• Title/Summary/Keyword: Internet Harmful Information

Search Result 94, Processing Time 0.031 seconds

A Study on Design and Implementation of Filtering System on Hurtfulness Site (유해 사이트 필터링에 관한 연구)

  • 장혜숙;강일고;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.636-639
    • /
    • 2002
  • This article is focused on the research for the system design that isolate noxious data from internet for juveniles Normally, by motivating this software which was designed to isolate noxious data, harmful data was deleted or graded But these normal process contains a lot of complexity, for example, essential continual upgrade, grading mistake, etc. So, to solve these fallacy, word-weighting process, where several harmful words which can be optained in internet site are discriminance and weighted, is utilized by using AC machine. At the result, the isolation rate of harmful site rose up to 90%, which means this process is greatly efficient.

  • PDF

Classification of Phornographic Videos Using Audio Information (오디오 신호를 이용한 음란 동영상 판별)

  • Kim, Bong-Wan;Choi, Dae-Lim;Bang, Man-Won;Lee, Yong-Ju
    • Proceedings of the KSPS conference
    • /
    • 2007.05a
    • /
    • pp.207-210
    • /
    • 2007
  • As the Internet is prevalent in our life, harmful contents have been increasing on the Internet, which has become a very serious problem. Among them, pornographic video is harmful as poison to our children. To prevent such an event, there are many filtering systems which are based on the keyword based methods or image based methods. The main purpose of this paper is to devise a system that classifies the pornographic videos based on the audio information. We use Mel-Cepstrum Modulation Energy (MCME) which is modulation energy calculated on the time trajectory of the Mel-Frequency cepstral coefficients (MFCC) and MFCC as the feature vector and Gaussian Mixture Model (GMM) as the classifier. With the experiments, the proposed system classified the 97.5% of pornographic data and 99.5% of non-pornographic data. We expect the proposed method can be used as a component of the more accurate classification system which uses video information and audio information simultaneously.

  • PDF

An Inappropriate Web_ Images Blocking System Based_on Strong Paternalism (강한 간섭주의를 기반한 유해 영상 정보 노출 차단 시스템)

  • 이재현
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.51-59
    • /
    • 2001
  • As internet activates, web sites that supply images harmful to the emotion of youth are overflowing rapidly. Chances that the youth approach to the harmful sites are increasing, and then the emotion of youth is damaged seriously. In this paper, we present the system that distinguish harmful ones from images in the web documents of user-accessed URLs and output the document after blocking images harmful to the youth. As the results of the experiments about performance of the web-images blocking system, we found the utility factor of blocking harmful images of the proposed system is 89.6% in the full nudity 70.1% in the half nudity, and the error rate is 2.4% in the face images.

  • PDF

Analysis of an Internet Community about Pneumothorax and the Importance of Accurate Information about the Disease

  • Kim, Bong Jun;Lee, Sungsoo
    • Journal of Chest Surgery
    • /
    • v.51 no.2
    • /
    • pp.85-91
    • /
    • 2018
  • Background: The huge improvements in the speed of data transmission and the increasing amount of data available as the Internet has expanded have made it easy to obtain information about any disease. Since pneumothorax frequently occurs in young adolescents, patients often search the Internet for information on pneumothorax. Methods: This study analyzed an Internet community for exchanging information on pneumothorax, with an emphasis on the importance of accurate information and doctors' role in providing such information. Results: This study assessed 599,178 visitors to the Internet community from June 2008 to April 2017. There was an average of 190 visitors, 2.2 posts, and 4.5 replies per day. A total of 6,513 posts were made, and 63.3% of them included questions about the disease. The visitors mostly searched for terms such as 'pneumothorax,' 'recurrent pneumothorax,' 'pneumothorax operation,' and 'obtaining a medical certification of having been diagnosed with pneumothorax.' However, 22% of the pneumothorax-related posts by visitors contained inaccurate information. Conclusion: Internet communities can be an important source of information. However, incorrect information about a disease can be harmful for patients. We, as doctors, should try to provide more in-depth information about diseases to patients and to disseminate accurate information about diseases in Internet communities.

Design and Implementation of Harmful Video Detection Service using Audio Information on Android OS (안드로이드 OS 기반 음향 정보를 이용한 유해동영상 검출 서비스의 설계 및 구현)

  • Kim, Yong-Wun;Kim, Bong-Wan;Choi, Dae-Lim;Ko, Lag-Hwan;Kim, Tae-Guon;Lee, Yong-Ju
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.577-586
    • /
    • 2012
  • The smartphone emerged due to the rapid development of the Internet has brought greater convenience to life in a positive manner. Recently, however, because of unconstrained exposure to harmful video, reckless use of smart phones has become a domestic issue in our society. In this paper, a service which detects harmful videos by using the acoustic information is designed and implemented on the Android OS. In order to implement the service of Android OS-based detection of the harmful movie, the speed of existing sound-based detection method for harmful videos is improved. The GMM(Gaussian Mixture Model) was used for classifier and the number of Gaussian Mixture was 18. The implemented service shows a detection rate of 97.02% for a total of 1,210 data files (approximately 687 hours) which comprises 669 general videos files (about 424 hours) and 541 harmful video files (about 263 hours). It's speed is 5.6 times faster than the traditional methods whitout reducing the detection rate.

The Improvement Method of Internet Ethics Education for the Prevention of Internet Aftereffect (인터넷 역기능 예방을 위한 인터넷 윤리 교육 개선 방안)

  • Lee, Yun Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1432-1440
    • /
    • 2013
  • In spite of advantages to using internet, but there are many adverse effects. The most well-known negative effects include internet addiction, personal information infringement, copyright violation, spread of harmful information, cyber bullying, online fraud, hacking and virus distribution, and online prostitution. Until now, the government and public organization strived to prevent and reduce the negative effects but have faced limitations. In accordance with, one of the measures the solve the problems caused by internet is to strengthen the internet ethics education. This study aims to consider and analyze the negative effects of internet and provide measures to promote internet ethics education to prevent and reduce such effects.

A Novel System for Detecting Adult Images on the Internet

  • Park, Jae-Yong;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.910-924
    • /
    • 2010
  • As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessing this content, a novel detection method for adult images is proposed. The proposed method involves three steps. First, the Image Of Interest (IOI) is extracted from the image background. Second, the IOI is distinguished from the segmented image using a novel weighting mask, and it is determined to be acceptable or unacceptable. Finally, the features (color and texture) of the IOI or original image are compared to a critical value; if they exceed that value then the image is deemed to be an adult image. A Receiver Operating Characteristic (ROC) curve analysis was performed to define this optimal critical value. And, the textural features are identified using a gray level co-occurrence matrix. The proposed method increased the precision level of detection by applying a novel weighting mask and a receiver operating characteristic curve. To demonstrate the effectiveness of the proposed method, 2850 adult and non-adult images were used for experimentation.

Classification Method of Harmful Image Content Rates in Internet (인터넷에서의 유해 이미지 컨텐츠 등급 분류 기법)

  • Nam, Taek-Yong;Jeong, Chi-Yoon;Han, Chi-Moon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.318-326
    • /
    • 2005
  • This paper presents the image feature extraction method and the image classification technique to select the harmful image flowed from the Internet by grade of image contents such as harmlessness, sex-appealing, harmfulness (nude), serious harmfulness (adult) by the characteristic of the image. In this paper, we suggest skin area detection technique to recognize whether an input image is harmful or not. We also propose the ROI detection algorithm that establishes region of interest to reduce some noise and extracts harmful degree effectively and defines the characteristics in the ROI area inside. And this paper suggests the multiple-SVM training method that creates the image classification model to select as 4 types of class defined above. This paper presents the multiple-SVM classification algorithm that categorizes harmful grade of input data with suggested classification model. We suggest the skin likelihood image made of the shape information of the skin area image and the color information of the skin ratio image specially. And we propose the image feature vector to use in the characteristic category at a course of traininB resizing the skin likelihood image. Finally, this paper presents the performance evaluation of experiment result, and proves the suitability of grading image using image feature classification algorithm.

Improvement of Internet Content Filtering Software (유해정보 차단 S/W 개선방안 연구)

  • Jeon, Woong-Ryul;Lee, Hyun-Seung;Hur, Soon-Hang;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.543-554
    • /
    • 2009
  • The openness of the Web allows any user to access any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for children. To protect children from these harmful contents, many filtering softwares are developed. However, these softwares can not prevent harmful contents, perfectly, because of some limitations. In this paper, we analyze existing eleven filtering softwares and state the limitation of these softwares. Furthermore, we propose requirements for new filtering software which overcomes the limitations, and describe framework of the new software.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF