Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Illicit/Pornographic Content Detection & Security  
  Authors : Smita Bhoir; Chaitali Mote; Ashwini Chandak; Dhanashri Wategaonkar
  Cite as:

 

With the dawn of cultural and traditional revolution and the age of information technology, there came a serious threat of illicit/pornographic content, which disturbs the cultural harmony of our society. So with the growing network of these content there arouse a need of application which detects such content and take a legitimate action on the same. So taking this into the consideration, the primary goal of the present study is to develop technology for detecting the illicit/pornographic content and to take legitimate action on such things. The application domain of our project is image processing and this software is going to process the images for illicit/pornographic content by using skin-tone based technology. It is going to detect how much percentage of skin is revealed in an image and depending on this is going to decide that whether that image is acceptable or not. Since the platform used is java, our application will be platform independent. The images detected by our application are going to be encrypted so that if anybody claims for his/her images as personal, the admin can even decrypt the same which makes our application as user friendly and extra secured.Thus with added features and benefits this software stands ahead of any other software is currently in market.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 412 - 414

Figures : 05

Tables : --

Publication Link : Illicit/Pornographic Content Detection & Security/a>

 

 

 

Smita Bhoir : Maharashtra Institute of Technology College of Engineering, Kothrud, Pune 411038,

Chaitali Mote : Maharashtra Institute of Technology College of Engineering, Kothrud, Pune 411038,

Ashwini Chandak : Maharashtra Institute of Technology College of Engineering, Kothrud, Pune 411038,

Dhanashri Wategaonkar : Maharashtra Institute of Technology College of Engineering, Kothrud, Pune 411038,

 

 

 

 

 

 

 

Illicit/ Pornographic content

Skin tones

Face Detection

RGB to HSV conversion

Encryption & Decryption

The application domain of our project is image processing and we are going to process the images for illicit/pornographic content by using skin-tone based technology .In this technology we are going to detect how much percentage of skin is revealed in an image and depending on that software going to decide that whether that image is good or bad. This technology also having encryption and decryption facility which make software more versatile, flexible and secure.

 

 

 

 

 

 

 

 

 

[1] A. Rasim and T. Alexander. “Hand Detection Based on Skin Color Segmentation and Classification of Image Local Features”, TEM Journal-Volume 2, Number 2, 2013. [2] Y. Tayal, R. Lamba and S. Padhee. “Automation Face Detection Using Color Based Segmentation", International Journal of Scientific and Research Publications, Volume 2, Issue 6, June 2012, ISSN 2250- 3153. [3] S. Xie and J. Pan. “Hand Detection Using Robust Color Correction and Gaussian Mixture Model” 2011 Sixth International Conference on Image and Graphics (ICIG), 2011, pp.553-557. [4] M. Zeghid, M. Machhout, L. Khriji, A. Bagann and R. Tourki. “A Modified AES Based Algorithm for Image Encryption”, International Journal of Computer Science and Engineering Volume 1,Number 1,March 2007. [5] A. Abadpour and S. Kasaei. “Pixel-Based Skin Detection for Pornography Filtering”, Iranian Journal of Electrical & Electronic Engineering, Vol. 1, No. 3, July 2005. [6] J.J. Amador, R. W. Green. “Symmetric-Key Block Cipher for Image and Text Cryptography”, International Journal of Imaging Systems and Technology, 3, pp. 178-188, 2005. [7] J. Yang, Z. Fu, T. Tan and W. Hu. “A Novel Approach to Detecting Adult Images”, Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04)1051-4651/04. [8] W. Zhao, R. Chellappa, P. J. Phillips and A. Rosenfeld. “Face recognition: A literature survey,” ACM computing surveys, vol. 35, no. 4, pp. 399 – 458, Dec 2003. [9] Federal Information Processing Standards Publications (FIPS 197),"Advanced Encryption Standard (AES) ", 26 Nov. 2001.