By Topic

Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile phones

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Patel, S.B. ; AES Inst. of Comput. Studies, HL Coll. Campus, Ahmedabad

Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and next generation networks, it has become more a standard feature of mobile phones. Over recent months there have been a few grandiose claims within the media about the potential misuse of phones with camera capability. Unfortunately some of these claims are not proved by available facts resulting into confusion and misunderstanding. It may suffice to say that some digital cameras are smaller convenient and technology superior in image quality. This makes them easier to use in an unacceptable manner. Camera phones are designed to provide a means of transferring images via your mobile phone to complement voice or text based communication for business or personal reasons. Normally the youth gets attracted towards the sexual photography and watching movies on the mobile devices. Some times such movies get broadcast on the network like wild fire and it is available to all the community. It is indeed a difficult task to identify the user who has captured these photographs or movies and made it public. This paper focuses on a technique through which this problem can be solved. This technique, if implemented, on a mobile phone can really help the concerned authority to identify the culprits.

Published in:

Digital Information Management, 2007. ICDIM '07. 2nd International Conference on  (Volume:1 )

Date of Conference:

28-31 Oct. 2007