1 / 11

Large scale video & image identification : what’s next ?

Large scale video & image identification : what’s next ?. Safer Internet Conference, Moscow 21th April 2014. Agenda. Introduction to the technology Used for victim identification Available for voluntary content removal What’s next ?. Introduction to the technology .

faye
Download Presentation

Large scale video & image identification : what’s next ?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Large scale video & image identification : what’s next ? Safer Internet Conference, Moscow 21th April 2014

  2. Agenda • Introduction to the technology • Used for victim identification • Available for voluntary content removal • What’s next ? www.videntifier.com

  3. Introduction to the technology www.videntifier.com

  4. Victim Identification • ICSE DB : International Child Sexual Exploitation image database • Managed by INTERPOL, backed by G8, funded by European Commission • Launched 2001, powered by Videntifier since March 2012 • 40 participating countries • 3000 victims and 1900 offendersidentified www.videntifier.com

  5. Voluntary Content removal • INTERPOL Baseline List • An INTERPOL-Videntifier project, funded by European Commission, supported by Microsoft & Netclean • Pilot phase starts in 2014. www.videntifier.com

  6. What’s next ? Thanks to INTERPOL, the G8, INHOPE and others, we have seen much progress in 15 years www.videntifier.com

  7. What’s next ? Nevertheless the current global economic challenges and the complexity and scale of cybercrime seriously undermine our chances of success www.videntifier.com

  8. What’s next ? We need to create an ecosystem whereby law enforcement, hotlines and industry will be mutually dependent to identify, detect and remove chid abuse material www.videntifier.com

  9. What’s next ? This ecosystem will need political support from governments www.videntifier.com

  10. What’s next ? Shall we start today ? www.videntifier.com

  11. Thank you! Jean-Christophe Le Toquin Information Governance and Responsibility j.c@videntifier.com www.videntifier.com

More Related