Skip to main content

Advertisement

Log in

Detection of Harmful Content Using Multilevel Verification in Visual Sensor Data

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Various types of harmful content such as adult images and video clips have been increasingly distributed through wired or wireless visual sensor-based networks. In this paper, we propose a new algorithm for extracting human nipple regions, representing the harmfulness of the images, by using a multilevel verification technique in visual sensor-based image data. The proposed algorithm first detects human face regions including eyes and lips from input images. The method then generates a nipple map utilizing representative features that female nipples have and detects candidate nipple regions by applying the generated nipple map to segmented skin regions followed by morphological operations. Subsequently, the proposed method selects real nipple areas after eliminating non-nipple regions at multiple levels by applying geometrical information and an average color filter to the detected candidate nipple regions. Experimental results show that the proposed method can robustly extract female nipple regions in various types of input images captured in environments where certain constraints are not imposed on.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

References

  1. Hasan, K. K., Ngah, U. K., & Salleh, M. F. M. (2014). Efficient hardware-based image compression schemes for wireless sensor networks: A survey. Wireless Personal Communications, 77(2), 1415–1436.

    Article  Google Scholar 

  2. Haywood, A., Sherbeck, J., Phelan, P., Varsamopoulos, G., & Gupta, S. K. S. (2012, June). Investigating a relationship among CPU and system temperatures, thermal power, and CPU tasking levels. In Proceedings of the IEEE intersociety conference on thermal and thermomechanical phenomena in electronic systems (ITherm’2012), San Diego, USA, pp. 821–827.

  3. Zhang, Z., Lim, H.-T., & Lee, H.-J. (2015). The design of an efficient proxy-based framework for mobile cloud computing. Journal of Information and Communication Convergence Engineering (JICCE), 13(1), 15–20.

    Article  Google Scholar 

  4. Guo, K., Ma, J., & Duan, G. (2014). DHSR: A novel semantic retrieval approach for ubiquitous multimedia. Wireless Personal Communications, 76(4), 779–793.

    Article  Google Scholar 

  5. Suh, D., Kim, J., & Chang, S. (2013). Perceived quality measurement model supporting full session mobility in multimedia service delivery. Wireless Personal Communications, 73(2), 233–242.

    Article  Google Scholar 

  6. Jang, S.-W., Park, Y.-J. G.-Y., Kim, H.-I. Choi, & Hong, M.-C. (2011). An adult image identification system based on robust skin segmentation. Journal of Imaging Science and Technology, 55(2), 020508-1–020508-10.

    Google Scholar 

  7. Lee, J.-S., Kuo, Y.-M., Chung, P.-C., & Chen, E.-L. (2007). Naked image detection based on adaptive and extensible skin color model. Pattern Recognition, 40(8), 2261–2270.

    Article  MATH  Google Scholar 

  8. Shih, J.-L., Lee, C.-H., & Yang, C.-S. (2007). An adult images identification system employing image retrieval technique. Pattern Recognition Letters, 28(16), 2367–2374.

    Article  Google Scholar 

  9. Zheng, Q.-F., Zeng, W., Wen, G., & Wang, W.-Q. (2004, December). Shape-based adult images detection. In Proceedings of the IEEE symposium on multi-agent security and survivability, pp. 150–153.

  10. Hu, W., Wu, O., Chen, Z., Fu, Z., & Maybank, S. (2007). Recognition of pornographic web pages by classifying texts and images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6), 1019–1034.

    Article  Google Scholar 

  11. Park, Y.-J., Weon, S.-H., Sung, J.-K., Choi, H.-I., & Kim, G.-Y. (2012). Identification of adult images through detection of the breast contour and nipple. Information - An International Interdisciplinary Journal, 15(7), 2643–2652.

    Google Scholar 

  12. Tsai, M.-J., & Chang, H.-S. (2013, September). The design of a hybrid feature detector for adult images. In Proceedings of the IEEE seventh international conference on semantic computing (ICSC’13), Irvine, CA, pp. 389–390.

  13. Zheng, H., Liu, H., & Daoudi, M. (2004, June). Blocking objectionable images: adult images and harmful symbols. In Proceedings of the IEEE international conference on multimedia and expo (ICME’04), Taipei, Taiwan. Vol. 2, pp. 1223–1226.

  14. Ochoa, V. M. T., Yayilgan, S. Y., & Cheikh, F. A. (2012, November). Adult video content detection using machine learning techniques. In Proceedings of the international conference on signal image technology and internet based systems (SITIS’12), Naples, Italia, pp. 967–974.

  15. Yin, L., Dong, M., Deng, W., Guo, J., & Zhang, B. (2012, July). Statistical color model based adult video filter. In Proceedings of the IEEE international conference on multimedia and expo workshops (ICMEW’2012), Melbourne, Australia, pp. 349–353.

  16. Lee, S., Kwak, Y., Kim, Y. J., Park, S., & Kim, J. (2012). Contrast-preserved chroma enhancement technique using YCbCr color space. IEEE Transactions on Consumer Electronics, 58(2), 641–645.

    Article  Google Scholar 

  17. Noda, H., Takao, N., & Niimi, M. (2007, September). Colorization in YCbCr space and its application to improve quality of JPEG color images. In Proceedings of the IEEE international conference on image processing (ICIP’ 12), San Antonio, USA, Vol. 4, pp. IV-385–IV-388.

  18. Chiang, J.-S., Hsia, C.-H., Peng, H.-W., Lien, C.-H., & Li, H.-T. (2012, November). Saturation adjustment method based on human vision with YCbCr color model characteristics and luminance changes. In Proceedings of the IEEE international symposium on intelligent signal processing and communications systems (ISPACS’12), New Taipei, Taiwan, pp. 136–141.

  19. Hsu, R.-L., Abdel-Mottaleb, M., & Jain, A. K. (2002). Face detection in color images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(5), 696–706.

    Article  Google Scholar 

  20. Lee, K.-M. (2008). Component-based face detection and verification. Pattern Recognition Letters, 29(3), 200–214.

    Article  Google Scholar 

  21. Jackway, P. T., & Deriche, M. (1996). Scale-space properties of the multi-scale morphological dilation-erosion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(1), 38–51.

    Article  Google Scholar 

  22. Lou, S., Jiang, X., & Scott, P. J. (2012). Algorithms for morphological profile filters and their comparison. Precision Engineering, 36(3), 414–423.

    Article  Google Scholar 

  23. Su, R., Sun, C., Zhang, C., & Pham, T. D. (2014). A new method for linear feature and junction enhancement in 2D images based on morphological operation, oriented anisotropic Gaussian function and Hessian information. Pattern Recognition, 47(10), 3193–3208.

    Article  Google Scholar 

  24. Boutalis, Y. S., Tsirikolias, K., Metrtzios, B. G., & Andreadis, I. T. (2002). Implementation of morphological filters using coordinate logic operations. Pattern Recognition, 35(1), 187–198.

    Article  MATH  Google Scholar 

  25. Wang, X.-H., Wang, J.-Y., Zhang, J.-L., Liang, H.-W., & Kou, P.-M. (2010). Study on the detection of yarn hairiness morphology based on image processing technique. In Proceedings of the international conference on machine learning and cybernetics ( ICMLC’2010 ), Qingdao , China, Vol. 5, pp. 2332–2336.

  26. Zhang, S., Lin, Y., Zhang, X., & Chen, Y. (2010). Airport automatic detection in large space-borne SAR imagery. Journal of Systems Engineering and Electronics, 21(3), 390–396.

    Article  Google Scholar 

  27. Otus, N. (1979). A threshold selection method from gray-level histogram. IEEE Transactions on Systems, Man and Cybernetics, 9(1), 62–66.

    Article  Google Scholar 

  28. Sezgin, M., & Sankur, B. (2004). Survey over image thresholding techniques and quantitative performance evaluation. Journal of Electronic Imaging, 13(1), 146–165.

    Article  Google Scholar 

  29. Arshad, N., Moon, K.-S., & Kim, J.-N. (2014, September). Adaptive real-time ship detection and tracking using morphological operations. Journal of Information and Communication Convergence Engineering, 12(3), 168–172.

  30. Lei, Y., Zheng, L., & Huang, J. (2014). Geometric invariant features in the radon transform domain for near-duplicate image detection. Pattern Recognition, 47(11), 3630–3640.

    Article  Google Scholar 

  31. Gang, L., Li, X.-H., Zhou, J.-L., & Gong, X.-G. (2009, August). Geometric feature-based facial expression recognition using multiclass support vector machines. In Proceedings of the IEEE International Conference on Granular Computing (GRC’ 2009), Nanchang, China, pp. 318–321.

  32. Wang, L., Xu, F., & Hagiwara, I. (2009, April). Investigation into registration of scanned 3D image based on geometric feature identification. In Proceedings of the international conference on computer supported cooperative work in design (CSCWD’2009), Santiago, Chile pp. 648–653.

  33. Sobral, A., & Vacavant, A. (2014). A comprehensive review of background subtraction algorithms evaluated with synthetic and real videos. Computer Vision and Image Understanding, 122, 4–21.

    Article  Google Scholar 

  34. Jamil, N., Bakar, Z. A., & Sembok, T. M. T. (2010, March). Quantitative and qualitative performance evaluations of artificially-produced images. In Proceedings of the international conference on information retrieval and knowledge management (CAMP’10), Shah Alam , Malaysia, pp. 113–118.

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science, and Technology (2011-0021984).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myunghee Jung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jang, SW., Jung, M. Detection of Harmful Content Using Multilevel Verification in Visual Sensor Data. Wireless Pers Commun 86, 109–124 (2016). https://doi.org/10.1007/s11277-015-2966-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2966-1

Keywords

Navigation