A Tool for Implementing COPA+ (Child Online Protection Act)

Slides:



Advertisements
Similar presentations
1 An Introduction to Filtering: Issues and Possible Solutions Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Innovation.
Advertisements

Website Content Filtering Featuring the Restricted to Adults (RTA) Label copyright 2008 rtalabel.org.
August 2000Gio Wiederhold for COPA1 COPA notes Gio Wiederhold Computer Science Dept. and Medicine, Stanford University www-db.stanford.edu/people/gio.html.
Ethics in Information Technology, Fourth Edition
Free speech in the United States Technology and the public network of information A fine line between aggression and expression Strengthening the first.
Odessa national academy of telecommunications n. a. A.S. Popov Department of Automation and control of technological processes CONTENT IMAGES FILTERING.
1 Freedom of Expression Prepared By Joseph Leung.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Jia Li, Ph.D. The Pennsylvania State University Image Retrieval and Annotation via a Stochastic Modeling Approach.
Chapter 5 Freedom of Expression
SIEVE—Search Images Effectively through Visual Elimination Ying Liu, Dengsheng Zhang and Guojun Lu Gippsland School of Info Tech,
1 Filtering - Is This The Answer? Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Information Commission, the Joint.
Filtering, CIPA, Internet Safety, and Your Sanity Art Wolinsky Andy Carvin
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Ethics in Information Technology
Web Design and Development for E-Business By Jensen J. Zhao Copyright 2003 Prentice Hall, Inc. Web Design and Development for E-Business Jensen J. Zhao.
ENDA MOLLOY, ELECTRONIC ENG. FINAL PRESENTATION, 31/03/09. Automated Image Analysis Techniques for Screening of Mammography Images.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
Multimedia Databases (MMDB)
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
ITIS 1210 Introduction to Web-Based Information Systems Chapter 52 Parental Controls on the Internet.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Filtering the Internet in the USA: Free Speech Denied? Richard S.Rosenberg.
ALIP: Automatic Linguistic Indexing of Pictures Jia Li The Pennsylvania State University.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Internet Filtering seyed Ehsan shariaty shiraz university of Technology.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
 We assume the head librarians role  Recently updated the library computer systems  New resource for patrons – internet access  Teenager caught viewing.
1 Filtering Web Content for Staff and the Public Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by Resource: The Council for Museums,
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Chapter 14 How Universal is access to Computers and the Web.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
Internet Filtering Outline Defining internet filtering Arguments for filtering Arguments against filtering Is it an issue in South Africa?
Presented to The Board of Education September 20, 2016
Image Retrieval and Annotation via a Stochastic Modeling Approach
Presented to The Board of Education September 6, 2011
CHAPTER 5 FREEDOM OF EXPRESSION.
Children’s Internet Protection Act (CIPA)
E-commerce | WWW World Wide Web - Concepts
Development of User-Participation-type Communication tools for revitalization of local communities using MapServer Kei SAITO*, Michihiko SHINOZAKI* and.
E-commerce | WWW World Wide Web - Concepts
Introducing the World Wide Web
A Brief Introduction to the Internet
Advanced Techniques for Automatic Web Filtering
In order of appearance:
Advanced Techniques for Automatic Web Filtering
Presented to The Board of Education September 19, 2017
A Gift of Fire Third edition Sara Baase
INTERNET PORNOGRAPHY.
Freedom of Speech in Cyberspace
The First Amendment and the Internet
A Gift of Fire Third edition Sara Baase
Presentation transcript:

A Tool for Implementing COPA+ (Child Online Protection Act) James Z. Wang & Gio Wiederhold, Penn State University. Inf.Sc. / Stanford University, CSD Joint Work: Jia Li, Penn State Statistics wang.ist.psu.edu / www-db.stanford.edu/IMAGE www-db.stanford.edu/pub/gio/inprogress.html#COPA 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Outline The Issues: legal and community pressures Current approaches to protect kids Filtering based on image content Goals and methods The WIPE system Experimental results Website classification by image content Conclusions and future work 11/16/2018 J. Z. Wang & Gio Wiederhold

Status of legal attempts to restrict dissemination of porn to minors: CDA: Communications Decency Act of 1996. Restricts Transmission of Porn. Overturned for being overly restrictive of the rights of adults by Philadelphia district court; decision upheld by Supreme court in 1997. COPA: Child Online Protection Act of 1998. Fines to ISPs for delivering porn to minors. Again overturned for being overly restrictive of the rights of adults in implementation, by Philadelphia district court, decision upheld by appeals, now before Supreme court. NRC study. CIPA: Children's Internet Protection Act , passed late 2000, requires schools and libraries to install filtering software on all Internet-connected computers to screen out pornographic images as a condition of receiving federal funding. The law goes into effect April 20, but a suit is being brought again to the Philadelphia court. Regulations giving the specifics of how to comply to be issued by the Federal Communications Commission ( http://www.fcc.gov ) in late March 2001. The suits were/are filed by the ACLU and the ALA (Am.Library Ass.). Other participants in the arguments include the porn-industry, religious and parental organizations, the FBI, and filtering technology providers 11/16/2018 J. Z. Wang & Gio Wiederhold

The Size and Content of the Web 02/99: ~16 million total web servers Estimated total number of pages on the web: ~800 million 15 Terabytes of text (comparable to text of Library of Congress) Year 2001: 3 to 5 billion pages [Lawrence, Giles, Nature, 1999] Frequency of access and search #2, after music [Google] 11/16/2018 J. Z. Wang & Gio Wiederhold

Pornography-free Websites E.g. Yahoo!Kids, disney.com Useful in protecting those children too young to know how to use the Web browser It is difficult to control access to other sites 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Filtering Software E.g.: NetNanny, Cyber Patrol, CyberSitter Methods: Store more than 10,000 IPs Blocking based on keywords Block all image access Problems: Internet is dynamic, especially porn sites Keywords are not satisfactory text hidden incorporated in images Excessive filtering (Anne Sexton, cum laude, breast cancer) Images are needed for all net users Poor reputation, poor sales, no funds to improve 11/16/2018 J. Z. Wang & Gio Wiederhold

Image based-filtering The problem comes from images! Requirements: high accuracy and high speed Challenges: non-uniform image background, textual noise in foreground, wide range of image quality, wide range of camera positions, wide range of composition… Our approach: rapid feature extraction, machine learning of patterns, fast matching Applications: classify Web images and Websites 11/16/2018 J. Z. Wang & Gio Wiederhold

The WaveletImagePornographyElimination System Inspired by the UC Berkeley’s FNP System Detailed analysis of images Skin filter and human figure grouper Speed: 6 mins CPU time per image Accuracy: 52% sensitivity and 96% specificity Stanford WIPE (medical image analysis spinoff) Wavelet-based feature extraction + image classification + integrated region matching + machine leaning Speed: < 1 second CPU time per image Accuracy: 96% sensitivity and 91% specificity 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold System Flow Source Web Image Feature Extraction (color, texture, shape) Training Feature Extraction (color, texture, shape) Type Classification photograph graph Features from Training Photo Classification Result: REJECT or PASS 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Wavelet Principle 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Type Classification Graphs: Manually-generated images with constant tones, sharp edges. 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Type Classification Photographs: Images with continuous tones. 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Photo Classification Content-based image retrieval + statistical classification 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Experimental Results Tested on a set of over 10,000 photographic images (i.e., after type classification) Speed: Less than one second of response time on a Pentium III PC Accuracy Type of Images Test + (Rejected) Test – (Passed) Objectionable 96% 4% Benign 9% 91% 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold Comment on Accuracy The algorithm can be adjusted to trade-off specificity for higher sensitivity In a real-world filtering application system, both the sensitivity and the specificity are expected to be higher Icons and graphs can be classified with almost 100% accuracy  higher specificity Combine text and image classification  higher sensitivity and higher speed 11/16/2018 J. Z. Wang & Gio Wiederhold

False Classifications Benign Images Partially obscured human Areas with similar features Painting, fine-art Partially undressed human Animals (w/o clothes) 11/16/2018 J. Z. Wang & Gio Wiederhold

False Classifications Objectionable Images Partially dressed Undressed area too small Dressed but objectionable Frame and text noise Dark, low contrast 11/16/2018 J. Z. Wang & Gio Wiederhold

Website Classification by Image Content An objectionable site will have many such images For a given objectionable Website, we denote p as the chance of an image on the Website to be an objectionable image p is the percentage of objectionable images over all images provided by the site We assume some distributions of p over all Websites (e.g., Gaussian, shifted Gaussian) Classification levels could be provided as a service to filtering software producers 11/16/2018 J. Z. Wang & Gio Wiederhold

Flow in Website classification 11/16/2018 J. Z. Wang & Gio Wiederhold

Website Classification Based on statistical analysis (see paper), we know we can expect higher than 97% accuracy on Website classification if We download 20-35 images for each site We classify a Website as objectionable if 20-25% of downloaded images are objectionable Using text and IP addresses as criteria, the accuracy can be further improved skip IPs for museums, dog-shows, beach towns, sport events 11/16/2018 J. Z. Wang & Gio Wiederhold

Internet High Level Domain Proposal .... .kids Sites that are kid-safe, rated by independent organization – several candidates Supported o.a. by porn industry Danger: fake .kids sites .... .xxx Legitimate sites for adults, easy to filter out for kids Potential loss of business for porn-industry (work, schools) No candidate organization – consortium of filter comp's Fear of government interference and loss of freedom No mechanism to force objectionable sites into .xxx Rejected by ICANN, accepted by New.net (Idealab) 11/16/2018 J. Z. Wang & Gio Wiederhold

Conclusions and Future Work Perfect filtering is never possible Effective filtering based on image content is feasible with the current technology Systems that combine content-based filtering with text-based criteria will have good accuracy and acceptable speed Objectionable websites are automatically identifiable, a service for the community? These results were produced rapidly, they can be improved through further research. 11/16/2018 J. Z. Wang & Gio Wiederhold

J. Z. Wang & Gio Wiederhold References http://WWW-DB.Stanford.EDU/IMAGE (papers) http://wang.ist.psu.edu /cgi-bin/zwang/wipe2_show.cgi (demo) http://www-db.stanford.edu /pub/gio/inprogress.html#COPA (testimony) jwang@ist.psu.edu (James Wang) gio@cs.stanford.edu (Gio Wiederhold) michel@db.stanford.edu (Michel Bilello) 11/16/2018 J. Z. Wang & Gio Wiederhold