Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1001

Study for Injurious Multimedia Contents Analysis Mechanism in Smart Devices  

Min, Sun-Ho (ETRI)
Kim, Seok-Woo (Hansei University)
Ha, Kyeoung-Ju (Daegu Haany University)
Seo, Chang-Ho (Kongju National University)
Abstract
In this paper, Recently, we describe the distinction mechanism analysis and injurious distinction mechanism performance analysis in order to determine harmfulness of the injurious multimedia which is being rapidly spread in the smart phone and Intelligent Robots. Based on the injurious mechanism distinction technologies, We defined individual injurious characteristics elements of multimedia(images and videos). Also, We analyze harmfulness of the injurious multimedia content by the visual characteristics modeling.
Keywords
Content; injurious multimedia; Filtering Software; Adult Content;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kim-Gi Yeong, "SmartPhone Security Technology in the Open Mobile Environment," Korea Information Processing Society, Vol.19, No.5, pp. 21-28, Oct. 2009.
2 Mobile Malware Invasion Confrontation Guide, KISA 2009.
3 KISA, "Internet & Security Issue," 2010.
4 Yu-Ji Eun, "Key Enabler of SmartPhone: Software," SW Insight, 2009.
5 Kim-Gwang Hun, "Pornography Filtering Based-On Skin Color Detection," KSPC. 2003, Vol.16, No.1, pp.77-80, Oct. 2003.
6 Cho-Dong uk, "Proposal of Image and Acoustic Signal Processing for Blocking Harmful Pornographic Contents," Korea Information Processing Society, Vol.11, No.1, pp. 0687-0690, May 2004.
7 Yang-Jong Won, "Analysis and Design system of contents partial encryption for Mobile DRM environment," Korea Entertainment Industry Association, Vol.3, No.2, pp.22-28, June, 2009.   DOI
8 Seo-Chang Ho, "Characteristics and the Analyses of Cryptographic FCSR Sequences for Physical Layer Security," Korea Institute of Information Scientists and Engineers, Vol.38, No.5, pp.405-410, Oct. 2011.   과학기술학회마을
9 DAI-Labor, "Malicious Software for Smart-phones," Technical Report, 2008.
10 Ken Dunham, "Mobile Malware Attacks and Defense," SYNGRESS 2009,
11 DAI-Labor, "Malicious Software for Smartphones," Technical Report, 2008.
12 Ken Dunham, "Mobile Malware Attacks and Defense," SYNGRESS 2009,
13 H. Zheng, H. Liu and M. Daoudi, "Blocking objectionable images: adult images and harmful symbols," In Proceedings of the IEEE International Conf. on Multimedia and Expo, 2004.
14 Shin-Hsuan Chiu, Jiun-Jian Liaw, "An Effective Voting Method for Circle Detection," Pattern Recognition Letters, Vol. 26, No. 2, pp. 121-133, January 2005.   DOI   ScienceOn