Skip to main content
Log in

Information audit based on image content filtering

  • Web and Networking Technology
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

At present, network information audit system is almost based on text information filtering, but badness information is embedded into image or image file directly by badness information provider, in order to avoid monitored by. The paper realizes an information audit system based on image content filtering. Taking the pornographic program identification for an example, the system can monitor the video including any abnormal human body information by matching the texture characters with those defined in advance, which consist of contrast, energy, correlation measure and entropy character measure and so on.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Dong Kai-kun, Hu Ming-zeng, Fang Bin-xing. A Survey of Firewall Technology Based on Image Content Filtering.Journal of China Institute of Communications, 2003,24 (1): 83–90.

    Google Scholar 

  2. Xu Qiang, Jiang Zao, Zhao Hong. Research and Implementation of an Intelligent Firewall System Based on Image Content Filtering.Journal of Computer Research and Development, 2000,37(4): 458–464.

    Google Scholar 

  3. National Research Council White Paper.Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet. http://www7.nationalacademies.org/itas, 2004-03.

  4. Guo F, Jin J S, Feng D. Measuring Image Similarity Using the Geometrical Distribution of Image Contents.Proceeding of 4th International Conference on Signal Processing. Washington: SPIE Press, 1998,2: 1108–1112.

    Google Scholar 

  5. Forsyth D A, Fleck M M. Identifying Nude Pictures.Proceeding IEEE Workshop on Applications of Computer Vision. New York: IEEE computer Society Press, 1996, 103–108.

    Google Scholar 

  6. Gao Yong-ying, Zhang Ming-jin. Progressive Image Content Understanding Based on Multi-Level Image Description Model.Acta Electronica Sinica, 2001,29(10): 1376–1380.

    Google Scholar 

  7. Wang J Z, Li J, Wiederhold G,et al. System for Screening Objectionable Images.Computer Communications, 1998,21 (15): 1355–1360.

    Article  Google Scholar 

  8. Yu Fei, Zhu Miao-liang, Chen Yufeng,et al. An Intrusion Alarming System Based on Self-Similarity of Network Traffic.Wuhan University Journal of Natural Sciences, 2005,10(1): 169–173.

    Google Scholar 

  9. Drimbarean A F, Corcoran P M, Cuie M,et al. Image Processing Techniques to Detect and Filter Objectionable Images Based on Skin Tone and Shape Recognition.Proceeding of the International Conference on Consumer Electronics. Boston: USENIX, Press, 2001, 278–279.

    Google Scholar 

  10. Li Xiang-yang.Research on Image Database Retrieval Technology and It's Model Based on Image Content. Hangzhou: Computer Department of Zhejiang University, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhu Miao-liang.

Additional information

Foundation item: Supported by Hunan Provincial Natural Science Foundation of China(03JJY3103)

Biography: YU Fei (1973-), male, Ph. D. candidate, research direction: network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fei, Y., Yue, S., Ji-yao, A. et al. Information audit based on image content filtering. Wuhan Univ. J. Nat. Sci. 11, 234–238 (2006). https://doi.org/10.1007/BF02831738

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831738

Key words

CLC number

Navigation