Skip to main content

A Realistic Framework for Counter-terrorism in Multimedia

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

The internet has become an easy platform for video broadcasting by providing an inexpensive but weak publishing barrier to everyone and eventually attracting the huge audience. Terrorists make use of videos as an efficient medium for spreading their message; showing violence to attract sympathies, terrify viewers and promoting radicalization; videos act as an important weapon towards their mission. Existing internet security solutions and blocking methods rely on textual data and lack analysis of visual content. In this paper, we propose a novel framework that can realistically automate the screening of such videos using visual content analysis and consequently alert the authorities. After examining existing discrete definitions of violence, we classify the broad spectrum of violence in videos into four streams which serve as the core functions of the proposed system. The system is capable of evaluating the semantic context as well as the extent of violence in the videos. Being fully automatic and comprehensive, the system works efficiently and more effectively in comparison to any existing systems proving itself as a powerful combating tool in controlling the means and effects of this mode of terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    No children under 17 (NC-17), www.en.wikipedia.org/wiki/List_of_NC-17_rated_films.

  2. 2.

    Movies that are restricted for children or require parental check/guideline.

  3. 3.

    Many of these videos were later removed from the video sharing sites after user complaints and flagging.

  4. 4.

    See www.wikipedia.org for explanation of these terms.

  5. 5.

    TRECVID is a worldwide competition organized annually by the National Institute of Standards and Technology, USA. It provides large video datasets to participants for performing experiments for various tasks of the video analysis process. It has served as a platform leading to state of the art technologies. See more at: http://trecvid.nist.gov/

  6. 6.

    Available at: http://www.anvil-software.de

  7. 7.

    http://www.ee.bilkent.edu.tr/~signal/VisiFire/index.html

References

  1. Yariv T, Gabriel W (2002) www.terror.com-Terror on the Internet. Studies in Conflict & Terrorism, 25:317–332

    Google Scholar 

  2. Dahl G, Vigna SD (2009) Does movie violence increase violent crime? The Q. J. Econ., MIT Press, 124(2):677–734

    Google Scholar 

  3. Using the Web as a Weapon: The Internet as a Tool for Violent Radicalization and Homegrown Terrorism. (2007) (Hearing on Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security House of Representatitves, one hundred tenth congress 2007)

    Google Scholar 

  4. Conway M, McInerney L (2008) Jihadi video & auto-radicalization: evidence from an exploratory YouTube study. Euro ISI 2008, First European Conference on Intelligent and Security Informatics.

    Google Scholar 

  5. Definition of ‘Terrorist’ taken from www.wikipedia.org

  6. The Translational Terrorism, Security and Rule of Law Report (2008) Terrorism and The Media. WorkPackage 4, Deliverable 6. Accessed 25th Jan 2012 http://www.transnationalterrorism.eu/tekst/publications/WP4%20Del%206.pdf

  7. List of blocking software: www.peacefire.org/info/blocking-software-faq.html

  8. Chen L, Hsu H, Wang L, Su C (2011) Violence detection in movies. Eighth international conference computer graphics, imaging and visualization. IEEE Computer Society, pp 119–124

    Google Scholar 

  9. Reisz K, Millar G (1968). The technique of film editing. Focal Press, Oxford UK

    Google Scholar 

  10. Hanjalic A (2004) Content based analysis of digital video. Kluwer Academic Publishers, Delft

    Google Scholar 

  11. Smeaton AF, Over P. (2010) Video shot boundary detection: seven years of trecvid activity. Computer Vision and Image Understanding 114:411–418

    Google Scholar 

  12. Zhang H, Low CY, Smoliar SW, Zhong D (1995) Video parsing, retrieval and browsing: an integrated and content-based solution. Proceedings of the ACM Conference on Multimedia, New York, USA

    Google Scholar 

  13. Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Computing Surveys 31(3):264–323

    Google Scholar 

  14. Chasanis V, Likas A, Galatsanos N (2007) Scene detection in videos using shot clustering and symbolic sequence segmentation. IEEE Proceedings of Multimedia Signal Processing, Crete, Greece

    Google Scholar 

  15. Yuan Y, Pang Y, Pan J, Li X (2009) Scene segmentaion based on IPCA fro visual surveillance. Elsevier Neurocomputing 2450–2454

    Google Scholar 

  16. Wang W, Yang J, Gao W (2008) Modeling background and segmenting moving objects from compressed video. IEEE Proceedings on Circuits and Systems for Video Technology, vol. 18, 670–681

    Google Scholar 

  17. Wang Y, Xing CX, Zhou L (2006) Video semantic models: survey and evaluation. IJCSNS, vol. 6, 10–20

    Google Scholar 

  18. Benetos E, Siatras S, Kotropoulos C, Nikolaidis N, Pitas I (2008) Movie analysis with emphasis to dialogue and action scene detection. Multimedia Processing and Interaction. Springer Science + Business Media, pp 157–177

    Google Scholar 

  19. Datta A, Shah M, Lobo NV (2002) Person-on-person violence detection in video data. IEEE 16th International Conference on Pattern Recognition, pp 433–438

    Google Scholar 

  20. Bovik A (2000) Handbook of Image and video processing. Academic Publishers, San Diego, CA

    Google Scholar 

  21. Ma H, Zhu J, Lyu MR, King I (2007) Bridging the semantic gap between image content and tags. Journal of Latex Files, vol. 12, 1–12

    Google Scholar 

  22. Mihling M, Ewerth R, Friesleben B (2009) Improving semantic video retrieval via object-based features. IEEE International Conference in Semantic Computing. IEEE Computer Society, pp 109–115

    Google Scholar 

  23. Li J, Wang JZ (2007) Real-time computerized annotation of pictures. Proceedings of the ACM Multimedia Conference, Santa Barbara, CA, October 2006. pp. 911–920

    Google Scholar 

  24. Wei L, Hoi SC, Yu N (2010) Semantics-Preserving BoW model and applications. IEEE Transactions on Image Processing, vol. 19, 1908–1920

    Google Scholar 

  25. Smith JR (2006) Large-scale concept ontology for multimedia. IEEE Computer Society 86–91

    Google Scholar 

  26. Nevatia R, Hobbs J, Bolles B, (2004) An ontology for video event representation. Conference on Computer Vision and Pattern Recognition Workshop, p 119

    Google Scholar 

  27. Giannakopoulos T et al (2006) Violence content classification using audio features. Fourth Hellenic conference on Artificial Intelligence, pp 502–507

    Google Scholar 

  28. Zajdel W et al (2007) Cassandra: audio-video scene fusion for aggression detection. IEEE Conference on Advanced Video and Signal Based Surveillance, pp 200–205

    Google Scholar 

  29. Lin J, Wang W (2009) Weakly supervised violence detection in movies with audio and video based co-training. Lecture Notes in Computer Science 5879:930–935

    Google Scholar 

  30. Clarin C et al (2006) DOVE: detection of movie violence using motion intensity analysis on skin and blood. 6th Philippine Computing Science Congress, Computing Society of Phillipines, pp 150–156

    Google Scholar 

  31. Souza FD et al (2010) Violence detection using spatio-temporal features. Proceedings SIBGRAPI 10, Proceedings of the 2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images. ISBN: 978-0-7695-4230-0 doi:10.1109/SIBGRAPI.2010.38, pp. 224–230

    Google Scholar 

  32. Bermejo E, Deniz O, Bueno G, Sukthankar R (2011) Violent action recognition using computer vision techniques. 14th International Conference on Computer Analysis of Images and Patterns, Seville, Spain

    Google Scholar 

  33. Chen L, Hsu H, Wang L, Su C (2011) Violence detection in movies. IEEE Eigth International Conference on Computer Graphics, Imaging and Visualization, pp 119–124

    Google Scholar 

  34. Viola P, Jones MJ (2004) Robust real-time face detection. IJCV 57:137–154

    Google Scholar 

  35. Vinnay Bettadapura (2012) Face expression recognition and analysis: the state of the art. Tech Report, arXiv:1203.6722

    Google Scholar 

  36. Lopes APB, Valle EA Jr, de Almeida JM, de Araújo AA (2010) Action recognition in videos: from motion capture labs to the web. arXiv:1006.3506v1. ACM classes, CVIU, I.4.8; I.4.10

    Google Scholar 

  37. Boggs J, Petrie DW (2000) The art of watching films. Mountain View, CA, USA

    Google Scholar 

  38. Choros K, Pawlaczyk P. (2010) Content-based scene detection and analysis method for automatic classification of TV sports news. RSCTC, LNAI 6086. Springer-Verlag Berlin Heidlberg, pp 120–129

    Google Scholar 

  39. Salem A, Reid E, Chen H (2008) Multimedia content coding and analysis: unraveling the content of jihadi extremist groups’ videos. Studies in Conflict and Terrorism, pp 605–626. Routledge Taylor and Francis Group

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nasrullah Memon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Mirza, DuA., Memon, N. (2013). A Realistic Framework for Counter-terrorism in Multimedia. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_19

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics