A Novel Skin Tone Detection Algorithm for Contraband Image Analysis

A. Choudhury, M. Rogers, W. Gillam, Keith Watson
{"title":"A Novel Skin Tone Detection Algorithm for Contraband Image Analysis","authors":"A. Choudhury, M. Rogers, W. Gillam, Keith Watson","doi":"10.1109/SADFE.2008.12","DOIUrl":null,"url":null,"abstract":"This paper examines skin tone detection algorithms used by first responder forensic tools such as File Hound. File Hound is a \"field analysis\" software application that is currently being used by over 100 law enforcement agencies, both internationally and domestically. It is mainly used in forensic investigations to search and identify pornographic images from a hard drive. Since the conception of File Hound, several steps have been taken to improve its performance and expand its features. One such feature is a skin tone detection filter that can identify images with a large skin color count from the aggregate image results found by File Hound. This filter is based on the idea that there is a positive correlation between images with a large skin color count and images that are pornographic in nature. A novel skin tone detection filter was developed and this filter was tested against random images obtained from the Compaq Image database for skin tone detection. The results of the test are encouraging in terms of accuracy and low error rates: type I = 20.64%, type II = 0.81%, accuracy = 78.55%.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SADFE.2008.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

This paper examines skin tone detection algorithms used by first responder forensic tools such as File Hound. File Hound is a "field analysis" software application that is currently being used by over 100 law enforcement agencies, both internationally and domestically. It is mainly used in forensic investigations to search and identify pornographic images from a hard drive. Since the conception of File Hound, several steps have been taken to improve its performance and expand its features. One such feature is a skin tone detection filter that can identify images with a large skin color count from the aggregate image results found by File Hound. This filter is based on the idea that there is a positive correlation between images with a large skin color count and images that are pornographic in nature. A novel skin tone detection filter was developed and this filter was tested against random images obtained from the Compaq Image database for skin tone detection. The results of the test are encouraging in terms of accuracy and low error rates: type I = 20.64%, type II = 0.81%, accuracy = 78.55%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种新的用于违禁品图像分析的肤色检测算法
本文研究了第一响应者法医工具(如File Hound)使用的肤色检测算法。File Hound是一款“现场分析”软件应用程序,目前被100多个国际和国内执法机构使用。它主要用于法医调查,从硬盘中搜索和识别色情图像。自从文件猎犬的概念,已经采取了几个步骤,以提高其性能和扩展其功能。其中一个特征是肤色检测过滤器,它可以从File Hound找到的汇总图像结果中识别出具有较大肤色计数的图像。这个滤镜是基于这样的想法,即具有较大肤色的图像与本质上是色情的图像之间存在正相关关系。提出了一种新的肤色检测滤波器,并对从康柏图像数据库中获取的随机图像进行了肤色检测。测试结果在准确性和低错误率方面令人鼓舞:I型= 20.64%,II型= 0.81%,准确率= 78.55%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Research Configuration for a Digital Network Forensic Lab SÁDI - Statistical Analysis for Data Type Identification Cognitive-Maps Based Investigation of Digital Security Incidents Implications of Attorney Experiences with Digital Forensics and Electronic Evidence in the United States Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1