Page 39 - T-I JOURNAL19-3
P. 39

REINING IN ONLINE ABUSES                          599



             deployed can be misused. The underlying technology  REFERENCES
             is agnostic as to what it searches for and removes.   1.  New York v. Ferber. (U.S. Supreme Ct. 458 U.S.
             When deploying photoDNA and eGlyph, we have   747, 1982).
             been exceedingly cautious to control its distribution  2.  Rivest R. The MD5 message-digest algorithm.
             through strict licensing arrangements. It is my hope   Internet RFC 1321; 1992. http://people.csail.mit.
             and expectation that this technology will not be used   edu/rivest/Rivest-MD5.txt
             to impinge on an open and free internet but to elim-  3.  Eastlake DE, Jones PE. US Secure Hash Algo-
             inate some of the worst and most heinous content   rithm 1 (SHA1). Internet RFC 3174; 2001.
             online.                                    4.  Venkatesan R, Koon SM, Jakubowski MH,
                                                           Moulin P. Robust image hashing. In: Proceed-
             ACKNOWLEDGMENTS                               ings 2000 International Conference on Image
                                                           Processing. International Conference on Image
               Hany Farid is the Albert Bradley 1915 Third   Processing 2000; 2000 Sep 10-13; Vancouver.
             Century Professor and chair of computer science at   IEEE; 2000. 3:664–666.
             Dartmouth College. His research focuses on digital  5.  Swaminathan A, Mao Y, Wu, M. Robust and
             forensics, image analysis, and human perception.   secure image hashing. IEEE Trans Inf Forensic
             He is the chief technology officer and co-founder   Secur. 2006;1(2):215–230.
             of Fourandsix Technologies and a senior adviser to  6.  Gusfield D. Algorithms on strings, trees and
             the Counter Extremism Project. This work was sup-  sequences: computer science and computational
             ported by funding from Microsoft Corporation and   biology. New York (NY): Cambridge University
             the Counter Extremism Project.                Press; 1997.
                                                        7.  Sexual Exploitation and Other Abuse Of Chil-
                                                           dren Definitions for Chapter, Section 2256 of
                                                           Title 18, United States Code.
   34   35   36   37   38   39   40   41   42   43   44