Skip to main content

Downloading and Analysing Images from the Internet in Order to Detect Special Objects

  • Conference paper
Book cover Multimedia Communications, Services and Security (MCSS 2013)

Abstract

Along with all the positives brought by the Internet, the global network is also used for criminal purposes. The goal of the presented work was to create and optimize applications working in parallel with the search and illegal content analysis system (SWAT) created previously at the authors’ university. The role of the SWAT system is to penetrate the Internet to search for images and provide links to the presented application. The presented application is able to detect various special objects, such as faces, symbols or child pornography. The use of bees algorithm-based optimization made it possible to increase the effectiveness of image analysis. With appropriate assumptions, the efficiency was increased by a factor of three times compared to the application without optimization. The efficiency of the optimization algorithm depends largely on the nature of the input data, the URL addresses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Grega, M., Bryk, D., Napora, M., Gusta, M.: INACT — INDECT advanced image cataloguing tool. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2011. CCIS, vol. 149, pp. 28–36. Springer, Heidelberg (2011), http://dx.doi.org/10.1007/978-3-642-21512-4_4

    Chapter  Google Scholar 

  2. Group, M.M.: Internet world stats, http://www.internetworldstats.com/

  3. INDECT: Welcome to INDECT homepage – INDECT-home, http://www.indect-project.eu/

  4. Opaliński, A., Turek, W.: Information retrieval and identity analysis. In: Metody Sztucznej Inteligencji w Działaniach na Rzecz Bezpieczeństwa Publicznego, pp. 173–194. AGH University of Science and Technology Press (2009) No. 978-83-7464-268-2

    Google Scholar 

  5. Pham, D.T., Ghanbarzadeh, A., Koc, E., Otri, S.: Application of the bees algorithm to the training of radial basis function networks for control chart pattern recognition (2006)

    Google Scholar 

  6. Pham, D.T., Ghanbarzadeh, A., Koc, E., Otri, S., Rahim, S., Zaidi, M.: The bees algorithm, a novel tool for complex optimisation problems. In: Proceedings of the 2nd International Virtual Conference on Intelligent Production Machines and Systems (IPROMS 2006), pp. 454–459. Elsevier (2006)

    Google Scholar 

  7. Turek, W., Opalinski, A., Kisiel-Dorohinicki, M.: Extensible web crawler – towards multimedia material analysis. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2011. CCIS, vol. 149, pp. 183–190. Springer, Heidelberg (2011), http://dx.doi.org/10.1007/978-3-642-21512-4_22

    Chapter  Google Scholar 

  8. Wilaszek, K., Wójcik, T., Opaliński, A., Turek, W.: Internet identity analysis and similarities detection. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2012. CCIS, vol. 287, pp. 369–379. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-30721-8_36

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Leszczuk, M., Piwowarczyk, T., Grega, M. (2013). Downloading and Analysing Images from the Internet in Order to Detect Special Objects. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2013. Communications in Computer and Information Science, vol 368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38559-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38559-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38558-2

  • Online ISBN: 978-3-642-38559-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics