Needle in a haystack

Connect with state & local government leaders
 

Connecting state and local government leaders

GCN Lab Test: Image-Seeker helps you find what you want in huge sets of image files

The entertainment industry keeps driving the development of hardware and software to handle visual files, so it's no surprise that our hard drives are bulging with pictures and movies. Most of these files are legitimate items, such as pictures of products for sale and training films. But suppose one of the files flowing in or out of your network is a pornographic photo or, perhaps, a confidential patent drawing.Image-Seeker is a software product for searching and retrieving visual assets when the volume of files is simply too large for an unaided human to handle. We tested the basic Image-Seeker to see what it was capable of. LTU Technologies also offers two related products: Image-Seeker for EnCase and Image-Filter.The first step in installing Image-Seeker was to set up a Linux server on our network. Fortunately, we had a Red Hat 9 server available. The LTU Technologies Web site said this was sufficient, but the vendor representative said we had to upgrade to Fedora Core 4. This turned out to be easy. These versions are available free online, so we simply downloaded the new operating system and burned it onto CDs. In half an hour, we were upgrading the Red Hat server.For our database, we installed the free PostGreSql. Oracle and Microsoft SQL Server 2005 are also supported. The Quick Start manual guided us in installing the Image-Seeker software. This should have taken only minutes, but we hit a snag and had to call LTU for help. The tech rep fixed our problem in less than a minute ' we had made an error while installing the database ' and we were rolling again.Now we were ready to put Image-Seeker to the test at a Windows workstation. We pointed a browser to the Linux server, logged in to Image-Seeker and almost immediately got lost in the user interface. Some of the screens were easy to use, such as those for setting up users and administrators and configuring their rights, but the screens that dealt with the primary functions were not at all intuitive.Unfortunately for us, even though the Quick Start manual had proved useful, the User Guide appeared to have been transliterated into English from a foreign language. We had to read each sentence three times to get the meaning. On the user interface, we could hover the cursor over each icon to get a brief label showing its use. But the online help merely brought up the manuals.After stumbling around in the interface for some time, we finally called the helpful tech rep again and learned that customers normally receive about two days of training. After an hour of his competent tutelage, we felt ready to begin using Image-Seeker.To start with, we wanted to simulate how a forensics investigator would use this tool to search through a large number of digital photographs. We had real evidence from pornography investigations, but only those who have had to do it know how tedious and depressing it is to plod through such evidence. We decided instead to use a pleasant set of 500 photos taken during a vacation to Hawaii, though the pornographic photos would be part of our test later on.Our first step was to enroll the set of photos, which meant creating thumbnails and analytic data about the pictures and transferring the data to the server. At the workstation with the photos, we pointed a browser to the server and downloaded a utility program to handle enrollment. This program executed on the workstation and handily processed the dataset.Now we were ready to work with the data on the server. The magic of Image-Seekeris that it uses a formula ' secret, of course ' to summarize the characteristics of each photograph. The vendor calls this summary data the picture's DNA. Some customers share their DNA files with remote colleagues rather than sending them the visual files. These DNA files enable the colleagues to scan photos for pictures of interest without having to receive and store sensitive photographs.Viewing a subset of the Hawaii photo thumbnails, we selected a picture taken in a hotel room and then we pressed a button to sort all 500 photos by color and content based on the selected picture. Instantly, the program presented us with the thumbnails neatly sorted by their relation to the first photo. Artificial intelligence is never perfect ' and neither is natural intelligence, for that matter. So we were not surprised to see a picture of central Honolulu at night included in the pictures of hotel rooms. We surmised that the box-like images of the skyscrapers coincided with the shape of a bed in the hotel room.Next, we tried to fool the program. We made many copies of one photograph and then mangled the copies using, alternately, Nero PhotoSnap and Microsoft Paint. No matter what we did to the photos ' including resizing, flipping, rotating, changing colors, putting black boxes over the eyes and even scribbling mustaches on the faces ' Image-Seeker correctly sorted the copies. The interface displays a number over each thumbnail estimating how closely the picture resembles the selected one. As these values made clear, Image-Seeker was not impressed by our efforts to deceive.But we wanted to see if the product could separate real-life evidence from innocent pictures, which would make it a fantastic tool for forensics investigators looking into computer crimes. We selected six pornographic pictures from an actual investigation and mixed them into the database with all those innocent vacation photos. We selected one of the porn images, and Image-Seeker correctly sorted the five other ones we had slipped into our pool, giving credence to the ability of the product to save time in sifting through mountains of visual data.Image-Seeker sorted the vacation pictures behind the evidence photos, doing its best to match the porn picture. For reasons we could not fathom, one of the pictures was of the author eating a taco on Waikiki beach, hardly pornographic. But at least it had grabbed all the images it was supposed to. Having a false positive is a lot better than missing a vital piece of evidence.Typically, LTU Technologies customizes its products for customers, frequently allowing them to use the program's application programming interfaces. Our basic Image-Seeker was not good at finding people in the pictures. At our request, the vendor arranged a demonstration in which we watched an Image-Filter user correctly find children's pictures in a set of photos.The flexibility of this product is surprising. When integrated with a Web crawler, it can detect illegal copyrighted materials on Internet sites. When integrated with enterprise content filtering and e-mail attachment monitoring software, it can block sensitive material from entering or leaving your networks.Given the features and sophistication of Image-Seeker, we were surprised at the deficiencies in the User Guide and online help. We would like to see several of the interface pages made more user-friendly. Nonetheless, our overall impression was favorable. And LTU Technologies has informed us that the documentation will be revised in the coming months.From experience, we can see how this product would save important time during forensic investigations. We are also impressed at how Image-Seeker is being used in Europe to find Nazi-era loot and detect falsely branded products being processed through customs.Image-Seeker is pricy for what it does. But when customized to your specific needs, it could be priceless., (202) 558-4955,

Image-Seeker



Pros: Versatile tool for searching visual files, customizable

Cons: Poor user manual, bad online help



Performance: A-

Features: A-

Usability: C

Platform Support: A

Vaule: A

Price: $60,000 for a 2-year term license.














Sorting the evidence

















Versatile program







LTU Technologieswww.ltutech.com

Greer is a network security consultant who has conducted computer forensics investigations for a federal agency. He can be reached at egreer@thecourageequation.com.

NEXT STORY: Tech briefs

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.