Abstract
The internet has become an easy platform for video broadcasting by providing an inexpensive but weak publishing barrier to everyone and eventually attracting the huge audience. Terrorists make use of videos as an efficient medium for spreading their message; showing violence to attract sympathies, terrify viewers and promoting radicalization; videos act as an important weapon towards their mission. Existing internet security solutions and blocking methods rely on textual data and lack analysis of visual content. In this paper, we propose a novel framework that can realistically automate the screening of such videos using visual content analysis and consequently alert the authorities. After examining existing discrete definitions of violence, we classify the broad spectrum of violence in videos into four streams which serve as the core functions of the proposed system. The system is capable of evaluating the semantic context as well as the extent of violence in the videos. Being fully automatic and comprehensive, the system works efficiently and more effectively in comparison to any existing systems proving itself as a powerful combating tool in controlling the means and effects of this mode of terrorism.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
No children under 17 (NC-17), www.en.wikipedia.org/wiki/List_of_NC-17_rated_films.
- 2.
Movies that are restricted for children or require parental check/guideline.
- 3.
Many of these videos were later removed from the video sharing sites after user complaints and flagging.
- 4.
See www.wikipedia.org for explanation of these terms.
- 5.
TRECVID is a worldwide competition organized annually by the National Institute of Standards and Technology, USA. It provides large video datasets to participants for performing experiments for various tasks of the video analysis process. It has served as a platform leading to state of the art technologies. See more at: http://trecvid.nist.gov/
- 6.
Available at: http://www.anvil-software.de
- 7.
References
Yariv T, Gabriel W (2002) www.terror.com-Terror on the Internet. Studies in Conflict & Terrorism, 25:317–332
Dahl G, Vigna SD (2009) Does movie violence increase violent crime? The Q. J. Econ., MIT Press, 124(2):677–734
Using the Web as a Weapon: The Internet as a Tool for Violent Radicalization and Homegrown Terrorism. (2007) (Hearing on Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security House of Representatitves, one hundred tenth congress 2007)
Conway M, McInerney L (2008) Jihadi video & auto-radicalization: evidence from an exploratory YouTube study. Euro ISI 2008, First European Conference on Intelligent and Security Informatics.
Definition of ‘Terrorist’ taken from www.wikipedia.org
The Translational Terrorism, Security and Rule of Law Report (2008) Terrorism and The Media. WorkPackage 4, Deliverable 6. Accessed 25th Jan 2012 http://www.transnationalterrorism.eu/tekst/publications/WP4%20Del%206.pdf
List of blocking software: www.peacefire.org/info/blocking-software-faq.html
Chen L, Hsu H, Wang L, Su C (2011) Violence detection in movies. Eighth international conference computer graphics, imaging and visualization. IEEE Computer Society, pp 119–124
Reisz K, Millar G (1968). The technique of film editing. Focal Press, Oxford UK
Hanjalic A (2004) Content based analysis of digital video. Kluwer Academic Publishers, Delft
Smeaton AF, Over P. (2010) Video shot boundary detection: seven years of trecvid activity. Computer Vision and Image Understanding 114:411–418
Zhang H, Low CY, Smoliar SW, Zhong D (1995) Video parsing, retrieval and browsing: an integrated and content-based solution. Proceedings of the ACM Conference on Multimedia, New York, USA
Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Computing Surveys 31(3):264–323
Chasanis V, Likas A, Galatsanos N (2007) Scene detection in videos using shot clustering and symbolic sequence segmentation. IEEE Proceedings of Multimedia Signal Processing, Crete, Greece
Yuan Y, Pang Y, Pan J, Li X (2009) Scene segmentaion based on IPCA fro visual surveillance. Elsevier Neurocomputing 2450–2454
Wang W, Yang J, Gao W (2008) Modeling background and segmenting moving objects from compressed video. IEEE Proceedings on Circuits and Systems for Video Technology, vol. 18, 670–681
Wang Y, Xing CX, Zhou L (2006) Video semantic models: survey and evaluation. IJCSNS, vol. 6, 10–20
Benetos E, Siatras S, Kotropoulos C, Nikolaidis N, Pitas I (2008) Movie analysis with emphasis to dialogue and action scene detection. Multimedia Processing and Interaction. Springer Science + Business Media, pp 157–177
Datta A, Shah M, Lobo NV (2002) Person-on-person violence detection in video data. IEEE 16th International Conference on Pattern Recognition, pp 433–438
Bovik A (2000) Handbook of Image and video processing. Academic Publishers, San Diego, CA
Ma H, Zhu J, Lyu MR, King I (2007) Bridging the semantic gap between image content and tags. Journal of Latex Files, vol. 12, 1–12
Mihling M, Ewerth R, Friesleben B (2009) Improving semantic video retrieval via object-based features. IEEE International Conference in Semantic Computing. IEEE Computer Society, pp 109–115
Li J, Wang JZ (2007) Real-time computerized annotation of pictures. Proceedings of the ACM Multimedia Conference, Santa Barbara, CA, October 2006. pp. 911–920
Wei L, Hoi SC, Yu N (2010) Semantics-Preserving BoW model and applications. IEEE Transactions on Image Processing, vol. 19, 1908–1920
Smith JR (2006) Large-scale concept ontology for multimedia. IEEE Computer Society 86–91
Nevatia R, Hobbs J, Bolles B, (2004) An ontology for video event representation. Conference on Computer Vision and Pattern Recognition Workshop, p 119
Giannakopoulos T et al (2006) Violence content classification using audio features. Fourth Hellenic conference on Artificial Intelligence, pp 502–507
Zajdel W et al (2007) Cassandra: audio-video scene fusion for aggression detection. IEEE Conference on Advanced Video and Signal Based Surveillance, pp 200–205
Lin J, Wang W (2009) Weakly supervised violence detection in movies with audio and video based co-training. Lecture Notes in Computer Science 5879:930–935
Clarin C et al (2006) DOVE: detection of movie violence using motion intensity analysis on skin and blood. 6th Philippine Computing Science Congress, Computing Society of Phillipines, pp 150–156
Souza FD et al (2010) Violence detection using spatio-temporal features. Proceedings SIBGRAPI 10, Proceedings of the 2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images. ISBN: 978-0-7695-4230-0 doi:10.1109/SIBGRAPI.2010.38, pp. 224–230
Bermejo E, Deniz O, Bueno G, Sukthankar R (2011) Violent action recognition using computer vision techniques. 14th International Conference on Computer Analysis of Images and Patterns, Seville, Spain
Chen L, Hsu H, Wang L, Su C (2011) Violence detection in movies. IEEE Eigth International Conference on Computer Graphics, Imaging and Visualization, pp 119–124
Viola P, Jones MJ (2004) Robust real-time face detection. IJCV 57:137–154
Vinnay Bettadapura (2012) Face expression recognition and analysis: the state of the art. Tech Report, arXiv:1203.6722
Lopes APB, Valle EA Jr, de Almeida JM, de Araújo AA (2010) Action recognition in videos: from motion capture labs to the web. arXiv:1006.3506v1. ACM classes, CVIU, I.4.8; I.4.10
Boggs J, Petrie DW (2000) The art of watching films. Mountain View, CA, USA
Choros K, Pawlaczyk P. (2010) Content-based scene detection and analysis method for automatic classification of TV sports news. RSCTC, LNAI 6086. Springer-Verlag Berlin Heidlberg, pp 120–129
Salem A, Reid E, Chen H (2008) Multimedia content coding and analysis: unraveling the content of jihadi extremist groups’ videos. Studies in Conflict and Terrorism, pp 605–626. Routledge Taylor and Francis Group
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Mirza, DuA., Memon, N. (2013). A Realistic Framework for Counter-terrorism in Multimedia. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_19
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_19
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)