Detection of Cyber Crime Based on Facial Pattern Enhancement Using Machine Learning and Image Processing Techniques

Detection of Cyber Crime Based on Facial Pattern Enhancement Using Machine Learning and Image Processing Techniques

RamaDevi Jujjuri, Arun Kumar Tripathi, Chandrika V. S., Sankararao Majji, Boppuru Rudra Prathap, Tulasi Radhika Patnala
DOI: 10.4018/978-1-6684-6444-1.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cybercrime has several antecedents, including the rapid expansion of the internet and the wide variety of users around the world. It is now possible to use this data for a variety of purposes, whether for profit, non-profit, or purely for the benefit of the individual. As a result, tracing and detecting online acts of terrorism requires the development of a sound technique. Detection and prevention of cybercrime has been the subject of numerous studies and investigations throughout the years. An effective criminal detection system based on face recognition has been developed to prevent this from happening. Principle component analysis (PCA) and linear discriminant analysis (LDA) algorithms can be used to identify criminals based on facial recognition data. Quality, illumination, and vision are all factors that affect the efficiency of the system. The goal of this chapter is to improve accuracy in the facial recognition process for criminal identification over currently used conventional methods. Using proposed hybrid model, we can get the accuracy of 99.9.5%
Chapter Preview
Top

Introduction

Using computers or other communication technologies to terrorise or harm others or damage, hurt, or destroy property is what we mean when we say “cybercrime.” Cybercrimes that are computer-assisted as well as computer-focused can be divided into two groups. Cyber stalking and child pornography are instances of computer-assisted crimes; phishing and hacking are examples of computer-focused offences. For a variety of factors, such as the culture in which the crime was committed, its severity, and occurrences that were not reported because of ignorance or social restraints, it is difficult to get accurate and official statistics on cybercrime. The involvement of law enforcement in circumstances like this is critical because it regulates the level of detail given. In the 1960s, the first cybercrime involving the duplication of computer programming occurred (Al-Khater, 2020). There were numerous fraud and forgery charges brought against Union Dime Savings Bank in New York in 1970 after a bank clerk embezzled $1.5 million from client accounts. Imperial Chemical Industries (ICI) employees stole hundreds of computers and their backups in the early 1970s and sought 275,000 pounds sterling in ransom. A computer worm was created in 1988 by Robert T. Morris at MIT in Cambridge, Massachusetts (MIT).

A phishing attempt was made for the first time in 1995The Electronic Disturbance Theatre was established in 1997 with the mission of creating electronic counterparts to the site-in tools protesters employ. The president of Mexico's website was attacked with a denial-of-service attack in 1998 using a tool called FloodNet (Sivakumar, 2021).

This was done in January 1998, when a coal-fired power station's emergency mode was activated and the SCADA system software was uninstalled. In 2005, a hacker attack on the bank's air conditioning systems resulted in the bank's computer systems being shut down because of the rising temperature in its computer room. The Russian Business Network (RB) was founded in 2006 and is based in New York City (Kester et al., 2021). This unlawful company has committed numerous cybercrimes and provided a wide range of Trojans, spam, and phishing-related tools and services. Its main business is the resale of stolen personal information. A webpage on how to construct bombs was replaced with a page on how to make cupcakes by British security agencies in 2011.

Several sorts of studies were examined in the review of the literature for this paper in order to establish approaches for the identification and prevention of cybercrime. It is through the use of statistical methods that we can better understand the nature of cybercrime and develop effective methods for identifying it. Approaches that focus on predicting outputs from data input include machine learning techniques. Cybercrime detection technologies now in use have been subjected to several reviews and surveys (Rawat et al.,2021). Existing review studies, on the other hand, only concentrated on analysing the detection methods that are limited to one or a few cybercrimes, such as cyber bullying or botnets.

A machine learning technique allows computers to learn and even improve themselves without being explicitly programmed, according to Arthur Samuel. It is possible for software systems to improve their accuracy at predicting outcomes without explicitly programming them through the use of machine learning (ML). When constructing an algorithm for machine learning, the primary concept is to employ statistical analysis to anticipate an output while also changing results in response to new data being available. The research of making computers capable of self-learning is known as machine learning. In my opinion, ML is one of the most intriguing technologies I've ever encountered (Nicholls et al., 2021). To put it plainly, the term reveals that it offers the computer the power to learn. It's possible that machine learning is now being applied in more places than you think.

Complete Chapter List

Search this Book:
Reset