Advertisement

Journal of Real-Time Image Processing

, Volume 14, Issue 1, pp 237–244 | Cite as

Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment

  • Jaeil Lee
  • Inkyung Jeon
  • Hyukjin Kwon
  • Dongil Shin
  • Dongkyoo ShinEmail author
Special Issue Paper

Abstract

In the ubiquitous Web environment which exploits real-time image processing methods, easy access to a variety of digital contents such as movies, e-books, and digital songs significantly enhances people’s quality of life. However, most digital content sites do not provide a concrete mechanism to prohibit minors from accessing harmful content, even though a few mechanisms are available in the market to screen out minors from accessing inappropriate content. This paper proposes a fundamental approach that confirms the age of a user using his digital signature with the X.509 certificate when the user attempts to access specific digital content. Its performance is verified by the implementation of the approach.

Keywords

Adult authentication Digital contents Harmful content X.509 certificate 

Notes

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253).

References

  1. 1.
    Pan, Y., Zhang, J.: Parallel programming on cloud computing platforms—challenges and solutions. J. Converg. 3(4), 22–28 (2012)Google Scholar
  2. 2.
    Thorpe, S.: Virtual machine history model framework for a data cloud digital investigation. J. Converg. 3(4), 9–14 (2012)Google Scholar
  3. 3.
    Sadashiv, N., Kumar, S.: Cluster, grid and cloud computing: a detailed comparison. In: Proceedings of 6th International Conference on Computer Science & Education (ICCSE), Singapore, pp. 477–482 (2011)Google Scholar
  4. 4.
    Cerni, T., Job, R.: Technology and cognition: does the device we use constrain the way we retrieve word meanings?. In: Proceedings of the 9th International Conference on Active Media Technology, Maebashi, Japan, pp. 251–257 (2013)Google Scholar
  5. 5.
    Sanchez-Loro, X., Beltran, V., Casademont, J., Catalan, M.: Ubiquitous web access: collaborative optimization and dynamic content negotiation. In: Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE), Busan, Korea, pp. 558–563 (2008)Google Scholar
  6. 6.
    Furregoni, E., Politecnico di Milano, M., Rangone, A., Renga, F., Valsecchi, M.: The mobile digital contents distribution scenario. In: Proceedings of the International Conference on the Management of Mobile Business (ICMB), Toronto, Canada, pp. 32–41 (2007)Google Scholar
  7. 7.
    Teraoka, T.: Organization and exploration of heterogeneous personal data collected in daily life. Hum-centric Comput. Inf. Sci. (2012). doi: 10.1186/2192-1962-2-1 Google Scholar
  8. 8.
    Ijtihadie, R., Hidayanto, B., Affandi, A., Chisaki, Y., Usagawa, T.: Dynamic content synchronization between learning management systems over limited bandwidth network. Hum-centric Comput. Inf. Sci. (2012). doi: 10.1186/2192-1962-2-17 Google Scholar
  9. 9.
    Chung, K., Lee, J.: Design and development of m-learning service based on 3G cellular phones. J. Inf. Process. Syst. 8(3), 521–538 (2012)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Truong, T., Tran, M., Duong, A.: Improvement of the more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. J. Converg. 3(2), 25–36 (2012)Google Scholar
  11. 11.
    Sharma, M., Leung, V.: IP multimedia subsystem authentication protocol in LTE-heterogeneous network. Hum-centric Comput. Inf. Sci. (2012). doi: 10.1186/2192-1962-2-16 Google Scholar
  12. 12.
    Mohanty, S., Majhi, B.: A strong designated verifiable DL based signcryption scheme. J. Inf. Process. Syst. 8(4), 567–574 (2012)CrossRefGoogle Scholar
  13. 13.
    Chen, C., Tsai, Y., Wang, S.: Cost-saving key agreement via secret sharing in two-party communication systems. J. Converg. 3(4), 29–36 (2012)Google Scholar
  14. 14.
    Cheong, C., Fong, S., Lei, P., Chatwin, C., Young, R.: Designing an efficient and secure credit cardbased payment system with web services based on the ANSI X9.59-2006. J. Inf. Process. Syst. 8(3), 495–520 (2012)CrossRefGoogle Scholar
  15. 15.
    Amato, G., Bolettieri, P., Costa, G., Torre, F., Martinelli, F.: Detection of images with adult content for parental control on mobile devices. In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference, Nice, France (2009)Google Scholar
  16. 16.
    Polonetsky, J.: Age verification for children—a survey of tools and resources. In: Proceedings of the 31st International Conference of Data Protection and Privacy Commissioners, Madrid, Spain (2009)Google Scholar
  17. 17.
    Child Online Protection (COP) Initiative—ITU. http://www.itu.int/en/cop/Pages/about_cop.aspx
  18. 18.
    DIN (Deutsches Institut für Normung): ISO/IEC JTC1/SC27. http://www.jtc1sc27.din.de/cmd?level=tpl-bereich &menuid = 63157&cmsareaid = 63157&languageid = en
  19. 19.
    ISO/IEC JTC 1/SC 27 IT Security techniques. http://www.iso.org/iso/iso_technical_committee?commid=45306
  20. 20.
    Park, J., et al.: Internet X.509 Public Key Infrastructure Subject Identification Method (SIM), RFC 4863, IETF (2006)Google Scholar
  21. 21.
    ITU-T, ITU-T Recommendation X.509 ISO/IEC9594-8, Information technology—Open Systems Interconnection—The Directory: Public-key and attribute certificate frameworks (2008)Google Scholar
  22. 22.
    Masdari, M., Barbin, J.: Distributed certificate management in mobile ad hoc networks. Int. J. Appl. Inf. Syst. 4(6), 33–40 (2012)Google Scholar
  23. 23.
    Bechler, M., Hof, H., Kraft, F., Palke, F., Wolf, L.: A cluster-based security architecture for ad hoc networks. In: Proceedings of INFOCOM 2004, pp. 2393–2403 (2004)Google Scholar
  24. 24.
    Karamanian, A., Tenneti, S., Dessart, F.: PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks. Cisco Press, Indianapolis (2011)Google Scholar
  25. 25.
    Cooper, D. et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC5280, IETF (2008)Google Scholar
  26. 26.
    Santesson, D. et al.: Internet X.509 Public Key Infrastructure: Qualified Certificates Profile. RFC 3799, IETF (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Jaeil Lee
    • 1
  • Inkyung Jeon
    • 1
  • Hyukjin Kwon
    • 2
  • Dongil Shin
    • 3
  • Dongkyoo Shin
    • 3
    Email author
  1. 1.Information Security GroupKorea Internet Security AgencySeoulKorea
  2. 2.Center for Defense AcquisitionKorea Institute for Defense AnalysesSeoulKorea
  3. 3.Department of Computer EngineeringSejong UniversitySeoulKorea

Personalised recommendations