Odessa national academy of telecommunications n. a. A.S. Popov Department of Automation and control of technological processes CONTENT IMAGES FILTERING.

Slides:



Advertisements
Similar presentations
Final Project Instructor: Nguyen Anh Tu Students: Tran Tien Tai Tran Tien Tai Tran Ngoc Mai Tran Ngoc Mai Tu Kim Tuan Tu Kim Tuan Nguyen Ngoc Phuong Nguyen.
Advertisements

June, 2010SAS2010 Where does your child want to go today? Evgeny Kolotinsky / Content Filtering Technologies Development Group Konstantin Ignatev / Web.
Online Construction Estimation Developed By:- Vatsal S. Shah ( ) Dilip K. Babariya ( ) Jimit V. Rajani ( ) Guided by:-
Communications Regulatory Agency Media Literacy and Protection of Children Experiences of the Communications Regulatory Agency of BH Kemal Huseinović,
Web technologies Session 1. Slide 1.1 Objectives for this unit  To develop participants’ knowledge, skills and understanding of web technologies  To.
E-inventory Establishing of an electronic inventory of Industrial Property Offices products for the purpose of disseminating their Industrial Property.
Soft Law in China’s regulation of the Internet Professor of law Research Center for Cyber-law Beijing University of Posts & Telecommunications Deliang.
E-safety Brier School. Aims…. To consider what children and young people are actually doing online To explore some of the issues surrounding e-safety.
Digital Interactive Entertainment Dr. Yangsheng Wang Professor of Institute of Automation Chinese Academy of Sciences
Management Information Systems, Sixth Edition
Introduction Testing is examining the project performance according to the specifications that have been agreed. This will include the robustness of the.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
1 Computing for Todays Lecture 22 Yumei Huo Fall 2006.
LittleOrange Internet Security an Endpoint Security Appliance.
Web 2.0 Testing and Marketing E-engagement capacity enhancement for NGOs HKU ExCEL3.
ICT TEACHERS` COMPETENCIES FOR THE KNOWLEDGE SOCIETY
SIEVE—Search Images Effectively through Visual Elimination Ying Liu, Dengsheng Zhang and Guojun Lu Gippsland School of Info Tech,
Information Retrieval for High-Quality Systematic Reviews: The Basics 6.0.
1 China Web Accessibility Standard Wu Yinghua
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Shawanda Sturdivant The Internet What would we do without the Internet? It gives us the world at our fingertips. Almost anything that we want and need.
1 Windows Vista: Enabling Parental Controls in your Application Brian Trenbeath FUN304 Program Manager Microsoft Corporation.
CIS 601 Fall 2004 Introduction to Computer Vision and Intelligent Systems Longin Jan Latecki Parts are based on lectures of Rolf Lakaemper and David Young.
Service System for Management and Sharing of Scientific Data in Medicine Depei Liu, Ph.D. Chinese Academy of Medical Sciences.
RESEARCHING TIPS & STRATEGIES Summer 2008 Melanie Wilson Academic Success Center MSC 207.
Digital innovation. Introduction Personalised Videos iBeacons Reactive Websites.
1 Accessible Italy The new provisions to support the access to Information Technologies for the disabled Domenico Gargani Research Unit Ministry for Innovation.
MULTIMEDIA M U A T H H U M A I D R a s h A t a l l a h.
Dynamic Web Pages (Flash, JavaScript)
Distributed Virtual Laboratory for Smart Sensor System Design Distributed Virtual Laboratory for Smart Sensor System Design Oleksandr Palagin, Volodymyr.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
WEB DESIGN SOLUTIONS. 2 Presentation by JAVANET SYSTEMS 1st Floor, ROFRA House, Suite 4, Kansanga, Gaba Road P.O Box 31586, Kampala, Uganda Tel: +256(0) ,
Capstone Project Vista Game Logs Sponsor: Jerald Block John Van Drasek Tony Kautz Priya Pitla Desiree Mijares Ryan Hieber.
PHD. Mohamed Mikki The definition of testing Software testing : is the act of verifying that the software functions properly and ensure the quality of.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
DITA Single Source technology. What is Single Source? Single source technology is a concept of publishing documents when same content can be used in different.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Because you need to protect your computers!!! By: Ashley Hubbard.
Internet Filtering seyed Ehsan shariaty shiraz university of Technology.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Get Internet Porn Out of Our Public Library Did You Know? *Our Public Library Does NOT and LIKELY WILL NOT Filter Pornography? *Porn Criminals Have Already.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
Capstone Project Vista Game Logs Sponsor: Jerald Block John Van Drasek Tony Kautz Priya Pitla Desiree Mijares Ryan Hieber.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Multimedia Industry Knowledge CUFGEN01A Develop And Apply Industry Knowledge CUFMEM08A Apply Principles Of Instructional Design To A Multimedia Product.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Internet Made Easy! Make sure all your information is always up to date and instantly available to all your clients.
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
CHILD PROTECTION IN INFOMEDIA
RECENT TRENDS IN METADATA GENERATION
Personalized Social Image Recommendation
Biosafety Clearing-House Training Workshop
Soutenance de thèse vendredi 24 novembre 2006, Lorient
Nada Al Dosary Edited By: Maysoon AlDuwais
Objectives To gain a basic understanding of the Web and Digital Communications Pathway. To discover career options available within the Web and Digital.
Computer Literacy BASICS
Dongwhan Kim Annie Zhao Steven Lawrance
Database & Information Systems
Keeping It Cool Internet for Parents.
PROBLEM: Recruiting the right physician at the right time is time-consuming and expensive.
Business Zone - Clearing your Cache
Presentation transcript:

Odessa national academy of telecommunications n. a. A.S. Popov Department of Automation and control of technological processes CONTENT IMAGES FILTERING Ph.D., docent V.I. Zagrebnyuk Lecturer V.Y. Kumysh Odessa 2011

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Ensuring the safety of children on the Internet relates to the problems of regulating the telecommunications market. In the problems of regulating the telecommunications market one should distinguish at least three aspects: -Economical; -Technical; -Social. It is known that in the Internet more than 30 billion web pages with pornographic material are registered. According to the announce of service providers representatives it is impossible to block the access to porn sites effectively without closing large segments of the Internet. The experience of China (Great Chinese Firewall) can be considered as an example, when Chinese population is deprived of access to the vast number of informational resources. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, The technical aspect of child safety providing on the Internet

Odessa national academy of telecommunications named after A.S. Popov Department of Automation and control of technological processes Appearance of huge amount of specialized applications, on the software tools market, realizing supervision under content access on the side of the user, tells us about actuality of Internet traffic selection problem. – ParentalControl is the addition for the Internet Explorer, that helps parents to prevent access for kids to the adult web pages; – KidsControl is the parental control instrument for kids activity on the Internet; – Tools for limiting access to applications, games and web pages on the basis of Windows Vista; – Tools for limiting access to the web pages in Norton Internet Security and Kaspersky Internet Security. While almost all of this applications were in English some years before today many of them are developed specially for russian- and ukrainianspeaking users, that, undoubtedly, tells about existence of the demand on such solutions. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, The technical aspect of child safety providing on the Internet

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes All these solutions are based on one principle: the program comes with a set of filters, that are configured on sexual materials, foul language, violence, online-games, casinos, forums, and other criteria, allowing parents to choose different filtering parameters for their child. The option of an interactive addition of filter by means of the user, so-called black list, is also present. Nevertheless, the problem of automatic blocking of socially dangerous content is far from a final decision: it is necessary to increase the accuracy of black list forming on the basis of objective estimation methods; it is necessary to attract large number of highly qualified experts in various fields for creation of black lists on the basis of subjective estimation methods; it is necessary to update filters sets and black lists continuously due to the rapid increase of the number of similar resources. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, The technical aspect of child safety providing on the Internet

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Existing methods assume, that the human skin color is determined by two major color components r (red) and g (green). Component r is the blood color influence and r + g is melanin color influence. In fact, due to the use of digital processing for increasing the quality and image compression, the color of human skin is significantly distorted and contains all three color components r, g and b. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Content images filtering

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes The method for blocking and automatic denying the access to web pages with pornography images and videos have been developed. This method is based on the concept of the content image retrieval by the sample. It suggests: Creating the two-level image as the database of the samples of human skin (the dominant color descriptors at the 1st level, histogram descriptors at the 2nd level). Preliminary analysis of the loaded by browser images in order to identify those images, that are likely to be pornographic. It includes the dominant color descriptors extraction from the images and the following content image retrieval at the 1st level of the database. Final analysis and, if necessary, blocking of the site and its inclusion in the "black list" with following access denying. Involves the histogram descriptor extraction from the images, taken at the preliminary analysis stage, and content image retrieval of the selected images at the 2nd level of the database. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Content images filtering

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, The dominant color descriptor extraction for content image retrieval Images, that are relevant by the color content Dominant color descriptors

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Histogram descriptor extraction for content filtering of images Histogram descriptorOriginal image “Body color” segment

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Histogram descriptor extraction for content filtering of images Histogram descriptor Original image “Body color” segment

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Histogram descriptor extraction for content filtering of images Histogram descriptorOriginal image “Body color” segment

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Histogram descriptor extraction for content filtering of images Histogram descriptor Original image “Body color” segment

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh Histogram descriptor extraction from the images with limited color range Histogram descriptorOriginal image “Body color” segment

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes The method for blocking and automatic denying the access to web pages with pornography images and videos suggests: Image or independent video raster color quantization to decrease the color redundancy. Dominant color extraction. Preliminary analysis of the loaded by browser using content image retrieval at the 1st level of the database. Histogram descriptor extraction. Final analysis using content image retrieval of the selected images at the 2nd level of the database. Definition of “Body color” part of the image. Taking the decision on blocking the image. Taking the decision on blocking the site. Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Proposed method

Odessa national academy of telecommunications named after A.S. Popov Department of automation and control of technological processes Content Images Filtering V.I. Zagrebnyuk, V.Y. Kumysh, Thank You for Your attention!