Technology
L’entreprise analyse des photographies de scènes de crime issues d’Europe - III
Analyser les médias et les réseaux

Insight into the Crime Photographic Images (Source: ©Alex-Morgan)
USPA NEWS -
L’apprentissage de la photographie ne se limite pas à la maîtrise des fonctions techniques de l’appareil. Il exige surtout la compréhension et l’appréciation de l’art photographique. Nous concentrons cette étude sur le rôle et l’importance des images de criminalité et des images sélectionnées dans les médias.
Dans les médias, l’image oriente l’attention du public vers la question visée. La photographie constitue donc un levier central pour capter, diriger et maintenir l’intérêt. Elle peut émouvoir, informer et inspirer chaque individu. Nous recommandons d’intégrer des images pertinentes pour renforcer la clarté du message et l’impact éditorial.
Les médias et la société sont interdépendants. Sans médias, la société perd l’accès rapide aux informations récentes. Sans société, les médias perdent leur raison d’être et disparaissent. Le public fait des supports d’information ses principales sources d’actualités [1–7].
Dans les médias, l’image oriente l’attention du public vers la question visée. La photographie constitue donc un levier central pour capter, diriger et maintenir l’intérêt. Elle peut émouvoir, informer et inspirer chaque individu. Nous recommandons d’intégrer des images pertinentes pour renforcer la clarté du message et l’impact éditorial.
Les médias et la société sont interdépendants. Sans médias, la société perd l’accès rapide aux informations récentes. Sans société, les médias perdent leur raison d’être et disparaissent. Le public fait des supports d’information ses principales sources d’actualités [1–7].
IV. ANALYSE DE L’IMAGE
Toute image porte un message intentionnel, même privée, et concentre des valeurs. Bien comprise, elle renforce la vie sociale. L’image transmet vite et sans ambiguïté, clarifie l’information et influence les émotions. Elle évite le recours à un vocabulaire complexe. Les opinions sur les images viennent des médias publiés et des échanges sociaux. Les travaux récents attribuent aux images un pouvoir de cadrage du monde mental du spectateur. La photographie apparaît plus accessible que la peinture: naturelle, directe, authentique.
La crédibilité d’une image ouvre des lectures multiples. Les études soulignent la pluralité d’interprétations, selon l’expérience du spectateur. Cette richesse fonde l’intérêt analytique de l’image, notamment dans les médias locaux. L’image est un outil de communication distinctif. Elle se comprend vite et se commente simplement. Elle symbolise le réel, capte l’intérêt et suscite des retours variés [21–23]. La photographie résulte de l’ingéniosité humaine et répond à des besoins multiples.
Toute image porte un message intentionnel, même privée, et concentre des valeurs. Bien comprise, elle renforce la vie sociale. L’image transmet vite et sans ambiguïté, clarifie l’information et influence les émotions. Elle évite le recours à un vocabulaire complexe. Les opinions sur les images viennent des médias publiés et des échanges sociaux. Les travaux récents attribuent aux images un pouvoir de cadrage du monde mental du spectateur. La photographie apparaît plus accessible que la peinture: naturelle, directe, authentique.
La crédibilité d’une image ouvre des lectures multiples. Les études soulignent la pluralité d’interprétations, selon l’expérience du spectateur. Cette richesse fonde l’intérêt analytique de l’image, notamment dans les médias locaux. L’image est un outil de communication distinctif. Elle se comprend vite et se commente simplement. Elle symbolise le réel, capte l’intérêt et suscite des retours variés [21–23]. La photographie résulte de l’ingéniosité humaine et répond à des besoins multiples.
Elle fournit des idées et de l’information. Elle peut être simple ou complexe, émotionnelle ou schématique. Elle persuade et peut modifier des croyances.
Exemples:
- Un article sur la maltraitance maternelle peut susciter du scepticisme. Une photo probante dissipe ce doute et réoriente la croyance.
- Les récits d’extraterrestres paraissent fabuleux. Des images convaincantes peuvent amener à y croire.
Les sources récentes décrivent cinq qualités utiles pour apprécier une image: synthétique, crédible, vive et concrète, simplifiée, ambivalente. L’image est puissante et captivante. Elle sert aussi la propagande. Elle persuade, soutient l’écriture, détend et comble des vides éditoriaux sur les réseaux sociaux [24–28].
- Un article sur la maltraitance maternelle peut susciter du scepticisme. Une photo probante dissipe ce doute et réoriente la croyance.
- Les récits d’extraterrestres paraissent fabuleux. Des images convaincantes peuvent amener à y croire.
Les sources récentes décrivent cinq qualités utiles pour apprécier une image: synthétique, crédible, vive et concrète, simplifiée, ambivalente. L’image est puissante et captivante. Elle sert aussi la propagande. Elle persuade, soutient l’écriture, détend et comble des vides éditoriaux sur les réseaux sociaux [24–28].
Références
[1] L. Zhijun and W. Ning, “A Cyber Crime Investigation Model Based on Case Characteristics,” 2017 4th International Conference on Information Science and Control Engineering (ICISCE), 2017, pp. 11–15, doi: 10.1109/ICISCE.2017.12.
[2] F. Ahmed, F. Khelifi, A. Lawgaly and A. Bouridane, “The ‘Northumbria Temporal Image Forensics’ Database: Description and Analysis,” 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), 2020, pp. 982–987, doi: 10.1109/CoDIT49905.2020.9263888.
[3] N. Nayak, P. N. Hegde, Anusha, P. Nayak, P. S. Venugopala and T. Kumaki, “Morphological Pattern Spectrum Based Image Manipulation Detection,” 2017 IEEE 7th International Advance Computing Conference (IACC), 2017, pp. 596–599, doi: 10.1109/IACC.2017.0127..
[4] K. Kageyama, T. Kumaki and T. Koide, “Structuring Element-counting Approach for Morphological Pattern Spectrum-based Image Manipulation Detection,” 2019 2nd International Symposium on Devices, Circuits and Systems (ISDCS), 2019, pp. 1–4, doi: 10.1109/ISDCS.2019.8719260.
[5] Q. Gu, W. Cai, S. Yu and Z. Chen, “An Exploratory Study on Judicial Image Quality Assessment Based on Deep Learning,” 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), 2019, pp. 300–305, doi: 10.1109/QRS.2019.00046.
[6] D. J. Salim and B. -S. Lin, “Everyone is A Forensic Artist: Sketch-to-Photo Transformation for Human Face,” 2021 IEEE 4th International Conference on Knowledge Innovation and Invention (ICKII), 2021, pp. 118–122, doi: 10.1109/ICKII51822.2021.9574719.
[7] R. Kokila, M. S. Sannidhan and A. Bhandary, “A study and analysis of various techniques to match sketches to Mugshot photos,” 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), 2017, pp. 41–44, doi: 10.1109/ICICCT.2017.7975243.
[8] M. K. J. Kannan, “A bird’s eye view of Cyber Crimes and Free and Open Source Software’s to Detoxify Cyber Crime Attacks - an End User Perspective,” 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 232–237, doi: 10.1109/Anti-Cybercrime.2017.7905297.
[6] D. J. Salim and B. -S. Lin, “Everyone is A Forensic Artist: Sketch-to-Photo Transformation for Human Face,” 2021 IEEE 4th International Conference on Knowledge Innovation and Invention (ICKII), 2021, pp. 118–122, doi: 10.1109/ICKII51822.2021.9574719.
[7] R. Kokila, M. S. Sannidhan and A. Bhandary, “A study and analysis of various techniques to match sketches to Mugshot photos,” 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), 2017, pp. 41–44, doi: 10.1109/ICICCT.2017.7975243.
[8] M. K. J. Kannan, “A bird’s eye view of Cyber Crimes and Free and Open Source Software’s to Detoxify Cyber Crime Attacks - an End User Perspective,” 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 232–237, doi: 10.1109/Anti-Cybercrime.2017.7905297.
[9] Y. Cai, D. Li and Y. Wang, “Network Crime Information Retrieval Framework based on Facial Image Recognition,” 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), 2020, pp. 965–969, doi: 10.1109/ICISS49785.2020.9316037.
[10] K. Ravichandran and S. Arulchelvan, “Structural Equation Model Analyzed on Cyber Crime and Media Awareness in India,” 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), 2017, pp. 141–146, doi: 10.1109/ICRTCCM.2017.79.
[11] G. Garcia-Zanabria et al., “Mirante: A visualization tool for analyzing urban crimes,” 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 2020, pp. 148–155, doi: 10.1109/SIBGRAPI51738.2020.00028.
[10] K. Ravichandran and S. Arulchelvan, “Structural Equation Model Analyzed on Cyber Crime and Media Awareness in India,” 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), 2017, pp. 141–146, doi: 10.1109/ICRTCCM.2017.79.
[11] G. Garcia-Zanabria et al., “Mirante: A visualization tool for analyzing urban crimes,” 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 2020, pp. 148–155, doi: 10.1109/SIBGRAPI51738.2020.00028.
[12] K. Biron, W. Mansoor, S. Miniaoui, S. Atalla, H. Mukhtar and K. F. Bin Hashim, “Data Science Tools for Crime Investigation, Archival, and Analysis,” 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2019, pp. 1263–1266, doi: 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00235.
[13] V. Mahor, R. Rawat, S. Telang, B. Garg, D. Mukhopadhyay and P. Palimkar, “Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data,” 2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON), 2021, pp. 1–5, doi: 10.1109/GUCON50781.2021.9573736.
[13] V. Mahor, R. Rawat, S. Telang, B. Garg, D. Mukhopadhyay and P. Palimkar, “Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data,” 2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON), 2021, pp. 1–5, doi: 10.1109/GUCON50781.2021.9573736.
[14] S. N. Huda Sheikh Abdullah et al., “Assessment of Self-Identity Among Teens Towards Self-Crime Prevention Program,” 2018 Cyber Resilience Conference (CRC), 2018, pp. 1–4, doi: 10.1109/CR.2018.8626870.
[15] P. B. Shailaja Rani and A. Kumar, “Digital Image Forgery Detection Techniques: A Comprehensive Review,” 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 2019, pp. 959–963, doi: 10.1109/ICECA.2019.8822064.
[16] G. U. Reddy, M. Madhu Bala and B. Padmaja, “An Overview on Digital Forensics Tools used in Crime Investigation for Forgery Detection,” 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020, pp. 1–5, doi: 10.1109/ICCSEA49143.2020.9132965.
[15] P. B. Shailaja Rani and A. Kumar, “Digital Image Forgery Detection Techniques: A Comprehensive Review,” 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 2019, pp. 959–963, doi: 10.1109/ICECA.2019.8822064.
[16] G. U. Reddy, M. Madhu Bala and B. Padmaja, “An Overview on Digital Forensics Tools used in Crime Investigation for Forgery Detection,” 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020, pp. 1–5, doi: 10.1109/ICCSEA49143.2020.9132965.
[17] K. M. Mohan, K. Chandra Sekharaiah, P. Premchand, G. U. Pullaiah and B. Malathi, “Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway,” 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), 2018, pp. 205–209, doi: 10.1109/CCCS.2018.8586801.
[18] R. Dremliuga, A. Iakovenko and N. Prisekina, “Crime in virtual reality: discussion,” 2019 International Conference on Cybersecurity (ICoCSec), 2019, pp. 81–85, doi: 10.1109/ICoCSec47621.2019.8970947.
[19] G. Rusman and E. Popova, “Development of the Software for Examination of the Crime Scene by Using Virtual Reality, Based on Spherical Panoramic Shot and 3D-Scanning,” 2020 Global Smart Industry Conference (GloSIC), 2020, pp. 297–302, doi: 10.1109/GloSIC50886.2020.9267871.
[18] R. Dremliuga, A. Iakovenko and N. Prisekina, “Crime in virtual reality: discussion,” 2019 International Conference on Cybersecurity (ICoCSec), 2019, pp. 81–85, doi: 10.1109/ICoCSec47621.2019.8970947.
[19] G. Rusman and E. Popova, “Development of the Software for Examination of the Crime Scene by Using Virtual Reality, Based on Spherical Panoramic Shot and 3D-Scanning,” 2020 Global Smart Industry Conference (GloSIC), 2020, pp. 297–302, doi: 10.1109/GloSIC50886.2020.9267871.
[20] D. S. Hartley, “Modeling psycho-social attributes in conflict, extended,” Winter Simulation Conference Proceedings, 1995., 1995, pp. 1244–1249, doi: 10.1109/WSC.1995.479031.
[21] N. Jayakanthan and J. Wisvambari, “An Investigation based Approach to Detect the Root cause of Crime in Modern Era,” 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), 2021, pp. 1–4, doi: 10.1109/ICAECA52838.2021.9675704.
[22] R. Ramirez and N. Choucri, “Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review,” in IEEE Access, vol. 4, pp. 2216–2243, 2016, doi: 10.1109/ACCESS.2016.2544381.
[23] U. Merlone, E. Manassero and G. Zara, “The lingering effects of past crimes over future criminal careers,” 2016 Winter Simulation Conference (WSC), 2016, pp. 3532–3543, doi: 10.1109/WSC.2016.7822382.
[21] N. Jayakanthan and J. Wisvambari, “An Investigation based Approach to Detect the Root cause of Crime in Modern Era,” 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), 2021, pp. 1–4, doi: 10.1109/ICAECA52838.2021.9675704.
[22] R. Ramirez and N. Choucri, “Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review,” in IEEE Access, vol. 4, pp. 2216–2243, 2016, doi: 10.1109/ACCESS.2016.2544381.
[23] U. Merlone, E. Manassero and G. Zara, “The lingering effects of past crimes over future criminal careers,” 2016 Winter Simulation Conference (WSC), 2016, pp. 3532–3543, doi: 10.1109/WSC.2016.7822382.
[24] D. Ackerman and H. Mehrpouyan, “Modeling human behavior to anticipate insider attacks via System Dynamics,” 2016 Symposium on Theory of Modeling and Simulation (TMS-DEVS), 2016, pp. 1–6, doi: 10.23919/TMS.2016.7918809.
[25] Jian Li, S. G. Nikolov, C. P. Benton and N. E. Scott-Samuel, “Adaptive summarisation of surveillance video sequences,” 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, 2007, pp. 546–551, doi: 10.1109/AVSS.2007.4425369.
[26] A. Jevremovic et al., “Keeping Children Safe Online With Limited Resources: Analyzing What is Seen and Heard,” in IEEE Access, vol. 9, pp. 132723–132732, 2021, doi: 10.1109/ACCESS.2021.3114389.
[25] Jian Li, S. G. Nikolov, C. P. Benton and N. E. Scott-Samuel, “Adaptive summarisation of surveillance video sequences,” 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, 2007, pp. 546–551, doi: 10.1109/AVSS.2007.4425369.
[26] A. Jevremovic et al., “Keeping Children Safe Online With Limited Resources: Analyzing What is Seen and Heard,” in IEEE Access, vol. 9, pp. 132723–132732, 2021, doi: 10.1109/ACCESS.2021.3114389.
[27] C. H. Ngejane, G. Mabuza-Hocquet, J. H. P. Eloff and S. Lefophane, “Mitigating Online Sexual Grooming Cybercrime on Social Media Using Machine Learning: A Desktop Survey,” 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD), 2018, pp. 1–6, doi: 10.1109/ICABCD.2018.8465413.
[28] H. Ghodosi and I. Lee, “Unconditional security and privacy preserving oblivious transfer,” 2012 7th International Conference on Computing and Convergence Technology (ICCCT), 2012, pp. 1042–1047.
[28] H. Ghodosi and I. Lee, “Unconditional security and privacy preserving oblivious transfer,” 2012 7th International Conference on Computing and Convergence Technology (ICCCT), 2012, pp. 1042–1047.
Photographie Criminelle Images Du Crime Aperçu Sur Le Crime Photographie Europe Photographie Amérique Du Nord
Liability for this article lies with the author, who also holds the copyright. Editorial content from USPA may be quoted on other websites as long as the quote comprises no more than 5% of the entire text, is marked as such and the source is named (via hyperlink).




