CFP last date
20 December 2024
Reseach Article

Filtering Image Spam: A Survey

by Shina, Preeti Anand
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 5
Year of Publication: 2013
Authors: Shina, Preeti Anand
10.5120/13738-1543

Shina, Preeti Anand . Filtering Image Spam: A Survey. International Journal of Computer Applications. 79, 5 ( October 2013), 23-26. DOI=10.5120/13738-1543

@article{ 10.5120/13738-1543,
author = { Shina, Preeti Anand },
title = { Filtering Image Spam: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 5 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number5/13738-1543/ },
doi = { 10.5120/13738-1543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:14.603593+05:30
%A Shina
%A Preeti Anand
%T Filtering Image Spam: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 5
%P 23-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Electronic mail being one of the most prevalent methods for exchange of digital messages has been facing the biggest threat that is spam. Since the text spam can be easily detected so a new variant of spamming came into being. The new variant of spam is the image spam that is the trending method of spamming. This paper investigates the several classifiers used in the image spam classification like the Decision Tree and the Support Vector Machine (SVM) and a combination of the both.

References
  1. M86 Security Whitepaper, http://www. m86security. com/newsimages/trace/RiseandFallofImageSpam_March08. pdf.
  2. IBM X Force Report, http://blogs. iss. net/archive/image-spamrebirth. html
  3. Tzong-Jye Liu ; Wen-Liang Tsao ; Chia-Lin Lee, 'A High Performance Image-Spam Filtering System, Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), 2010, pp: 445 – 449 doi :10. 1109/DCABES. 2010. 97
  4. Ching-Tung Wu ; Kwang-Ting Cheng ; Qiang Zhu ; Yi-Leh Wu" Using visual features for anti-spam filtering", IEEE International Conference on Image Processing, 2005. Volume: 3, pp: III - 509-12, doi: 10. 1109/ICIP. 2005. 1530440
  5. Krasser, Sven ; Yuchun Tang ; Gould, J. ; Alperovitch, D. ;Judge, P. " Identifying Image Spam based on Header and File Properties using C4. 5 Decision Trees and Support Vector Machine Learning" Information Assurance and Security Workshop, 2007,pp: 255 - 261, doi: 10. 1109/IAW. 2007. 381941
  6. M. Uemura, T. Tabata, "Design and Evaluation of a Bayesian-filter based Image Spam Filtering Method," International Conference on Information Security and Assurance, pp. 46-51, May 2008.
  7. H. Drucker, D. Wu, V. N. Vapnik, "Support Vector Machines for Spam Categorization," IEEE Transactions on Neural networks, vol. 10, no. 5, September 1999.
  8. J. R. Quinlan, "Introduction of Decision Tree," Machine Learning,vol. 1, pp. 81-106, 1986.
  9. C. Wu, "Behavior-based Spam Detection Using a Hybrid Method of Rule Based Techniques and Neural Networks," Journal of Expert Systems with Applications, vol. 36, pp. 4321-4330, April 2009.
  10. Chao Wang ; Fengli Zhang ; Fagen Li ; Qiao Liu, "Image spam classification based on low-level image features", International Conference on Communications, Circuits and Systems, 2010 pp: 290 - 293
  11. Yan Gao ; Ming Yang ; Xiaonan Zhao ; Pardo, B. ; Ying Wu ;Pappas, T. N. ; Choudhary, A. , " Image spam hunter", IEEE International Conference on Acoustics, Speech and Signal Processing, 2008, pp: 1765 - 1768, doi: 10. 1109/ICASSP. 2008. 4517972
  12. Gargiulo, F. ; Sansone, C. , Combining visual and textual features for filtering spam emails, 19th International Conference on Pattern Recognition, ICPR 2008. , pp: 1 – 4, doi: 10. 1109/ICPR. 2008. 4761828
  13. J. Shi and J. Malik. Normalized cuts and image segmentation. In IEEE Transactions on Pattern Analysisand Machine Intelligence, volume 22, pages 888{ 905, 2000.
  14. http: //www. cs. waikato. ac. nz/ml/weka/.
  15. C. -T. Wu, et al. A Novel Embedded-Text-in-Image Detector and Its Applications. UCSB Technical Report, January 2005
  16. B. Scolkopf, J. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson. "Estimating the support of a high-dimensional distribution" . Technical Report 99-87, Microsoft Research, 1999
  17. http://www. csie. ntu. edu. tw/~cjlin/libsvm
Index Terms

Computer Science
Information Sciences

Keywords

Image Spam Decision Tree SVM