期刊文献+

Information Audit Based on Image Content Filtering 被引量:3

Information Audit Based on Image Content Filtering
下载PDF
导出
摘要 At present, network information audit system is almost based on text information filtering, but badness information is embedded into image or image file directly by badness information provider, in order to avoid monitored by. The paper realizes an information audit system based on image content filtering. Taking the pornographic program identification for an example, the system can monitor the video including any abnormal human body information by matching the texture characters with those defined in advance, which consist of contrast, energy, correlation measure and entropy character measure and so on. At present, network information audit system is almost based on text information filtering, but badness information is embedded into image or image file directly by badness information provider, in order to avoid monitored by. The paper realizes an information audit system based on image content filtering. Taking the pornographic program identification for an example, the system can monitor the video including any abnormal human body information by matching the texture characters with those defined in advance, which consist of contrast, energy, correlation measure and entropy character measure and so on.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期234-238,共5页 武汉大学学报(自然科学英文版)
基金 Supported by Hunan Provincial Natural ScienceFoundation of China(03JJY3103)
关键词 information audit system content audit texture character character library information audit system content audit, texture character, character library
  • 相关文献

参考文献2

二级参考文献13

  • 1Gao Y Y,Proc ICASSP,2000年,4卷,2003页
  • 2罗--,计算机学报,2000年,23卷,12期,1313页
  • 3Hong D Z,SPIE 3656,1999年,581页
  • 4Jaimes A,SPIE 3656,1999年,402页
  • 5Wu J K,IEEE Trans KDE,1997年,9卷,6期,978页
  • 6Smith J R,SPIE 2670,1996年
  • 7Hochberg J,Jackson K,Staltings C,et al.NADIR: An Automated System for Detecting Network Intrusion and Misuse[].Computers and Security.1993
  • 8Leland W E,Taqqu M S,Willinger W,et al.On the SelfSimilar Nature of Ethernet Traffic[].IEEE ACM Transactions on Networking.1994
  • 9Crovella M E,Bestavros A.Self-Similarity in World Wide Web Traffic : Evidence and Possible Causes[].IEEE ACM Transactions on Networking.1997
  • 10White G B,Fisch E A,Pooch U W.Cooperating Security Managers: A Peer Based Intrusion Detection System[].IEEE Network.1996

共引文献12

同被引文献13

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部