931
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Building systems to block pornography

      proceedings-article
      , ,
      Challenge of Image Retrieval (CIR)
      Image Retrieval
      25th - 26th February 1999
      Bookmark

            Abstract

            Experience and recent lawsuits have led large internet users to search for ways to filter email and web traffic by content. This paper reviews the prospects for this research for specific domain: pornography. We present results on a particularly challenging image-only database and describe how these image-only methods might be fused with test-based analysis to produce a multimedia system.

            Content

            Author and article information

            Conference
            February 1999
            February 1999
            : 1-9
            Affiliations
            [0001]School of Information Systems, University of East Anglia

            Norwich, UK.
            Article
            10.14236/ewic/CIR1999.8
            71b5be1d-c1e1-4af3-be34-9431b58c5ae7
            © Yi Chan et al. Published by BCS Learning and Development Ltd. Challenge of Image Retrieval

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Challenge of Image Retrieval
            CIR
            Newcastle upon Tyne, UK
            25th - 26th February 1999
            Electronic Workshops in Computing (eWiC)
            Image Retrieval
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/CIR1999.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article