81
Views
6
CrossRef citations to date
0
Altmetric
Articles

A self-adaptable image spam filtering system

, , &
Pages 517-528 | Received 03 Aug 2012, Accepted 13 Apr 2013, Published online: 22 Jul 2013

References

  • Aradhye, H. B., G. K. Myers, and J. A. Herson. 2005. “Image Analysis for Efficient Categorization of Image-based Spam E-mail.” In Proceedings of the Eighth International Conference on Document Analysis and Recognition, Seoul, Korea, 29 August – 1 September 2005: 2: 914–918. Washington, DC: IEEE computer society.
  • Biggio, B., G. Fumera, I. Pillai, and F. Roli. 2011. “A Survey and Experimental Evaluation of Image Spam Filtering Techniques.” Pattern Recognition Letters 32 (10): 1436–1446.
  • Byun, B., C. H. Lee, S. Webb, and C. Pu. 2007. “A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification.” In Proceedings of the Fourth Conference on Email and Anti-spam (CEAS), Mountain View, CA, 2–3 August 2007.
  • Chang, C. C., and C. J. Lin. 2001, LIBSVM: A Library for Support Vector Machines [online]. Accessed February 20, 2011. http://www.csie.ntu.edu.tw/~cjlin/libsvm
  • Cormack, G. V., and A. Bratko. 2006. “Batch and Online Spam Filter Comparison.” In Proceedings of the Third Conference on Email and Anti-spam (CEAS), Mountain View, CA, 27–28 July 2006.
  • Dredze, M., R. Gevaryahu, and A. Elias-Bachrach, 2007. “Learning Fast Classifiers for Image Spam.” In Proceedings of the Fourth Conference on Email and Anti-spam (CEAS), Mountain View, CA, 2–3 August 2007.
  • Drucker, H., D. Wu, and V. N. Vapnik. 1999. “Support Vector Machines for Spam Categorization.” IEEE Transactions on Neural Networks 10 (5): 1048–1054.
  • Frankel, C., M. Swain, V. Athitsos. 1996. Webseer: An Image Search Engine for the World Wide Web. University of Chicago Technical, Report TR96-14.
  • Fumera, G., I. Pillai, and F. Roli. 2006. “Spam Filtering Based on the Analysis of Text Information Embedded into Images.” Journal of Machine Learning Research 7: 2699–2720.
  • Gao, Y., M. Yang, and X. Zhao. 2008. “Image Spam Hunter.” In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, 31 March - 4 April 2008: 1765–1768. Washington, DC: IEEE Computer Society.
  • Gargiulo, F., A. Penta, A. Picariello, and C. Sansone. 2008. “Using Heterogeneous Features for Anti-spam Filters.” In Proceedings of the 19th International Workshop on Database and Expert Systems Application, Turin, Italy, 1–5 September 2008: 670–674. Austria: DEXA.
  • He, P., X. Wen, and W. Zheng, 2009. “A Simple Method for Filtering Image Spam.” In Proceedings of the IEEE/ACIS International Conference on Computer and Information Science, Shanghai, China, 1–3 June 2009: 910–913. Washington, DC: IEEE Computer Society.
  • Hu, J., and A. Bagga. 2004. “Categorizing Images in Web Documents.” IEEE Multimedia 11 (1): 22–30.
  • Liu, Q., Z. Qin, H. Cheng, and M. Wan. 2010. “Efficient Modeling of Spam Images.” In Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, Jian, China. 2–4 April 2010: 663–666. Washington, DC: IEEE.
  • MessageLabs. 2010. MessageLabs Intelligence: 2010 Annual Security Reports [online]. Accessed February 20, 2011 http://www.messagelabs.com/mlireport/MessageLabsIntelligence_2010_Annual_Report_FINAL.pdf
  • Rui, Y., T. S. Huang, and S. F. Chang. 1999. “Image Retrieval: Current Techniques, Promising Directions, and Open Issues.” Journal of Visual Communications and Image Representation 10 (1): 39–62.
  • Sahami, M., S. Dumais, D. Heckerman, and E. Horviz. 1998. “A Bayesian Approach to Filtering Junk E-mail.” In AAAI’98 Workshop on Learning for Text Categorization, Madison, WI, 26–27 July 1998.
  • Schryver, V. 2000. Distributed Checksum Clearinghouse [online]. Accessed February 20, 2011. http://www.rhyolite.com/dcc/
  • Spam Assassin [online]. Accessed December 13, 2010 http://spamassassin.apache.org/
  • Stricker, M., and M. Orengo. 1995. “Similarity of Color Images.” In Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases III, San Jose, CA, 5–10 February 1995: 2420: 381–392. USA: SPIE.
  • The official captcha site [online]. Accessed December 13, 2010. http://www.captcha.net/
  • TREC Spam Track [online]. Accessed December 13, 2010 http://trec.nist.gov/data/spam.html
  • Uemura, M., and T. Tabata. 2008. “Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method.” In Proceeding of International Conference on Information Security and Assurance, Busan, Korea, 24–26 April 2008. Washington, DC: IEEE Computer Society.
  • Wang, Z., W. Josephson, Q. Lv, M. Charikar, and K. Li. 2007. “Filtering Image Spam With Near-duplicate Detection.” In Proceedings of the fourth conference on email and anti-spam (CEAS), Mountain View, CA, 2–3 August 2007.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.