Abstract
A variety of activities like commerce, education, voting is taking place in cyber-space these days. As the use of the Internet gradually increases, many side effects have appeared. Therefore, it is time to address the many troubling side effects associated with the Internet. In this paper, we propose a method of prevention of adult video and text in Peer-to-Peer networks and we evaluate text categorization algorithms for Peer-to-Peer networks. We also suggest a new image categorization algorithm for detecting adult images and compare its performance with existing commercial software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Waxman, B.H.A., Largent, S.: Children’s Access to Pornography Through Internet File-Sharing Programs. United States House of Representatives Committee on Government Reform Stafff Report (July 2001), www.reform.house.gov
Davis, T., Waxman, H.A.: Children’s Exposure to Pornography on Peer-to-Peer Newworks. United States House of Representatives Committee on Government Reform Stafff Report (March 2003), www.reform.house.gov
Hammami, M., Chahir, Y., Chen, L.: WebGuard: Web based Adult Content Detection and Filtering System. In: IEEE/WIC International Conference on Web Intelligence (2003)
de Kroon, H.C.M., Mitchell, T.M., Kerchhoffs, E.J.H.: Improving Learning Accuracy in Information Filtering. In: International Conference on Machine Learning, Workshop on Marchine Learning Meet HCI (ICML 1996) (1996)
Joachims, T.: A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization. In: Proc. ICML 1997, pp. 143–146 (1997)
Oard, D.W., DeClaris, N., Dorr, B.J., Faloutsos, C.: On Automatic Filtering of Multilingual Texts. In: Proceedings of the 1994 IEEE International Conference on Systems, Man, and Cybernetics, October 1994, vol. 2, pp. 1645–1650 (1994), http://www.glue.umd.edu/~oard/research.html
Forsyth, D., Fleck, M.: Finding naked people. In: Proceedings of European Conference of Computer Vision, pp. 593–602. Springer, Berlin (1996)
Jeong, C.-Y., Kim, J.-S., Hong, K.-S.: Appearance-Based Nude Image Detection. In: 17th International Conference on Pattern Recognition (ICPR 2004) (August 2004)
Sedayao, J.: World Wide Web Network Traffic Patterns. In: Proceedings of the COMPCON 1995 Conference (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nam, T., Lee, H.G., Jeong, C.Y., Han, C. (2005). A Harmful Content Protection in Peer-to-Peer Networks. In: Kim, T.G. (eds) Artificial Intelligence and Simulation. AIS 2004. Lecture Notes in Computer Science(), vol 3397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30583-5_65
Download citation
DOI: https://doi.org/10.1007/978-3-540-30583-5_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24476-9
Online ISBN: 978-3-540-30583-5
eBook Packages: Computer ScienceComputer Science (R0)