Perceptual Hashing applied to Tor domains recognition

05/20/2020
by   Rubel Biswas, et al.
0

The Tor darknet hosts different types of illegal content, which are monitored by cybersecurity agencies. However, manually classifying Tor content can be slow and error-prone. To support this task, we introduce Frequency-Dominant Neighborhood Structure (F-DNS), a new perceptual hashing method for automatically classifying domains by their screenshots. First, we evaluated F-DNS using images subject to various content preserving operations. We compared them with their original images, achieving better correlation coefficients than other state-of-the-art methods, especially in the case of rotation. Then, we applied F-DNS to categorize Tor domains using the Darknet Usage Service Images-2K (DUSI-2K), a dataset with screenshots of active Tor service domains. Finally, we measured the performance of F-DNS against an image classification approach and a state-of-the-art hashing method. Our proposal obtained 98.75

READ FULL TEXT

page 1

page 2

page 3

research
08/26/2021

State of the Art: Image Hashing

Perceptual image hashing methods are often applied in various objectives...
research
02/01/2020

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

With the growth in social media, there is a huge amount of images of fac...
research
12/15/2022

Hamming Distributions of Popular Perceptual Hashing Techniques

Content-based file matching has been widely deployed for decades, largel...
research
11/12/2021

Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

Apple recently revealed its deep perceptual hashing system NeuralHash to...
research
12/08/2020

Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis

In this paper, a novel perceptual image hashing scheme for color images ...
research
06/20/2023

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

End-to-end encryption (E2EE) provides strong technical protections to in...
research
06/17/2021

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

End-to-end encryption (E2EE) by messaging platforms enable people to sec...

Please sign up or login with your details

Forgot password? Click here to reset