{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:49:15Z","timestamp":1771847355085,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T00:00:00Z","timestamp":1694131200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T00:00:00Z","timestamp":1694131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16619-9","type":"journal-article","created":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T12:02:35Z","timestamp":1694174555000},"page":"28807-28825","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["DVRGNet: an efficient network for extracting obscenity from multimedia content"],"prefix":"10.1007","volume":"83","author":[{"given":"Kamakshi","family":"Rautela","sequence":"first","affiliation":[]},{"given":"Dhruv","family":"Sharma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3460-6989","authenticated-orcid":false,"given":"Vijay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Dinesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,8]]},"reference":[{"issue":"1","key":"16619_CR1","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11042-016-4273-6","volume":"77","author":"S Shojae Chaeikar","year":"2018","unstructured":"Shojae Chaeikar S, Zamani M, Abdul Manaf AB, Zeki AM (2018) PSW statistical LSB image steganalysis. Multimed Tools Appl 77(1):805\u2013835","journal-title":"Multimed Tools Appl"},{"key":"16619_CR2","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s12065-022-00729-8","volume":"16","author":"S Karamizadeh","year":"2023","unstructured":"Karamizadeh S, Shojae Chaeikar S, Jolfaei A (2023) Adult content image recognition by Boltzmann machine limited and deep learning. Evol Intel 16:1185\u20131194. https:\/\/doi.org\/10.1007\/s12065-022-00729-8","journal-title":"Evol Intel"},{"issue":"3","key":"16619_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.23860\/dignity.2017.02.03.03","volume":"2","author":"G Dines","year":"2017","unstructured":"Dines G (2017) Growing up with porn: the developmental and societal impact of pornography on children. Dignity 2(3):3","journal-title":"Dignity"},{"key":"16619_CR4","doi-asserted-by":"crossref","unstructured":"Perez M, Avila S, Moreira D, Moraes D, Testoni V, Valle E, ... Rocha A (2017) Video pornography detection through deep learning techniques and motion information. Neurocomputing 230:279\u2013293","DOI":"10.1016\/j.neucom.2016.12.017"},{"issue":"1","key":"16619_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/A:1013200319198","volume":"46","author":"MJ Jones","year":"2002","unstructured":"Jones MJ, Rehg JM (2002) Statistical color models with application to skin detection. Int J Comput Vision 46(1):81\u201396","journal-title":"Int J Comput Vision"},{"key":"16619_CR6","unstructured":"Rowley HA, Jing Y, Baluja S (2006) Large-scale image-based adult-content filtering. 1st International Conference on Computer Vision Theory"},{"issue":"2","key":"16619_CR7","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TCE.2009.5174439","volume":"55","author":"S Lee","year":"2009","unstructured":"Lee S, Shim W, Kim S (2009) Hierarchical system for objectionable video detection. IEEE Trans Consum Electron 55(2):677\u2013684","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"16619_CR8","first-page":"7","volume":"35","author":"H Bouirouga","year":"2012","unstructured":"Bouirouga H, Elfkihi S, Jilbab A, Aboutajdine D, El Fkihi S (2012) Skin detection in pornographic videos using threshold technique. J Theor Appl Inf Technol 35(1):7\u201319","journal-title":"J Theor Appl Inf Technol"},{"key":"16619_CR9","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.neucom.2017.07.012","volume":"272","author":"J Wehrmann","year":"2018","unstructured":"Wehrmann J, Sim\u00f5es GS, Barros RC, Cavalcante VF (2018) Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272:432\u2013438","journal-title":"Neurocomputing"},{"issue":"2","key":"16619_CR10","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TPAMI.2017.2670560","volume":"40","author":"YG Jiang","year":"2017","unstructured":"Jiang YG, Wu Z, Wang J, Xue X, Chang SF (2017) Exploiting feature and class relationships in video categorization with regularized deep neural networks. IEEE Trans Pattern Anal Mach Intell 40(2):352\u2013364","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"16619_CR11","doi-asserted-by":"publisher","unstructured":"Avila S, Thome N, Cord M, Valle E, de A. Ara\u00fajo A (2011) BOSSA: Extended bow formalism for image classification. In: 2011 18th IEEE International Conference on Image Processing, Brussels, pp 2909\u20132912. https:\/\/doi.org\/10.1109\/ICIP.2011.6116268","DOI":"10.1109\/ICIP.2011.6116268"},{"issue":"5","key":"16619_CR12","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.cviu.2012.09.007","volume":"117","author":"S Avila","year":"2013","unstructured":"Avila S, Thome N, Cord M, Valle E, Ara\u00faJo ADA (2013) Pooling in image representation: the visual codeword point of view. Comput Vis Image Underst 117(5):453\u2013465","journal-title":"Comput Vis Image Underst"},{"key":"16619_CR13","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.patrec.2020.09.027","volume":"140","author":"L Wang","year":"2020","unstructured":"Wang L, Zhang J, Wang M, Tian J, Zhuo L (2020) Multilevel fusion of multimodal deep features for porn streamer recognition in live video. Pattern Recogn Lett 140:150\u2013157","journal-title":"Pattern Recogn Lett"},{"key":"16619_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.106983","volume":"96","author":"F Cheng","year":"2019","unstructured":"Cheng F, Wang SL, Wang XZ, Liew AWC, Liu GS (2019) A global and local context integration DCNN for adult image classification. Pattern Recogn 96","journal-title":"Pattern Recogn"},{"key":"16619_CR15","doi-asserted-by":"crossref","unstructured":"da Silva MV, Marana AN (2018) Spatiotemporal CNNs for pornography detection in videos. In: Iberoamerican Congress on Pattern Recognition, pp 547\u2013555. Springer International Publishing, Cham","DOI":"10.1007\/978-3-030-13469-3_64"},{"key":"16619_CR16","doi-asserted-by":"crossref","unstructured":"Gautam N, Vishwakarma DK (2022) Obscenity detection in videos through a sequential convnet pipeline classifier. In: IEEE Transactions on Cognitive and Developmental Systems 15(1):310\u2013318","DOI":"10.1109\/TCDS.2022.3158613"},{"key":"16619_CR17","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1109\/ACCESS.2022.3147519","volume":"10","author":"K Yousaf","year":"2022","unstructured":"Yousaf K, Nawaz T (2022) A deep learning-based approach for inappropriate content detection and classification of youtube videos. IEEE Access 10:16283\u201316298","journal-title":"IEEE Access"},{"key":"16619_CR18","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"issue":"8","key":"16619_CR19","doi-asserted-by":"publisher","first-page":"6217","DOI":"10.1016\/j.jksuci.2021.08.004","volume":"34","author":"SI Khan","year":"2022","unstructured":"Khan SI, Shahrior A, Karim R, Hasan M, Rahman A (2022) MultiNet: a deep neural network approach for detecting breast cancer through multi-scale feature fusion. Journal of King Saud University-Computer and Information Sciences 34(8):6217\u20136228","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"16619_CR20","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"16619_CR21","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"16619_CR22","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"16619_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41095-021-0261-5","volume":"8","author":"MH Guo","year":"2022","unstructured":"Guo MH, Xu TX, Liu JJ, Liu ZN, Jiang PT, Mu TJ, Zhang S-H, Martin RR, Cheng M-M, Hu S-M (2022) Attention mechanisms in computer vision: a survey. Comput Vis Media 8:1\u201338","journal-title":"Comput Vis Media"},{"key":"16619_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.neucom.2021.02.056","volume":"445","author":"A Gangwar","year":"2021","unstructured":"Gangwar A, Gonz\u00e1lez-Castro V, Alegre E, Fidalgo E (2021) AttM-CNN: attention and metric learning based CNN for pornography, age and child sexual abuse (CSA) detection in images. Neurocomputing 445:81\u2013104","journal-title":"Neurocomputing"},{"key":"16619_CR25","doi-asserted-by":"publisher","first-page":"122709","DOI":"10.1109\/ACCESS.2020.2988736","volume":"8","author":"J Chen","year":"2020","unstructured":"Chen J, Liang G, He W, Xu C, Yang J, Liu R (2020) A pornographic images recognition model based on deep one-class classification with visual attention mechanism. IEEE Access 8:122709\u2013122721","journal-title":"IEEE Access"},{"key":"16619_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14437-7","author":"S Samal","year":"2023","unstructured":"Samal S, Nayak R, Jena S et al (2023) Obscene image detection using transfer learning and feature fusion. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-14437-7","journal-title":"Multimed Tools Appl"},{"key":"16619_CR27","doi-asserted-by":"crossref","unstructured":"Samal S, Zhang Y\u2010D, Gadekallu TR, Nayak R, Balabantaray BK (2023) SBMYv3: improved MobYOLOv3 a BAM attention\u2010based approach for obscene image and video detection. Expert Systems e13230","DOI":"10.1111\/exsy.13230"},{"key":"16619_CR28","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/1895341","author":"C Huang","year":"2020","unstructured":"Huang C, Yuan C, Zhang J (2020) Violation detection of live video based on deep. Learning. https:\/\/doi.org\/10.1155\/2020\/1895341","journal-title":"Learning"},{"issue":"1","key":"16619_CR29","first-page":"115","volume":"3","author":"K Aggarwal","year":"2022","unstructured":"Aggarwal K, Mijwil MM, Al-Mistarehi AH, Alomari S, G\u00f6k M, Alaabdin AMZ, Abdulrhman SH (2022) Has the future started? The current growth of artificial intelligence, machine learning, and deep learning. Iraqi J Comput Sci Math 3(1):115\u2013123","journal-title":"Iraqi J Comput Sci Math"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16619-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16619-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16619-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T08:18:43Z","timestamp":1709799523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16619-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,8]]},"references-count":29,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16619"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16619-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,8]]},"assertion":[{"value":"3 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}