Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2361407.2361425acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Recognizing pornographic images

Published:06 September 2012Publication History

ABSTRACT

We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions in order to capture alarming Regions of Interest (ROIs). The technique to identify ROIs in an image employs a region-splitting scheme, in which the image plane is recursively partitioned into quadrants. Splitting is achieved by considering both the accumulation of skin pixels and texture coherence. This processing step is proven to significantly boost the accuracy and reduction of running time demands, even in the presence of sparse noise due to errors attributed to skin segmentation. For detected ROIs, we extract 15 rough color and spatial features computed from the pixels residing in the ROI. A novel classification scheme based on a tree-structured ensemble of strong Random Forest classifiers is also proposed. The method achieves competitive performance both in terms of response time and accuracy when compared to the state-of-the-art.

References

  1. L. Breiman. Random forests. Machine learning, 45(1):5--32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Fleck, D. Forsyth, and C. Bregler. Finding naked people. In Proc. ECCV, pages 593--602, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Hu. Visual pattern recognition by moment invariants. IRE Transactions on Information Theory, 8(2):179--187, 1962.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Karavarsamis, N. Ntarmos, and K. Blekas. InFeRno-an intelligent framework for recognizing pornographic web pages. In Proc. ECML PKDD, pages 638--641, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Materka and M. Strzelecki. Texture analysis methods-a review. Technical report, Tech. Univ. of Lodz, Inst. of Electronics, 1998.Google ScholarGoogle Scholar
  6. POESIA project. http://www.poesia-filter.org/.Google ScholarGoogle Scholar
  7. J. Quinlan. C4.5: Programs for machine learning. Morgan kaufmann, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Shi, J. Yang, and R. Wu. Reducing illumination based on nonlinear gamma correction. In Proc. IEEE ICIP, volume 1, pages 529--532, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  9. V. Vezhnevets, V. Sazonov, and A. Andreeva. A survey on pixel-based skin color detection techniques. In Proc. Graphicon, volume 3, 2003.Google ScholarGoogle Scholar
  10. J. Wang, J. Li, G. Wiederhold, and O. Firschein. Classifying objectionable websites based on image content. In Proc. IDMS, pages 113--124, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Wang, G. Wiederhold, and O. Firschein. System for screening objectionable images using Daubechies' wavelets and color histograms. In Proc. IDMS, pages 20--30, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Yang, Y. Shi, and M. Xiao. Geometric feature-based skin image classification. In Proc. ICIC, pages 1158--1169, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Recognizing pornographic images

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '12: Proceedings of the on Multimedia and security
      September 2012
      184 pages
      ISBN:9781450314176
      DOI:10.1145/2361407

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 September 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader