation is to prevent child sexual abuse online through the implementation of a number of measures, including the establishment of a framework that would make the detection and reporting of child sexual abuse material (CSAM) by digital platforms – known by its critics as Chat Control – a legal requirement within the European Union.
Image fingerprints, such as PhotoDNA from Microsoft, are used throughout the industry to identify images that depict child exploitation and abuse
{{cite web}}
: CS1 maint: numeric names: authors list (link)A bigger breakthrough came along almost a decade later, in 2018, when Google developed an artificially intelligent tool that could recognize never-before-seen exploitative images of children. [...] When Mark's and Cassio's photos were automatically uploaded from their phones to Google's servers, this technology flagged them.
According to Google, those incident reports come from multiple sources, not limited to the automated PhotoDNA tool.
Google has used hash matching with Microsoft's PhotoDNA for scanning uploaded images to detect matches with known CSAM. [...] In 2018, Google announced the launch of its Content Safety API AI toolkit that can "proactively identify never-before-seen CSAM imagery so it can be reviewed and, if confirmed as CSAM, removed and reported as quickly as possible." It uses the tool for its own services and, along with a video-targeting CSAI Match hash matching solution developed by YouTube engineers, offers it for use by others as well.