Icensor : Unwanted Image Detection and Censoring

Authors

  • Dr. Manju Bargavi  Professor, Department of CS & IT, Jain University, Bangalore, Karnataka, India
  • Sakshi Dhruva  MCA, Department of CS & IT, Jain University, Bangalore, Karnataka, India
  • Tenzin Kunsang  MCA, Department of CS & IT, Jain University, Bangalore, Karnataka, India
  • S Subham Patra  MCA, Department of CS & IT, Jain University, Bangalore, Karnataka, India
  • Tenzin Nyima  School of Commerce, Jain University, Bangalore, Karnataka, India

DOI:

https://doi.org/10.32628/IJSRSET231027

Keywords:

Unwanted Image Detection, Nude Image Detection, Image Censoring

Abstract

The globe today, practically everyone uses the internet, which is filled with a vast amount of information and content, the majority of which includes pornographic and violent photos and movies. Social media has grown in importance in today's society as a result of the expansion of the internet. This has increased the risk of privacy invasion, which includes the release of private photos that should not be shared because they violate the privacy of some people. Today, even a young child can easily access these materials. Recent image leaks from prominent social media applications and the use of private photos by clever algorithms have caused the public to re-evaluate the need for individual privacy when uploading images on social media. The process of sharing photos on social networking sites is complex in and of itself, and the measures in place to safeguard privacy in daily life are labor-intensive and fall short of providing tailored, precise, and adaptable privacy protection. We have found that techniques like "privacy intelligence" solutions, which concentrate on current privacy issues related to online social networking image sharing, are effective. An optical character recognition-based system that filters photographs with sensitive text, in addition, a visual algorithm that filters out pictures that aesthetically resemble those on an image blacklist is used. These measures can help stop the spread of any delicate content on social media.

References

  1. Knockel, J., Ruan, L., & Crete-Nishihata, M. (2018, August). An analysis of automatic image filtering on WeChat Moments. In FOCI@ USENIX Security Symposium.
  2. Ch i Liu, T. Z. (2020, August). Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
  3. O'Neill, P. H. (2019, July 15). How WeChat censors private conversations, automatically in real time.
  4. Xiong, J. K. (2019, July 15). An Analysis of WeChat’s Realtime Image Filtering in Chats.
  5. MAITRA, S. (2019, February 24). What Canny Edge Detection algorithm is all about.
  6. Crete-Nishihata, M., Knockel, J., Miller, B., Ng, J. Q., Ruan, L., Tsui, L., and Xiong, R. Remebering Liu Xiaobo: Analyzing censorship of the death of Liu Xiaobo on WeChat and Weibo. Tech. rep., Citizen Lab, University of Toronto, 2017.
  7. Ruan, L., Knockel, J., and CreteNishihata, M. We (Can’t) Chat: “709 Crackdown” Discussions Blocked on Weibo and WeChat. Tech. rep., Citizen Lab, University of Toronto, 2017.
  8. Ruan, L., Knockel, J., Ng, J. Q., and CreteNishihata, M. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally. Tech. rep., Citizen Lab, University of Toronto, 2016.
  9. Szegedy, C., Zaremba, W., SUtskever, I., BrUna, J., Erhan, D., Goodfellow, I., and FergUs, R. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).
  10. MathWorks. Convert RGB image or colormap to grayscale.
  11. Perceptual Hashing. (2022, October 5). Matt Rickard. https://matt-rickard.com
  12. Renganathan, V., Babu, A.N., & Sarbadhikari, S.N. (2013). A Tutorial on Information Filtering Concepts and Methods for Bio-medical Searching. Journal of Health and Medical Informatics, 04.
  13. Lee., "The Porn Breakers," The engineer 291(7610), pp. 30. 2002
  14. Hove, L. J. (2004, April). Extending image retrieval systems with a thesaurus for shapes. In Norsk Informatikk Konferanse, Stavanger, Tapir Akademisk Forlag.
  15. Feng, Z., & Tien, D. (2005, July). Enhancement of Semantics in CBIR. In Third International Conference on Information Technology and Applications (ICITA'05) (Vol. 1, pp. 744-745). IEEE.
  16. Hsieh, C. J., Liu, W. C., & Li, J. S. (2007, December). An Efficient Packet-level JPEG Forensic Data Collection. In Future Generation Communication and Networking (FGCN 2007) (Vol. 2, pp. 108-113). IEEE.
  17. Lin, Y., Tseng, H., & Fuh, C. (2003). Pornography Detection Using Support Vector Machine.
  18. Ibrahim, A. A. (2009). Detecting and preventing the electronic transmission of illicit images (Doctoral dissertation).
  19. Bhalerao, D.D., & Parihar, A. (2015). Illicit Image Filtering and Classification Techniques. International journal of engineering research and technology, 4.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Manju Bargavi, Sakshi Dhruva, Tenzin Kunsang, S Subham Patra, Tenzin Nyima "Icensor : Unwanted Image Detection and Censoring" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 2, pp.75-85, March-April-2023. Available at doi : https://doi.org/10.32628/IJSRSET231027