{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:51:22Z","timestamp":1772826682787,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T00:00:00Z","timestamp":1554249600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T00:00:00Z","timestamp":1554249600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-019-7527-2","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T03:01:41Z","timestamp":1554346901000},"page":"16459-16472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multimodal approach for multimedia injurious contents blocking"],"prefix":"10.1007","volume":"79","author":[{"given":"Byeongtae","family":"Ahn","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5580-4098","authenticated-orcid":false,"given":"Seok-Woo","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,3]]},"reference":[{"issue":"2","key":"7527_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patrec.2004.09.037","volume":"26","author":"S-H Chiu","year":"2005","unstructured":"Chiu S-H, Liaw J-J (2005) An effective voting method for circle detection. Pattern Recogn Lett 26(2):121\u2013133","journal-title":"Pattern Recogn Lett"},{"key":"7527_CR2","first-page":"150","volume":"6","author":"C Clarin","year":"2005","unstructured":"Clarin C, Dionisio J, Echavez M, Naval PC (2005) Dove: detection of movie violence using motion intensity analysis on skin and blood. Philippine Computing Science Congress 6:150\u2013156","journal-title":"Philippine Computing Science Congress"},{"issue":"3","key":"7527_CR3","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TCSVT.2016.2615443","volume":"27","author":"H Fradi","year":"2017","unstructured":"Fradi H, Luvison B, Pham QC (2017) Crowd behavior analysis using local mid-level visual descriptors. IEEE Transactions on Circuits and Systems for Video Technology 27(3):589\u2013602. \nhttps:\/\/doi.org\/10.1109\/TCSVT.2016.2615443","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"5","key":"7527_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1049\/el.2017.0970","volume":"49","author":"Y Gao","year":"2016","unstructured":"Gao Y, Liu H, Sun X, Wang C, Liu Y (2016) Violence detection using oriented violent flows. Image Vis Comput 49(5):37\u201341. \nhttps:\/\/doi.org\/10.1049\/el.2017.0970","journal-title":"Image Vis Comput"},{"issue":"9","key":"7527_CR5","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904\u20131916. \nhttps:\/\/doi.org\/10.1109\/TPAMI.2015.2389824","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"7527_CR6","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/TPAMI.2007.1133","volume":"29","author":"W Hu","year":"2007","unstructured":"Hu W, Wu O, Chen Z, Fu Z, Maybank S (2007) Recognition of pornographic web pages by classifying texts and images. IEEE Trans Pattern Anal Mach Intell 29(6):1019\u20131034. \nhttps:\/\/doi.org\/10.1109\/TPAMI.2007.1133","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"15","key":"7527_CR7","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1049\/el.2017.0970","volume":"53","author":"AS Ke\u00e7eli","year":"2017","unstructured":"Ke\u00e7eli AS, Kaya A (2017) Violent activity detection with transfer learning method. Lectronics Letters 53(15):1047\u20131048. \nhttps:\/\/doi.org\/10.1049\/el.2017.0970","journal-title":"Lectronics Letters"},{"issue":"2","key":"7527_CR8","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TCE.2011.5955203","volume":"57","author":"CY Kim","year":"2011","unstructured":"Kim CY, Kwon OJ, Choi S (2011) A practical system for detecting obscene videos. IEEE Trans Consum Electron 57(2):646\u2013650. \nhttps:\/\/doi.org\/10.1109\/TCE.2011.5955203","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"7527_CR9","doi-asserted-by":"publisher","first-page":"234","DOI":"10.5909\/JBE.2017.22.2.234","volume":"22","author":"K Kim","year":"2017","unstructured":"Kim K, Kim U, Kwak S (2017) Read-time violence video detection based on movement change characteristics. Journal of Broadcast Engineering 22(2):234\u2013239. \nhttps:\/\/doi.org\/10.5909\/JBE.2017.22.2.234","journal-title":"Journal of Broadcast Engineering"},{"key":"7527_CR10","volume-title":"Survey of media audience","author":"Korea Press Foundation","year":"2013","unstructured":"Korea Press Foundation (2013) Survey of media audience. Korea Press Foundation, Seoul"},{"issue":"2","key":"7527_CR11","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TCE.2009.5174439","volume":"55","author":"S Lee","year":"2009","unstructured":"Lee S, Shim W, Kim S (2009) Hierarchical system for objectionable video detection. IEEE Transactions on Consumer Electronic 55(2):667\u2013684. \nhttps:\/\/doi.org\/10.1109\/TCE.2009.5174439","journal-title":"IEEE Transactions on Consumer Electronic"},{"issue":"1","key":"7527_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/LGRS.2015.2499239","volume":"13","author":"D Marmanis","year":"2016","unstructured":"Marmanis D, Datcu M, Esch T, Stilla U (2016) Deep learning earth observation classification using ImageNet pretrained networks. IEEE Geosci Remote Sens Lett 13(1):105\u2013109. \nhttps:\/\/doi.org\/10.1109\/LGRS.2015.2499239","journal-title":"IEEE Geosci Remote Sens Lett"},{"issue":"4","key":"7527_CR13","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.neucom.2016.12.017","volume":"230","author":"M Pereza","year":"2017","unstructured":"Pereza M, Avilab S, Moreiraa D, Moraesa D, Testonic V, Valleb E, Goldensteina S, Rocha A (2017) Video pornography detection through deep learning techniques and motion information. Neurocomputing 230(4):279\u2013293. \nhttps:\/\/doi.org\/10.1016\/j.neucom.2016.12.017","journal-title":"Neurocomputing"},{"issue":"12","key":"7527_CR14","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1109\/TIFS.2017.2725820","volume":"12","author":"T Senst","year":"2017","unstructured":"Senst T, Eiselein V, Kuhn A, Sikora T (2017) Crowd violence detection using global motioncompensated lagrangian features and scale-sensitive video-level representation. IEEE Transactions on Information Forensics and Security 12(12):2945\u20132956. \nhttps:\/\/doi.org\/10.1109\/TIFS.2017.2725820","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7527_CR15","unstructured":"Zheng H, Liu H, Daoudi M (2004) Blocking objectionable images: adult images and harmful symbols. In Proceedings of the IEEE International Conf. on Multimedia and Expo"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7527-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7527-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7527-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:09:02Z","timestamp":1593623342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7527-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,3]]},"references-count":15,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7527"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7527-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,3]]},"assertion":[{"value":"4 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}