References
- Sextortion: a growing threat targeting minors, 2024 [ Online]. [accessed 2024 Jan]. Available from: https://www.fbi.gov/contact-us/field-offices/baltimore/news/sextortion-a-growing-threat-targeting-minors
- CyberTipline 2022 Report [Online]. [accessed 2024 Jan]. Available from: https://www.missingkids.org/cybertiplinedata
- Eggestein J, Knapp K. Fighting child pornography: a review of legal and technological developments. J Digit Forensic, Secur Law. 2014;9(4):29–48. doi:10.15394/jdfsl.2014.1191
- Nirvan A, Sonone SS, Aseri V, Pritam P. Child pornography: the filth of society. In: Advancements in cybercrime investigation and Digital Forensics. 1st ed. Harisha A, Mishra A, and Singh C, editors. Canada CRC Press part of Taylor & Francis Group; 2023. p. 345–366.
- Pereda N, Guilera G, Forns M, Gomez-Benito J. The international epidemiology of child sexual abuse: a continuation of Finkelhor (1994). Child Abuse Negl. 2009;33(6):331–342. doi:10.1016/j.chiabu.2008.07.007
- Sharifzadeh H, Zhang H, Kong A. Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation. 22nd IEEE International Conference on Pattern Recognition (ICPR); Stockholm, Sweden; 2014.
- Pour S, Sharifzadeh H, Ardekani I, Francis X. Vein Pattern Visualisation and Feature Extraction Using Sparse Auto-encoder for Forensic Purposes. 16th IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS); Taipei, Taiwan; 2019.
- Keivanmarz A, Sharifzadeh H, Fleming R. Vein pattern visualisation using conditional generative adversarial networks. 12th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC); Auckland, New Zealand; 2020.
- Wang X, Sushita K, Shimizu K. Evaluation of personal identification system by Transillumination imaging of a finger. IEEE EMBS Asian-Pacific Conference on Biomedical Engineering (APBME); Kyoto, Japan; 2003
- Fujitsu Develops Technology for World’s first contactless palm vein pattern biometric authentication system [Online]. Japan: Fujitsu Laboratories Limited; 2003. [accessed 2024 Jan]. Available from: http://www.fujitsu.com/global/news/pr/archives/month/2003/20030331-05.html
- Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial nets. Proceedings of the 27th International Conference on Neural Information Processing Systems (NIPS); Montreal, Canada. 2014. p. 2672–2680