ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Identifying and Restricting Abusive Images in Emails

G.V.Hindumathi, M.Sandhya, K.Sudha and P.Sravya
Assistant Professor, Dept. Of CSE,Gayatri Vidya Parishad Enggineering College,Visakhapatnam, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: Some people are sending attachments through emails like spam mails and some fraud images .In this project we check the mail before sending it to the receiver mail id for the fraud images using “Skin Detection Algorithm” and also identify the spam mails. If any fraud images and spam mails are identified then the IP address and physical location of that sender is identified by a third party application. This ethical hacking technique is effectively used for identifying the location of the spam mail. After identifying the sender of the mail, discard the mail and send some warning message to that sender mail id. If that mail doesn‟t contain any spam files or abusive images, send it to the receiver mail id.

Keywords

Electronic commerce, E-mail, Skin Detection Algorithm, IP address, Ethical Hacking, Spam files

INTRODUCTION

The Internet or the World Wide Web is indeed a wonderful and amazing addition in our lives. The Internet can be known as a kind of global meeting place where people from all parts of the world can come together. It is a service available on the computer, through which everything under the sun is now at the fingertips of anyone who has access to the Internet. So many protocols are using for uploading and downloading the files in internet. Using internet some disadvantages are also there. Upload some obscene images into web. Using some types of software‟s we can stop the uploading. Main advantage of the internet is emailing.
The main problem with emailing is some people attach some obscene images and send through emails. So we can‟t access the email attachments and can‟t stop the sending. In this project check every mail attachment, if it is an image. This project mainly used for private network.
In private network a user send a mail with attachment to other user through server. Sender sends attachment details and receiver mail ids to server mail id. Server downloads the image and applies Skin Detection Algorithm. And then send it to receiver mail ids or Hack the ip - address
As it is mainly intended to for private networks. We assume that the Server has access to all the mails. Integrated 2 applications, as these are already existing systems. The Project is done under 2 phases.
A. 1st Phase: It Deals with identification of obscene images if any in mail attachments and restricting them using skin detection algorithm.
B. 2nd Phase: It deals with identification of the sender IP- address, if any obscene image identified.
This can be extended to public networks also
image

METHODS

In this proposal we are using Java for sending mails with attachments. Platform Independent, It is a unique feature of java, which made it an internet language.
C. Check the Authentication of Sender :
Here check authentication of sender mail ids.If Password authentication function returns „one‟ then mail attachement try to send. In case it returns „Zero‟ raise exception.
image
At server side after getting mail attachment from sender, Server verifies mail attachment image by using Skin detection algorithm. For this we are using MATLAB. As suggested by its name (a contraction of "Matrix Laboratory"), MATLAB provides can create and manipulate arrays of 1 (vectors), 2 (matrices), or more dimensions. In the MATLAB vernacular, a vector refers to a one dimensional (1×N or N×1) matrix, commonly referred to as an array in other programming languages. A matrix generally refers to a 2-dimensional array, i.e. an m×n array where m and n are greater than or equal to 1.
D. Skin Detection Algorithm:
image

RESULTS

image
image
image
image
image
E. Not an Abusive Mail Attachment:
Verify that attached image with skin detection algorithm, if Image is not an abusive image then send it to the receiver mail ids
image
F. An Abusive \Mail Attachment:
Verify that attached image with skin detection algorithm, if Image is an abusive image then send some warning message to the sender and hack the sender system also.
image
image

CONCLUSION

In this proposal, an attempt is been made to identify any abusive images which are sent as attachments through e-mails and restrict such mails in a private network. The mails are first checked for any attachments and if any, the attachments are checked for any abusive content using skin detection algorithm at the server. If any abusive content is present the mail is deprived of transmission to the recipient and a warning message is send to the sender.
The implementation is done only for private networks; it may be extended to public networks also.

FUTURE WORK

The basic skin detection algorithm just gives the threshold value but this value is not very accurate. Still work has to be done for accurate skin detection algorithm to give exact value of the image. Second phase of this project is hacking where the IP address of the sender of abusive images is tracked and a warning message is sent. In this project a third party tool is used for hacking but it can be implemented by code also.

References

  1. Kenneth Einar Himma, © 2007 :„Internet Security: Hacking, Counterhacking, and Society „ ,Seattle Pacific University, 304 pages .
  2. Albiol, A.; Torres, L.; Delp, E.J.; Univ. Politecnica de Valencia ,„Optimum color spaces for skin detection‟, International Conference, Vol.1, pp.122 – 124, 2001.
  3. Jedynak, Bruno; Zheng, Huicheng; Daoudi, Mohamed ,‟ Statistical models for Skin Detection‟, Computer Vision and Pattern Recognition Workshop, CVPRW '03. Conference, Vol.8, pp. 92-92, 2009.
  4. Michael J. Jones and James M. Rehg.„Statistical Color Models with Application to Skin Detection‟, Computer Vision and Pattern Recognition, IEEE Computer Society Conference,Vol.1, 1999.