Retrieval based on skin color to detect the malicious images
Image filtering and retrieval application process has been explored widely. The most basic filtering and retrieval system that is based on extensions of textual database search, is a system where keywords interpreting the images usually describing the certain aspects of the image content. Digital i...
Saved in:
Main Authors: | , , |
---|---|
Format: | Research Report |
Language: | English English |
Published: |
Universiti Malaysia Sabah
2009
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/23342/1/Retrieval%20based%20on%20skin%20color%20to%20detect%20the%20malicious%20images.pdf https://eprints.ums.edu.my/id/eprint/23342/7/retrieval%20based%20on%20color%20to%20detect%20the%20malicious%20images.pdf https://eprints.ums.edu.my/id/eprint/23342/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sabah |
Language: | English English |
Summary: | Image filtering and retrieval application process has been explored widely. The most basic filtering and retrieval system that is based on extensions of textual database search, is a system where keywords interpreting the images
usually describing the certain aspects of the image content. Digital image processing algorithms should extract all the relevant features from the image in the same way a human would do. Unfortunately, it is far beyond our knowledge. There still a lot of current algorithms are quite successful in using low-level features of the images such as color histogram and texture. This paper presents an enhancement method of image retrieval. The enhancement method will partitioned the image into sub-regions and the frequency of skin color in each sub-region will be calculated based on skin color and texture features. Over than 80% of skin color is defined as a malicious image. This method was then implemented in our experiment in order to verify whether the enhancement method has successful on determining the image is a malicious image or not. 100 participants have been involved in this experiment where all of them are student from
University Malaysia Sabah, Labuan International Campus. Based on the testing and experiment activity, it is clearly showed that our method could retrieve and define a malicious image. However, the limitation is still there to be improved in the future. |
---|