Icensor : Unwanted Image Detection and Censoring
DOI:
https://doi.org/10.32628/IJSRSET231027Keywords:
Unwanted Image Detection, Nude Image Detection, Image CensoringAbstract
The globe today, practically everyone uses the internet, which is filled with a vast amount of information and content, the majority of which includes pornographic and violent photos and movies. Social media has grown in importance in today's society as a result of the expansion of the internet. This has increased the risk of privacy invasion, which includes the release of private photos that should not be shared because they violate the privacy of some people. Today, even a young child can easily access these materials. Recent image leaks from prominent social media applications and the use of private photos by clever algorithms have caused the public to re-evaluate the need for individual privacy when uploading images on social media. The process of sharing photos on social networking sites is complex in and of itself, and the measures in place to safeguard privacy in daily life are labor-intensive and fall short of providing tailored, precise, and adaptable privacy protection. We have found that techniques like "privacy intelligence" solutions, which concentrate on current privacy issues related to online social networking image sharing, are effective. An optical character recognition-based system that filters photographs with sensitive text, in addition, a visual algorithm that filters out pictures that aesthetically resemble those on an image blacklist is used. These measures can help stop the spread of any delicate content on social media.
References
- Knockel, J., Ruan, L., & Crete-Nishihata, M. (2018, August). An analysis of automatic image filtering on WeChat Moments. In FOCI@ USENIX Security Symposium.
- Ch i Liu, T. Z. (2020, August). Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
- O'Neill, P. H. (2019, July 15). How WeChat censors private conversations, automatically in real time.
- Xiong, J. K. (2019, July 15). An Analysis of WeChat’s Realtime Image Filtering in Chats.
- MAITRA, S. (2019, February 24). What Canny Edge Detection algorithm is all about.
- Crete-Nishihata, M., Knockel, J., Miller, B., Ng, J. Q., Ruan, L., Tsui, L., and Xiong, R. Remebering Liu Xiaobo: Analyzing censorship of the death of Liu Xiaobo on WeChat and Weibo. Tech. rep., Citizen Lab, University of Toronto, 2017.
- Ruan, L., Knockel, J., and CreteNishihata, M. We (Can’t) Chat: “709 Crackdown” Discussions Blocked on Weibo and WeChat. Tech. rep., Citizen Lab, University of Toronto, 2017.
- Ruan, L., Knockel, J., Ng, J. Q., and CreteNishihata, M. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally. Tech. rep., Citizen Lab, University of Toronto, 2016.
- Szegedy, C., Zaremba, W., SUtskever, I., BrUna, J., Erhan, D., Goodfellow, I., and FergUs, R. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).
- MathWorks. Convert RGB image or colormap to grayscale.
- Perceptual Hashing. (2022, October 5). Matt Rickard. https://matt-rickard.com
- Renganathan, V., Babu, A.N., & Sarbadhikari, S.N. (2013). A Tutorial on Information Filtering Concepts and Methods for Bio-medical Searching. Journal of Health and Medical Informatics, 04.
- Lee., "The Porn Breakers," The engineer 291(7610), pp. 30. 2002
- Hove, L. J. (2004, April). Extending image retrieval systems with a thesaurus for shapes. In Norsk Informatikk Konferanse, Stavanger, Tapir Akademisk Forlag.
- Feng, Z., & Tien, D. (2005, July). Enhancement of Semantics in CBIR. In Third International Conference on Information Technology and Applications (ICITA'05) (Vol. 1, pp. 744-745). IEEE.
- Hsieh, C. J., Liu, W. C., & Li, J. S. (2007, December). An Efficient Packet-level JPEG Forensic Data Collection. In Future Generation Communication and Networking (FGCN 2007) (Vol. 2, pp. 108-113). IEEE.
- Lin, Y., Tseng, H., & Fuh, C. (2003). Pornography Detection Using Support Vector Machine.
- Ibrahim, A. A. (2009). Detecting and preventing the electronic transmission of illicit images (Doctoral dissertation).
- Bhalerao, D.D., & Parihar, A. (2015). Illicit Image Filtering and Classification Techniques. International journal of engineering research and technology, 4.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.