Advertisement

Exploring Content-Based and Image-Based Features for Nude Image Detection

  • Shi-lin Wang
  • Hong Hui
  • Sheng-hong Li
  • Hao Zhang
  • Yong-yu Shi
  • Wen-tao Qu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3614)

Abstract

This paper introduces some widely used techniques related to nude image detection. By analyzing the merits and drawbacks of these techniques, a new nude image detection method is proposed. The proposed approach consists of two parts: the content-based approach, which aims to detect the nude image by analyzing whether it contains large mass of skin region, and the image-based approach, which extracts the color and spatial information of the image using the color histogram vector and color coherence vector, and makes classification based on the CHV and CCVs of the training samples. From the experimental results, our algorithm can achieve a classification accuracy of 85% with less than 10% false detection rate.

Keywords

Gaussian Mixture Model Principle Component Analysis Face Detection Gabor Filter Equal Error Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Forsyth, D.A., Fleck, M.M.: Identifying Nude Pictures. In: Proceedings of IEEE Workshop on Applications of Computer Vision, pp. 103–108 (1996)Google Scholar
  2. 2.
    Lijuan, D., Guoqing, C., Wen, G., Hongming, Z.: A Hierarchical Method for Nude Image Filtering. Journal of Computer-Aided Design and Computer Graphics 14(5), 404–409 (2002)Google Scholar
  3. 3.
    Viola, P., Joes, M.: Rapid Object Detection using a Boosted Cascade of Simple Features. In: Proceedings of the Fourth ACM International Conference on Multimedia, pp. 65–73 (1996)Google Scholar
  4. 4.
    Manjunath, B.S., Ma, W.Y.: Texture Features for Browsing and Retrieval of Image Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 18(8), 837–842 (1996)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Shi-lin Wang
    • 1
  • Hong Hui
    • 1
  • Sheng-hong Li
    • 2
  • Hao Zhang
    • 2
  • Yong-yu Shi
    • 1
  • Wen-tao Qu
    • 2
  1. 1.School of Information SecurityShanghai Jiaotong Univ.ShanghaiChina
  2. 2.Dept. of Electronic EngineeringShanghai Jiaotong Univ.ShanghaiChina

Personalised recommendations