Skip to main content

A Harmful Content Protection in Peer-to-Peer Networks

  • Conference paper
Artificial Intelligence and Simulation (AIS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3397))

Abstract

A variety of activities like commerce, education, voting is taking place in cyber-space these days. As the use of the Internet gradually increases, many side effects have appeared. Therefore, it is time to address the many troubling side effects associated with the Internet. In this paper, we propose a method of prevention of adult video and text in Peer-to-Peer networks and we evaluate text categorization algorithms for Peer-to-Peer networks. We also suggest a new image categorization algorithm for detecting adult images and compare its performance with existing commercial software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Waxman, B.H.A., Largent, S.: Children’s Access to Pornography Through Internet File-Sharing Programs. United States House of Representatives Committee on Government Reform Stafff Report (July 2001), www.reform.house.gov

  2. Davis, T., Waxman, H.A.: Children’s Exposure to Pornography on Peer-to-Peer Newworks. United States House of Representatives Committee on Government Reform Stafff Report (March 2003), www.reform.house.gov

  3. Hammami, M., Chahir, Y., Chen, L.: WebGuard: Web based Adult Content Detection and Filtering System. In: IEEE/WIC International Conference on Web Intelligence (2003)

    Google Scholar 

  4. de Kroon, H.C.M., Mitchell, T.M., Kerchhoffs, E.J.H.: Improving Learning Accuracy in Information Filtering. In: International Conference on Machine Learning, Workshop on Marchine Learning Meet HCI (ICML 1996) (1996)

    Google Scholar 

  5. Joachims, T.: A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization. In: Proc. ICML 1997, pp. 143–146 (1997)

    Google Scholar 

  6. Oard, D.W., DeClaris, N., Dorr, B.J., Faloutsos, C.: On Automatic Filtering of Multilingual Texts. In: Proceedings of the 1994 IEEE International Conference on Systems, Man, and Cybernetics, October 1994, vol. 2, pp. 1645–1650 (1994), http://www.glue.umd.edu/~oard/research.html

  7. Forsyth, D., Fleck, M.: Finding naked people. In: Proceedings of European Conference of Computer Vision, pp. 593–602. Springer, Berlin (1996)

    Google Scholar 

  8. Jeong, C.-Y., Kim, J.-S., Hong, K.-S.: Appearance-Based Nude Image Detection. In: 17th International Conference on Pattern Recognition (ICPR 2004) (August 2004)

    Google Scholar 

  9. Sedayao, J.: World Wide Web Network Traffic Patterns. In: Proceedings of the COMPCON 1995 Conference (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nam, T., Lee, H.G., Jeong, C.Y., Han, C. (2005). A Harmful Content Protection in Peer-to-Peer Networks. In: Kim, T.G. (eds) Artificial Intelligence and Simulation. AIS 2004. Lecture Notes in Computer Science(), vol 3397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30583-5_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30583-5_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24476-9

  • Online ISBN: 978-3-540-30583-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics