{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:10:01Z","timestamp":1748563801863,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T00:00:00Z","timestamp":1439424000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11277-015-2966-1","type":"journal-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T16:26:25Z","timestamp":1439396785000},"page":"109-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of Harmful Content Using Multilevel Verification in Visual Sensor Data"],"prefix":"10.1007","volume":"86","author":[{"given":"Seok-Woo","family":"Jang","sequence":"first","affiliation":[]},{"given":"Myunghee","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"issue":"2","key":"2966_CR1","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1007\/s11277-013-1588-8","volume":"77","author":"KK Hasan","year":"2014","unstructured":"Hasan, K. K., Ngah, U. K., & Salleh, M. F. M. (2014). Efficient hardware-based image compression schemes for wireless sensor networks: A survey. Wireless Personal Communications, 77(2), 1415\u20131436.","journal-title":"Wireless Personal Communications"},{"key":"2966_CR2","doi-asserted-by":"crossref","unstructured":"Haywood, A., Sherbeck, J., Phelan, P., Varsamopoulos, G., & Gupta, S. K. S. (2012, June). Investigating a relationship among CPU and system temperatures, thermal power, and CPU tasking levels. In Proceedings of the IEEE intersociety conference on thermal and thermomechanical phenomena in electronic systems (ITherm\u20192012), San Diego, USA, pp. 821\u2013827.","DOI":"10.1109\/ITHERM.2012.6231511"},{"issue":"1","key":"2966_CR3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.6109\/jicce.2015.13.1.015","volume":"13","author":"Z Zhang","year":"2015","unstructured":"Zhang, Z., Lim, H.-T., & Lee, H.-J. (2015). The design of an efficient proxy-based framework for mobile cloud computing. Journal of Information and Communication Convergence Engineering (JICCE), 13(1), 15\u201320.","journal-title":"Journal of Information and Communication Convergence Engineering (JICCE)"},{"issue":"4","key":"2966_CR4","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1007\/s11277-013-1327-1","volume":"76","author":"K Guo","year":"2014","unstructured":"Guo, K., Ma, J., & Duan, G. (2014). DHSR: A novel semantic retrieval approach for ubiquitous multimedia. Wireless Personal Communications, 76(4), 779\u2013793.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2966_CR5","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s11277-013-1233-6","volume":"73","author":"D Suh","year":"2013","unstructured":"Suh, D., Kim, J., & Chang, S. (2013). Perceived quality measurement model supporting full session mobility in multimedia service delivery. Wireless Personal Communications, 73(2), 233\u2013242.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2966_CR6","doi-asserted-by":"crossref","first-page":"020508-1","DOI":"10.2352\/J.ImagingSci.Technol.2011.55.2.020508","volume":"55","author":"S-W Jang","year":"2011","unstructured":"Jang, S.-W., Park, Y.-J. G.-Y., Kim, H.-I. Choi, & Hong, M.-C. (2011). An adult image identification system based on robust skin segmentation. Journal of Imaging Science and Technology, 55(2), 020508-1\u2013020508-10.","journal-title":"Journal of Imaging Science and Technology"},{"issue":"8","key":"2966_CR7","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1016\/j.patcog.2006.11.016","volume":"40","author":"J-S Lee","year":"2007","unstructured":"Lee, J.-S., Kuo, Y.-M., Chung, P.-C., & Chen, E.-L. (2007). Naked image detection based on adaptive and extensible skin color model. Pattern Recognition, 40(8), 2261\u20132270.","journal-title":"Pattern Recognition"},{"issue":"16","key":"2966_CR8","doi-asserted-by":"crossref","first-page":"2367","DOI":"10.1016\/j.patrec.2007.08.002","volume":"28","author":"J-L Shih","year":"2007","unstructured":"Shih, J.-L., Lee, C.-H., & Yang, C.-S. (2007). An adult images identification system employing image retrieval technique. Pattern Recognition Letters, 28(16), 2367\u20132374.","journal-title":"Pattern Recognition Letters"},{"key":"2966_CR9","unstructured":"Zheng, Q.-F., Zeng, W., Wen, G., & Wang, W.-Q. (2004, December). Shape-based adult images detection. In Proceedings of the IEEE symposium on multi-agent security and survivability, pp. 150\u2013153."},{"issue":"6","key":"2966_CR10","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1109\/TPAMI.2007.1133","volume":"29","author":"W Hu","year":"2007","unstructured":"Hu, W., Wu, O., Chen, Z., Fu, Z., & Maybank, S. (2007). Recognition of pornographic web pages by classifying texts and images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(6), 1019\u20131034.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"7","key":"2966_CR11","first-page":"2643","volume":"15","author":"Y-J Park","year":"2012","unstructured":"Park, Y.-J., Weon, S.-H., Sung, J.-K., Choi, H.-I., & Kim, G.-Y. (2012). Identification of adult images through detection of the breast contour and nipple. Information - An International Interdisciplinary Journal, 15(7), 2643\u20132652.","journal-title":"Information - An International Interdisciplinary Journal"},{"key":"2966_CR12","doi-asserted-by":"crossref","unstructured":"Tsai, M.-J., & Chang, H.-S. (2013, September). The design of a hybrid feature detector for adult images. In Proceedings of the IEEE seventh international conference on semantic computing (ICSC\u201913), Irvine, CA, pp. 389\u2013390.","DOI":"10.1109\/ICSC.2013.73"},{"key":"2966_CR13","unstructured":"Zheng, H., Liu, H., & Daoudi, M. (2004, June). Blocking objectionable images: adult images and harmful symbols. In Proceedings of the IEEE international conference on multimedia and expo (ICME\u201904), Taipei, Taiwan. Vol. 2, pp. 1223\u20131226."},{"key":"2966_CR14","doi-asserted-by":"crossref","unstructured":"Ochoa, V. M. T., Yayilgan, S. Y., & Cheikh, F. A. (2012, November). Adult video content detection using machine learning techniques. In Proceedings of the international conference on signal image technology and internet based systems (SITIS\u201912), Naples, Italia, pp. 967\u2013974.","DOI":"10.1109\/SITIS.2012.143"},{"key":"2966_CR15","doi-asserted-by":"crossref","unstructured":"Yin, L., Dong, M., Deng, W., Guo, J., & Zhang, B. (2012, July). Statistical color model based adult video filter. In Proceedings of the IEEE international conference on multimedia and expo workshops (ICMEW\u20192012), Melbourne, Australia, pp. 349\u2013353.","DOI":"10.1109\/ICMEW.2012.66"},{"issue":"2","key":"2966_CR16","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/TCE.2012.6227471","volume":"58","author":"S Lee","year":"2012","unstructured":"Lee, S., Kwak, Y., Kim, Y. J., Park, S., & Kim, J. (2012). Contrast-preserved chroma enhancement technique using YCbCr color space. IEEE Transactions on Consumer Electronics, 58(2), 641\u2013645.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"2966_CR17","doi-asserted-by":"crossref","unstructured":"Noda, H., Takao, N., & Niimi, M. (2007, September). Colorization in YCbCr space and its application to improve quality of JPEG color images. In Proceedings of the IEEE international conference on image processing (ICIP\u2019 12), San Antonio, USA, Vol. 4, pp. IV-385\u2013IV-388.","DOI":"10.1109\/ICIP.2007.4380035"},{"key":"2966_CR18","doi-asserted-by":"crossref","unstructured":"Chiang, J.-S., Hsia, C.-H., Peng, H.-W., Lien, C.-H., & Li, H.-T. (2012, November). Saturation adjustment method based on human vision with YCbCr color model characteristics and luminance changes. In Proceedings of the IEEE international symposium on intelligent signal processing and communications systems (ISPACS\u201912), New Taipei, Taiwan, pp. 136\u2013141.","DOI":"10.1109\/ISPACS.2012.6473467"},{"issue":"5","key":"2966_CR19","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/34.1000242","volume":"24","author":"R-L Hsu","year":"2002","unstructured":"Hsu, R.-L., Abdel-Mottaleb, M., & Jain, A. K. (2002). Face detection in color images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(5), 696\u2013706.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"2966_CR20","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.patrec.2007.09.013","volume":"29","author":"K-M Lee","year":"2008","unstructured":"Lee, K.-M. (2008). Component-based face detection and verification. Pattern Recognition Letters, 29(3), 200\u2013214.","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"2966_CR21","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/34.476009","volume":"18","author":"PT Jackway","year":"1996","unstructured":"Jackway, P. T., & Deriche, M. (1996). Scale-space properties of the multi-scale morphological dilation-erosion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(1), 38\u201351.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"3","key":"2966_CR22","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1016\/j.precisioneng.2012.01.003","volume":"36","author":"S Lou","year":"2012","unstructured":"Lou, S., Jiang, X., & Scott, P. J. (2012). Algorithms for morphological profile filters and their comparison. Precision Engineering, 36(3), 414\u2013423.","journal-title":"Precision Engineering"},{"issue":"10","key":"2966_CR23","doi-asserted-by":"crossref","first-page":"3193","DOI":"10.1016\/j.patcog.2014.04.024","volume":"47","author":"R Su","year":"2014","unstructured":"Su, R., Sun, C., Zhang, C., & Pham, T. D. (2014). A new method for linear feature and junction enhancement in 2D images based on morphological operation, oriented anisotropic Gaussian function and Hessian information. Pattern Recognition, 47(10), 3193\u20133208.","journal-title":"Pattern Recognition"},{"issue":"1","key":"2966_CR24","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0031-3203(01)00017-6","volume":"35","author":"YS Boutalis","year":"2002","unstructured":"Boutalis, Y. S., Tsirikolias, K., Metrtzios, B. G., & Andreadis, I. T. (2002). Implementation of morphological filters using coordinate logic operations. Pattern Recognition, 35(1), 187\u2013198.","journal-title":"Pattern Recognition"},{"key":"2966_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X.-H., Wang, J.-Y., Zhang, J.-L., Liang, H.-W., & Kou, P.-M. (2010). Study on the detection of yarn hairiness morphology based on image processing technique. In Proceedings of the international conference on machine learning and cybernetics ( ICMLC\u20192010 ), Qingdao , China, Vol. 5, pp. 2332\u20132336.","DOI":"10.1109\/ICMLC.2010.5580660"},{"issue":"3","key":"2966_CR26","doi-asserted-by":"crossref","first-page":"390","DOI":"10.3969\/j.issn.1004-4132.2010.03.007","volume":"21","author":"S Zhang","year":"2010","unstructured":"Zhang, S., Lin, Y., Zhang, X., & Chen, Y. (2010). Airport automatic detection in large space-borne SAR imagery. Journal of Systems Engineering and Electronics, 21(3), 390\u2013396.","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"1","key":"2966_CR27","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otus","year":"1979","unstructured":"Otus, N. (1979). A threshold selection method from gray-level histogram. IEEE Transactions on Systems, Man and Cybernetics, 9(1), 62\u201366.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"issue":"1","key":"2966_CR28","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin, M., & Sankur, B. (2004). Survey over image thresholding techniques and quantitative performance evaluation. Journal of Electronic Imaging, 13(1), 146\u2013165.","journal-title":"Journal of Electronic Imaging"},{"key":"2966_CR29","doi-asserted-by":"crossref","unstructured":"Arshad, N., Moon, K.-S., & Kim, J.-N. (2014, September). Adaptive real-time ship detection and tracking using morphological operations. Journal of Information and Communication Convergence Engineering, 12(3), 168\u2013172.","DOI":"10.6109\/jicce.2014.12.3.168"},{"issue":"11","key":"2966_CR30","doi-asserted-by":"crossref","first-page":"3630","DOI":"10.1016\/j.patcog.2014.05.009","volume":"47","author":"Y Lei","year":"2014","unstructured":"Lei, Y., Zheng, L., & Huang, J. (2014). Geometric invariant features in the radon transform domain for near-duplicate image detection. Pattern Recognition, 47(11), 3630\u20133640.","journal-title":"Pattern Recognition"},{"key":"2966_CR31","doi-asserted-by":"crossref","unstructured":"Gang, L., Li, X.-H., Zhou, J.-L., & Gong, X.-G. (2009, August). Geometric feature-based facial expression recognition using multiclass support vector machines. In Proceedings of the IEEE International Conference on Granular Computing (GRC\u2019 2009), Nanchang, China, pp. 318\u2013321.","DOI":"10.1109\/GRC.2009.5255106"},{"key":"2966_CR32","doi-asserted-by":"crossref","unstructured":"Wang, L., Xu, F., & Hagiwara, I. (2009, April). Investigation into registration of scanned 3D image based on geometric feature identification. In Proceedings of the international conference on computer supported cooperative work in design (CSCWD\u20192009), Santiago, Chile pp. 648\u2013653.","DOI":"10.1109\/CSCWD.2009.4968132"},{"key":"2966_CR33","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.cviu.2013.12.005","volume":"122","author":"A Sobral","year":"2014","unstructured":"Sobral, A., & Vacavant, A. (2014). A comprehensive review of background subtraction algorithms evaluated with synthetic and real videos. Computer Vision and Image Understanding, 122, 4\u201321.","journal-title":"Computer Vision and Image Understanding"},{"key":"2966_CR34","doi-asserted-by":"crossref","unstructured":"Jamil, N., Bakar, Z. A., & Sembok, T. M. T. (2010, March). Quantitative and qualitative performance evaluations of artificially-produced images. In Proceedings of the international conference on information retrieval and knowledge management (CAMP\u201910), Shah Alam , Malaysia, pp. 113\u2013118.","DOI":"10.1109\/INFRKM.2010.5466937"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2966-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2966-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2966-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:53:19Z","timestamp":1748562799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2966-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,13]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["2966"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2966-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2015,8,13]]}}}