Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Advancement in Image Processing and Pattern Recognition

Volume 4 Issue 1

Child Predator Detection in Online Chat Conversation using


Support Vector Machine
Sanjivani Chavan1, Rutuja Konde2, Ishita Rajoria3, Tejashree Deshmukh4*, A.S. Sondkar5
1,2,3,4
Student, 5Professor
Department of Computer Engineering,
RDTC, Shri Chhatrapati Shivajiraje College of Engineering, Dhangawadi, India.
*Corresponding Author
Email id:- tejashreedeshmukh29@gmail.com

ABSTRACT
Increase in Internet use and facilitating access to social media platform has help the predatory
to establish online relationships with children which has boost to increase in online
solicitation. We are proposing system that enables us to detect a predator in online chats using
Text classification method. In this paper, the use of machine learning algorithm named as
support vector machine has been used to determine cyber predators. The main objective of our
system is to detect child predator base on chat, comments and post of social media account and
send predator record to cyber cell admin & the use of PAN12 dataset is done for text
classification Purpose. This paper presents our current development to enable the creation of
the child predator system using SVM text classification.

Keywords: SVM, ML, Training Module, dataset.

INTRODUCTION post on social media and send report to


Now a day’s every child uses internet and admin.
Children using social media platform can
easily access internet this helps to predators The rest of the paper is organized as
to easily connect with them. Which can put follows; Section 2 contains Literature
unaware children at high risk and that has is Survey. Section 3 describes existing
the internet predators to established with system. Section 4 describes proposed
them. methodology for identifying predator.
Section 6 gives the knowledge about
Once, online relationship has been algorithm which we are using in this
established child grooming process is then project.
initiated by the predator to build offline
contact. However not all people have the LITERATURE REVIEW
best intensions when using this platform for Ensemble Method for Sexual Predator
interacting with peers and the increased Identification.[1] Author: Muhammad Ali
level of anonymity can favor their Fauzi, Patric Bours shown Study of
inappropriate behavior. Putting this effective methods to identify sexual
problem in context it is very important to predators. Cyber grooming is an evoking
develop a system that automatically detects problem in the world. In today’s time many
the child predator in online chats. records heavily pointed out that it is very
important to deal with this problem to
We are going to implement Child Predator ensure the safety of children in terms of
Detection System on Social Media, which sexual exploitation. In this study the
is a web-based application. This project proposed an effective technique for
aims to detect child predator comments and identification of sexual predator in online

HBRP Publication Page 1-5 2021. All Rights Reserved Page 1


Advancement in Image Processing and Pattern Recognition
Volume 4 Issue 1

chats which has based on two stage conversation to find out all possible attempt
classification. The first stage consists of of child grooming. Use of text analysis
distinguishing the predatory conversation method was primarily done for separating
from normal conversation. At the end of the adult predator pretending to be child. It was
second stage unique predators are derived a step towards detecting online groomers
as a result. They also inspect other machine and making the Internet secure for young
learning classifier namely Naïve Bayes, children.
Random Forest, KNN, Neural Network,
Support Vector Machine, Decision Tree Detection of Cyber Grooming in Online
with the help of bag of words using Conversation. [3] Author: Elif Varol Altay,
different kind of term weighing method for Bilal Altas. They focus was on detection of
this work. Two ensemble techniques were child predators in online chat
also proposed to upgrade classification conversations, 3 different approaches such
task. Their experiment was based on as message-based, author-based and
PAN12 dataset that shown best method conversation-based which is combined
using soft voting-based ensemble for their with 5 more classification algorithms and 2
first stage and in second stage Naïve Bayes features sets. They achieved best results
method obtained F0.5 score from 0.9348 using either the author-based approach with
which would have placed at top position in the classifier Neural Network on the
PAN12 in competition. TF-IDF feature set, or using Ridge or the
Naïve Bayes classifier in
A Step Towards Detecting Online conversation-based approach on TF-IDF
Grooming-Identifying Adults Pretending to feature set. And for the first time in this
be Children. [2] paper, they looked out the quickest way
Author: Michael Ashcroft, Lisa Katti, possible to detect predator and came up
Maxime Meyer implemented automated with the result that in most cases 26-161
investigation of chat room discussion to messages are sufficient is conversation,
detect the possible endeavor of grooming. showing that it can have an early detection
Grooming is a vital problem in today’s system of predators instead of knowing in
world where extra time is spent online. To hindsight children was victim of predator.
become friends and begin a relationship
with youth victims in online circle, Detecting Child Grooming Behavior
groomers frequently affect to be children. Patterns on Social Media.[4] Author:
In this paper they relate an approach that Amparo Elizabeth Cano, Miriam
can be used to detect if an adult is trying to Fernandes, Harith Alani. The paper
pretend as child in a chat room presented a study of online grooming
conversation. The approach elaborates a phases with the help of a machine learning
two-step process where in authors are first perspective. The implemented a method to
divided as children or adults, and then each characterize phases by psycho-linguistic
child is being analyzed and wrong children and discourse patterns content and features
distinguished from genuine children. Their covering sentiment. In this investigation of
results shown that if differentiating adults online chat conversation have shown great
pretending to be children and real output in automatically classifying chat
children’s is quite hard, but have conversations into different grooming
distinguished is with high accuracy. In this steps. Deep understanding of predator
paper they debate about accuracy as well as behavior and way of writing is very
features proposed which one important for essential part to having look at for
the result. It was prime step towards implementing powerful systems for
automated investigation of chat room

HBRP Publication Page 1-5 2021. All Rights Reserved Page 2


Advancement in Image Processing and Pattern Recognition
Volume 4 Issue 1

detection of predatory conversations and which is very huge and disadvantage of this
predators on social media platform. system is if in chatbot’s dataset information
about the topic is not present then it will not
Cyber Bullying detection.[5] Author: be able to answer the predator.
Batoul Haipar, Maroun Phamoun, Fadi
yamout. In their research they have EXISTING SYSTEM
detected cyber bullying like sending sexual There exists various child predator
contents, threatening messages, sending detection system which are used in gaming,
and forwarding private messages to others audio chat and in various online
which is faced by various children around entertainment platform. While playing
the world as well as in Arab countries too, games or for using online audio chat there
earlier researches were done in many exists a child predator system which detects
languages so this time they have mainly an online sexual harassment and prevent
worked on Arabic language cyber bullying child from getting abused or getting
and the detection is done with the help of harassed by sexual predator as this existing
machine learning and language processing. system is only used when the children are
playing games on internet or doing any
A Conversational Agent to Detect Online audio chats. As now we are in internet era
Sex Offenders.[6] Author: John Ibanez various children are now days using social
Rodriguez, Santiago Rocha Duran, Daniel media platform for various social activities.
Diaz-Lopez, Javie Pastor-Galindo, Felix They are mostly active on social media so
Gomez Marmol. There work presents a to prevent child harassment we need a child
system which is called as chatbot, it is used predator detection system for social media.
to detect suspects by using NLP which
interacts with suspect in order to identify PROPOSED SYSTEM
child sexual abuse. An ACE (artificial We propose system for child predator
conversational entity) is used to connect detection system. We implementing 3
different online chat services which help in Modules for detection system.
starting a conversation. Chatbot analyses  User Module (Child/ predator)
the conversation which happens between  Training Module
the chatbot and the suspect and calculate  Cyber System
features to know the suspect behavior.
Chatbot consist a knowledge base data Function of System
which communicates with humans. It User Module: In this project we will show
consists of interactive module which is two types of user. First normal user another
active during the conversation with type showing predator behavior.
suspects and stores information, chats of
suspect in chatbot database. Another one is Training Module: In training Module we
analysis module; this comes in play after are using SVM algorithm for text
the conversation gets finished which classification and image detection. After
categorize and describes suspect behavior. Training Module, we will send predator
Mainly this system is used to build dataset report to cyber admin.
of suspects and categorize them in different Cyber System: Checking all predator report
groups on the basis of their characteristics. and taking action according to that report.
The main advantage of the system is that it
can communicate with 900 suspects weekly

HBRP Publication Page 1-5 2021. All Rights Reserved Page 3


Advancement in Image Processing and Pattern Recognition
Volume 4 Issue 1

MATHEMATICAL MODEL I=set of images.


Input Data for System-:
1. Post & comment-Normal user Working:
2. Post & comment- Predator P={p1,p2,p3,….,pn}
Where, p1=Remove unwanted data
Output for System-: p2= Difference between normal user and
1. Victim Detection predator user.
2. After predator detection account details P3=Detect and send to cyber admin
are fetched from database and send report
to cyber admin Output:
Collection of predator records and sends to
Mathematical Model-: cyber admin.
Let’s consider M as a whole system based
on machine learning method. ALGORITHM
M= {U, W, I, A, S, F} We are using Support Vector Machine
Set of User: (SVM) in our project to detect predator. It is
U= {U1, U2,….Un}. a supervised machine learning model that
S(Success)-: divides dataset into different classes on
When system detect and predator post and hyperplane which is used to find maximum
comment and send report to cyber admin. margin. We’ll feed labeled data to train our
F(Failure)-: model, in prediction phase labeled data will
When system fail to detect any predator get matched with new data with the help of
post and comment. the SVM algorithm in order to give desired
Process-: output.

Text Classification and Image Working of our System -:


classification-: Step 1-: Taking input from user. (image or
Input : text)
W= {w1, w2,……,wn} Step 2-: Read post and Comment.
I={i1,….,in} Step 3-: Classification of text and images
Where, W= set of word a. If any predator data found

HBRP Publication Page 1-5 2021. All Rights Reserved Page 4


Advancement in Image Processing and Pattern Recognition
Volume 4 Issue 1

Fetch all data of predator and jump on step IEEE.


no 4 4. Cano, A. E., Fernandez, M., & Alani,
OR H. (2014, November). Detecting child
b. If any predator not found go back to step grooming behaviour patterns on social
no 1 media. In International conference on
Step 4-: Report send to admin social informatics (pp. 412-427).
Step 5-: Stop Springer, Cham.
5. Haidar, B., Chamoun, M., & Yamout,
CONCLUSION F. (2016, November). Cyberbullying
As each and every one even child is using detection: A survey on multilingual
internet nowadays and getting harassed by techniques. In 2016 European
predators so in order to stop these predators Modelling Symposium (EMS) (pp.
it is very important to detect and punish 165-171). IEEE.
them. The main aim of the groomer is to 6. Rodríguez, J. I., Durán, S. R.,
build a relationship with a child in order to Díaz-López, D., Pastor-Galindo, J., &
gain access to that child. When grooming Mármol, F. G. (2020). C3-sex: A
takes place, it is common that an adult conversational agent to detect online
groomer is pretending to be a child with sex offenders. Electronics, 9(11),
common hobbies or interests to build a 1779.
relationship with child. In this project we 7. Dombrowski, S. C., LeMasney, J. W.,
detect child predator for child safety. And Ahia, C. E., & Dickson, S. A. (2004).
send predator report to cyber admin for Protecting children from online sexual
action. predators: technological,
psychoeducational, and legal
REFERENCES considerations. Professional
1. Fauzi, M. A., & Bours, P. (2020, Psychology: Research and
April). Ensemble Method for Sexual Practice, 35(1), 65.
Predators Identification in Online 8. Wolak, J., Finkelhor, D., Mitchell, K.
Chats. In 2020 8th International J., & Ybarra, M. L. (2010). Online
Workshop on Biometrics and “predators” and their victims: Myths,
Forensics (IWBF) (pp. 1-6). IEEE. realities, and implications for
2. Ashcroft, M., Kaati, L., & Meyer, M. prevention and treatment.
(2015, September). A Step Towards 9. Cano, A. E., Fernandez, M., & Alani,
Detecting Online H. (2014, November). Detecting child
Grooming--Identifying Adults grooming behaviour patterns on social
Pretending to be Children. In 2015 media. In International conference on
European Intelligence and Security social informatics (pp. 412-427).
Informatics Conference (pp. 98-104). Springer, Cham.
IEEE. 10. Lee, H. E., Ermakova, T., Ververis, V.,
3. Altay, E. V., & Alatas, B. (2018, & Fabian, B. (2020). Detecting child
December). Detection of sexual abuse material: A
cyberbullying in social networks using comprehensive survey. Forensic
machine learning methods. In 2018 Science International: Digital
International Congress on Big Data, Investigation, 34, 301022.
Deep Learning and Fighting Cyber
Terrorism (IBIGDELFT) (pp. 87-91).

HBRP Publication Page 1-5 2021. All Rights Reserved Page 5

You might also like