Skip to main content
Log in

Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

An Erratum to this article was published on 02 May 2017

This article has been updated

Abstract

In the ubiquitous Web environment which exploits real-time image processing methods, easy access to a variety of digital contents such as movies, e-books, and digital songs significantly enhances people’s quality of life. However, most digital content sites do not provide a concrete mechanism to prohibit minors from accessing harmful content, even though a few mechanisms are available in the market to screen out minors from accessing inappropriate content. This paper proposes a fundamental approach that confirms the age of a user using his digital signature with the X.509 certificate when the user attempts to access specific digital content. Its performance is verified by the implementation of the approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

  • 02 May 2017

    An erratum to this article has been published.

References

  1. Pan, Y., Zhang, J.: Parallel programming on cloud computing platforms—challenges and solutions. J. Converg. 3(4), 22–28 (2012)

    Google Scholar 

  2. Thorpe, S.: Virtual machine history model framework for a data cloud digital investigation. J. Converg. 3(4), 9–14 (2012)

    Google Scholar 

  3. Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: Proceedings of 6th International Conference on Computer Science & Education (ICCSE), Singapore, pp. 477–482 (2011)

  4. Cerni, T., Job, R.: Technology and cognition: does the device we use constrain the way we retrieve word meanings?. In: Proceedings of the 9th International Conference on Active Media Technology, Maebashi, Japan, pp. 251–257 (2013)

  5. Sanchez-Loro, X., Beltran, V., Casademont, J., Catalan, M.: Ubiquitous web access: collaborative optimization and dynamic content negotiation. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE), Busan, Korea, pp. 558–563 (2008)

  6. Furregoni, E., Politecnico di Milano, M., Rangone, A., Renga, F., Valsecchi, M.: The mobile digital contents distribution scenario. In: Proceedings of the International Conference on the Management of Mobile Business (ICMB), Toronto, Canada, pp. 32–41 (2007)

  7. Teraoka, T.: Organization and exploration of heterogeneous personal data collected in daily life. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-1

    Google Scholar 

  8. Ijtihadie, R., Hidayanto, B., Affandi, A., Chisaki, Y., Usagawa, T.: Dynamic content synchronization between learning management systems over limited bandwidth network. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-17

    Google Scholar 

  9. Chung, K., Lee, J.: Design and development of m-learning service based on 3G cellular phones. J. Inf. Process. Syst. 8(3), 521–538 (2012)

    Article  MathSciNet  Google Scholar 

  10. Truong, T., Tran, M., Duong, A.: Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. J. Converg. 3(2), 25–36 (2012)

    Google Scholar 

  11. Sharma, M., Leung, V.: IP multimedia subsystem authentication protocol in LTE-heterogeneous network. Hum-centric Comput. Inf. Sci. (2012). doi:10.1186/2192-1962-2-16

    Google Scholar 

  12. Mohanty, S., Majhi, B.: A strong designated verifiable DL based signcryption scheme. J. Inf. Process. Syst. 8(4), 567–574 (2012)

    Article  Google Scholar 

  13. Chen, C., Tsai, Y., Wang, S.: Cost-saving key agreement via secret sharing in two-party communication systems. J. Converg. 3(4), 29–36 (2012)

    Google Scholar 

  14. Cheong, C., Fong, S., Lei, P., Chatwin, C., Young, R.: Designing an efficient and secure credit cardbased payment system with web services based on the ANSI X9.59-2006. J. Inf. Process. Syst. 8(3), 495–520 (2012)

    Article  Google Scholar 

  15. Amato, G., Bolettieri, P., Costa, G., Torre, F., Martinelli, F.: Detection of images with adult content for parental control on mobile devices. In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference, Nice, France (2009)

  16. Polonetsky, J.: Age verification for children—a survey of tools and resources. In: Proceedings of the 31st International Conference of Data Protection and Privacy Commissioners, Madrid, Spain (2009)

  17. Child Online Protection (COP) Initiative—ITU. http://www.itu.int/en/cop/Pages/about_cop.aspx

  18. DIN (Deutsches Institut für Normung): ISO/IEC JTC1/SC27. http://www.jtc1sc27.din.de/cmd?level=tpl-bereich &menuid = 63157&cmsareaid = 63157&languageid = en

  19. ISO/IEC JTC 1/SC 27 IT Security techniques. http://www.iso.org/iso/iso_technical_committee?commid=45306

  20. Park, J., et al.: Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), RFC 4863, IETF (2006)

  21. ITU-T, ITU-T Recommendation X.509 ISO/IEC9594-8, Information technology—Open Systems Interconnection—The Directory: Public-key and attribute certificate frameworks (2008)

  22. Masdari, M., Barbin, J.: Distributed certificate management in mobile ad hoc networks. Int. J. Appl. Inf. Syst. 4(6), 33–40 (2012)

    Google Scholar 

  23. Bechler, M., Hof, H., Kraft, F., Palke, F., Wolf, L.: A cluster-based security architecture for ad hoc networks. In: Proceedings of INFOCOM 2004, pp. 2393–2403 (2004)

  24. Karamanian, A., Tenneti, S., Dessart, F.: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks. Cisco Press, Indianapolis (2011)

    Google Scholar 

  25. Cooper, D. et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC5280, IETF (2008)

  26. Santesson, D. et al.: Internet X.509 Public Key Infrastructure: Qualified Certificates Profile. RFC 3799, IETF (2004)

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongkyoo Shin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, J., Jeon, I., Kwon, H. et al. Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment. J Real-Time Image Proc 14, 237–244 (2018). https://doi.org/10.1007/s11554-016-0601-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-016-0601-3

Keywords

Navigation