Abstract
In the ubiquitous Web environment which exploits real-time image processing methods, easy access to a variety of digital contents such as movies, e-books, and digital songs significantly enhances people’s quality of life. However, most digital content sites do not provide a concrete mechanism to prohibit minors from accessing harmful content, even though a few mechanisms are available in the market to screen out minors from accessing inappropriate content. This paper proposes a fundamental approach that confirms the age of a user using his digital signature with the X.509 certificate when the user attempts to access specific digital content. Its performance is verified by the implementation of the approach.
Similar content being viewed by others
Change history
02 May 2017
An erratum to this article has been published.
References
Pan, Y., Zhang, J.: Parallel programming on cloud computing platforms—challenges and solutions. J. Converg. 3(4), 22–28 (2012)
Thorpe, S.: Virtual machine history model framework for a data cloud digital investigation. J. Converg. 3(4), 9–14 (2012)
Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: Proceedings of 6th International Conference on Computer Science & Education (ICCSE), Singapore, pp. 477–482 (2011)
Cerni, T., Job, R.: Technology and cognition: does the device we use constrain the way we retrieve word meanings?. In: Proceedings of the 9th International Conference on Active Media Technology, Maebashi, Japan, pp. 251–257 (2013)
Sanchez-Loro, X., Beltran, V., Casademont, J., Catalan, M.: Ubiquitous web access: collaborative optimization and dynamic content negotiation. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE), Busan, Korea, pp. 558–563 (2008)
Furregoni, E., Politecnico di Milano, M., Rangone, A., Renga, F., Valsecchi, M.: The mobile digital contents distribution scenario. In: Proceedings of the International Conference on the Management of Mobile Business (ICMB), Toronto, Canada, pp. 32–41 (2007)
Teraoka, T.: Organization and exploration of heterogeneous personal data collected in daily life. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-1
Ijtihadie, R., Hidayanto, B., Affandi, A., Chisaki, Y., Usagawa, T.: Dynamic content synchronization between learning management systems over limited bandwidth network. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-17
Chung, K., Lee, J.: Design and development of m-learning service based on 3G cellular phones. J. Inf. Process. Syst. 8(3), 521–538 (2012)
Truong, T., Tran, M., Duong, A.: Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. J. Converg. 3(2), 25–36 (2012)
Sharma, M., Leung, V.: IP multimedia subsystem authentication protocol in LTE-heterogeneous network. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-16
Mohanty, S., Majhi, B.: A strong designated verifiable DL based signcryption scheme. J. Inf. Process. Syst. 8(4), 567–574 (2012)
Chen, C., Tsai, Y., Wang, S.: Cost-saving key agreement via secret sharing in two-party communication systems. J. Converg. 3(4), 29–36 (2012)
Cheong, C., Fong, S., Lei, P., Chatwin, C., Young, R.: Designing an efficient and secure credit cardbased payment system with web services based on the ANSI X9.59-2006. J. Inf. Process. Syst. 8(3), 495–520 (2012)
Amato, G., Bolettieri, P., Costa, G., Torre, F., Martinelli, F.: Detection of images with adult content for parental control on mobile devices. In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference, Nice, France (2009)
Polonetsky, J.: Age verification for children—a survey of tools and resources. In: Proceedings of the 31st International Conference of Data Protection and Privacy Commissioners, Madrid, Spain (2009)
Child Online Protection (COP) Initiative—ITU. http://www.itu.int/en/cop/Pages/about_cop.aspx
DIN (Deutsches Institut für Normung): ISO/IEC JTC1/SC27. http://www.jtc1sc27.din.de/cmd?level=tpl-bereich &menuid = 63157&cmsareaid = 63157&languageid = en
ISO/IEC JTC 1/SC 27 IT Security techniques. http://www.iso.org/iso/iso_technical_committee?commid=45306
Park, J., et al.: Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), RFC 4863, IETF (2006)
ITU-T, ITU-T Recommendation X.509 ISO/IEC9594-8, Information technology—Open Systems Interconnection—The Directory: Public-key and attribute certificate frameworks (2008)
Masdari, M., Barbin, J.: Distributed certificate management in mobile ad hoc networks. Int. J. Appl. Inf. Syst. 4(6), 33–40 (2012)
Bechler, M., Hof, H., Kraft, F., Palke, F., Wolf, L.: A cluster-based security architecture for ad hoc networks. In: Proceedings of INFOCOM 2004, pp. 2393–2403 (2004)
Karamanian, A., Tenneti, S., Dessart, F.: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks. Cisco Press, Indianapolis (2011)
Cooper, D. et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC5280, IETF (2008)
Santesson, D. et al.: Internet X.509 Public Key Infrastructure: Qualified Certificates Profile. RFC 3799, IETF (2004)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, J., Jeon, I., Kwon, H. et al. Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J Real-Time Image Proc 14, 237–244 (2018). https://doi.org/10.1007/s11554-016-0601-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-016-0601-3