With the dawn of cultural and traditional
revolution and the age of information technology, there came a
serious threat of illicit/pornographic content, which disturbs
the cultural harmony of our society. So with the growing
network of these content there arouse a need of application
which detects such content and take a legitimate action on the
same. So taking this into the consideration, the primary goal of
the present study is to develop technology for detecting the
illicit/pornographic content and to take legitimate action on
such things. The application domain of our project is image
processing and this software is going to process the images for
illicit/pornographic content by using skin-tone based
technology. It is going to detect how much percentage of skin
is revealed in an image and depending on this is going to
decide that whether that image is acceptable or not. Since the
platform used is java, our application will be platform
independent. The images detected by our application are going
to be encrypted so that if anybody claims for his/her images as
personal, the admin can even decrypt the same which makes
our application as user friendly and extra secured.Thus with
added features and benefits this software stands ahead of any
other software is currently in market.
Smita Bhoir : Maharashtra Institute of Technology College of
Engineering, Kothrud, Pune 411038,
Chaitali Mote : Maharashtra Institute of Technology College of
Engineering, Kothrud, Pune 411038,
Ashwini Chandak : Maharashtra Institute of Technology College of
Engineering, Kothrud, Pune 411038,
Dhanashri Wategaonkar : Maharashtra Institute of Technology College of
Engineering, Kothrud, Pune 411038,
Illicit/ Pornographic content
Skin tones
Face
Detection
RGB to HSV conversion
Encryption &
Decryption
The application domain of our project is image
processing and we are going to process the images for
illicit/pornographic content by using skin-tone based
technology .In this technology we are going to detect
how much percentage of skin is revealed in an image
and depending on that software going to decide that
whether that image is good or bad. This technology also
having encryption and decryption facility which make
software more versatile, flexible and secure.
[1] A. Rasim and T. Alexander. “Hand Detection Based on
Skin Color Segmentation and Classification of Image
Local Features”, TEM Journal-Volume 2, Number 2,
2013.
[2] Y. Tayal, R. Lamba and S. Padhee. “Automation Face
Detection Using Color Based Segmentation",
International Journal of Scientific and Research
Publications, Volume 2, Issue 6, June 2012, ISSN 2250-
3153.
[3] S. Xie and J. Pan. “Hand Detection Using Robust Color
Correction and Gaussian Mixture Model” 2011 Sixth
International Conference on Image and Graphics (ICIG),
2011, pp.553-557.
[4] M. Zeghid, M. Machhout, L. Khriji, A. Bagann and R.
Tourki. “A Modified AES Based Algorithm for Image
Encryption”, International Journal of Computer Science
and Engineering Volume 1,Number 1,March 2007.
[5] A. Abadpour and S. Kasaei. “Pixel-Based Skin
Detection for Pornography Filtering”, Iranian Journal of
Electrical & Electronic Engineering, Vol. 1, No. 3, July
2005.
[6] J.J. Amador, R. W. Green. “Symmetric-Key Block Cipher
for Image and Text Cryptography”, International Journal
of Imaging Systems and Technology, 3, pp. 178-188,
2005.
[7] J. Yang, Z. Fu, T. Tan and W. Hu. “A Novel Approach to
Detecting Adult Images”, Proceedings of the 17th
International Conference on Pattern Recognition
(ICPR’04)1051-4651/04.
[8] W. Zhao, R. Chellappa, P. J. Phillips and A. Rosenfeld.
“Face recognition: A literature survey,” ACM computing
surveys, vol. 35, no. 4, pp. 399 – 458, Dec 2003.
[9] Federal Information Processing Standards Publications
(FIPS 197),"Advanced Encryption Standard (AES) ", 26
Nov. 2001.