Detection of Possible Illicit Messages Using Natural Language Processing and Computer Vision on Twitter and Linked Websites
Keywords:
Support Vector Machine (SVM) and Convolutional Neural Network (CNN).Abstract
There is a worldwide epidemic of human trafficking that diminishes the self-respect of millions of victims. When it comes to promoting illegal services on social media, covert communications are being utilized to spread the word. As resources for law enforcement are limited, it is critical that messages that may be connected to this crime and serve as clues be automatically detected. In this paper, we use natural language processing to identify Twitter tweets that potentially promote illegal services and exploit kids. It is now feasible to identify photos of children as young as 14 years old among the images and URLs identified in suspicious messages. We followed this procedure to conduct our research. The first step is to mine real-time tweets using hashtags relating to minors. After the tweets have been cleaned out of extraneous noise and typos, they are either labeled as suspicious or not. Haar models are also used to select facial and torso geometric features. We can recognize gender and age group by using Support Vector Machine (SVM) and Convolutional Neural Network (CNN), even when the facial details are blurred, by using torso information and its proportional relationship with the head. Because of this, the SVM model with just torso features outperforms CNN.
References
- B. Bangerter, S. Talwar, R. Arefi, and K. Stewart, ‘‘Networks and devices for the 5G era,’’ IEEE Commun. Mag., vol. 52, no. 2, pp. 90–96, Feb. 2014.
- F. Laczko, ‘‘Data and research on human trafficking,’’ Int. Migration, vol. 43, nos. 1–2, pp. 5–16, Jan. 2005.
- M. Lee, ‘‘Human trafficking and border control in the global south,’’ in The Borders of Punishment: Migration, Citizenship, and Social Exclusion. Oxford, U.K.: Oxford Univ. Press, 2013, pp. 128–149.
- E. Cockbain and E. R. Kleemans, ‘‘Innovations in empirical research into human trafficking: Introduction to the special edition,’’ Crime, Law Social Change, vol. 72, no. 1, pp. 1–7, Jul. 2019.
- R. Weitzer, ‘‘Human trafficking and contemporary slavery,’’ Annu. Rev. Sociol., vol. 41, pp. 223–242, Aug. 2015.
- T. S. Portal. (2018). Twitter: Number of Monthly Active Users 2010-2018. [Online]. Available: https://www.statista.com
- M. R. Candes, ‘‘The victims of trafficking and violence protection act of 2000: Will it become the thirteenth amendment of the twenty-first century,’’ U. Miami Inter-Amer. L. Rev., vol. 32, p. 571, Jun. 2001.
- D. Hughes, Wilberforce Can be Free Again: Protecting Trafficking Victims. New York, NY, USA: National Review, 2008.
- A. Sultan, ‘‘Countering crime trafcking in persons smuggling migrants Ethiopia: The Law practice,’’ Ph.D. dissertation, School Law, Addis Ababa Univ., Ababa, Ethiopia, 2018, pp. 1–72.
- M. Tsikerdekis and S. Zeadally, ‘‘Online deception in social media,’’ Commun. ACM, vol. 57, no. 9, pp. 72–80, Sep. 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.