Skip to main content

Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6422))

Abstract

This paper provides a privacy-enhanced method of verifying adults in mobile RFID environment. It can be applied to check whether a user is an adult or not when he or she would like to use some adult contents using mobile terminals playing a role of tag readers in mobile RFID environment. Instead of current adult verification method utilizing the user’s own mobile terminals, the proposed method uses any mobile terminal and provides users with anonymity. Additionally, instead of a conventional rating system based on the user’s age, we proposed four-level rating system (0 to 3) in detail. The adult content is classified based on each category (for example, swear word, nudity, sex, and foul language) and the rating information gets assigned to the adult content based on each category. The rating information is assigned to the user data region of the RFID tag. Through this method, the rating of multi-media content can be expressed with respect to each category using the detailed rating criteria. The weight factors may be differently applied to the categories according to applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. MRF Forum: Adult Certification for Mobile RFID Services. MRFS-4-04 (2005)

    Google Scholar 

  2. BBC News: Children can access mobile porn, http://news.bbc.co.uk/1/hi/uk/4671334.stm

  3. Lubinski, A.: Security issues in mobile database access. In: Proc. of the IFIP WG 11.3 Twelfth International Conference on Database Security (1998)

    Google Scholar 

  4. Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)

    Article  Google Scholar 

  6. Needham, R.M., Schroeder, M.D.: Authentication Revisited. Operating System Review 21(1) (1987)

    Google Scholar 

  7. MRF Forum: Application Data Format for Mobile RFID Services. MRFS-3-02 (2005)

    Google Scholar 

  8. Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments. In: Proc. of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)

    Google Scholar 

  9. Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, N., Kim, Y. (2010). Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16732-4_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16731-7

  • Online ISBN: 978-3-642-16732-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics