Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A survey of image spamming and filtering techniques

Published: 01 June 2013 Publication History

Abstract

Many techniques have been proposed to combat the upsurge in image-based spam. All the proposed techniques have the same target, trying to avoid the image spam entering our inboxes. Image spammers avoid the filter by different tricks and each of them needs to be analyzed to determine what facility the filters need to have for overcoming the tricks and not allowing spammers to full our inbox. Different tricks give rise to different techniques. This work surveys image spam phenomena from all sides, containing definitions, image spam tricks, anti image spam techniques, data set, etc. We describe each image spamming trick separately, and by perusing the methods used by researchers to combat them, a classification is drawn in three groups: header-based, content-based, and text-based. Finally, we discus the data sets which researchers use in experimental evaluation of their articles to show the accuracy of their ideas.

References

[1]
Aradhye HB, Myers GK, Herson JA (2005) Image analysis for efficient categorization of image-based spam e-mail. In: Eight international conference on document analysis and recognition (ICDAR'05), IEEE, Korea.
[2]
Biggio B, Fumera G, Pillai I, Roli F (2007) Image spam filtering using visual information. In: The 14th international conference on image analysis and processing, Modena, Italy, 10-14 September 2007. IEEE Computer Society, pp 105-110.
[3]
Biggio B, Fumera G, Pillai I, Roli F (2007) Image spam filtering by content obscuring detection. In: The 4th conference on email and AntiSpam, CEAS2007, Mountain View, California, USA, August 2007.
[4]
Biggio B, Fumera G, Pillai I, Roli F (2008) Improving image spam filtering using image text features. In: Fifth conference on email and anti-spam (CEAS 2008), Mountain View, CA, USA.
[5]
Biggio B, Fumera G, Pillai I, Roli F (2011) A survey and experimental evaluation of image spam filtering techniques. Pattern Recogn Lett (in press).
[6]
Blanzieri E, Bryl A (2009) A survey of learning-based techniques of email spam filtering. J Artif Intell Rev.
[7]
Chen W, Zhang C (2009) Image spam clustering--an unsupervised approach. In: Proceedings of the first ACM workshop on multimedia in forensics, China, October 2009.
[8]
Cheng H, Qin Z, Fu C, Wang Y (2010) Novel spam image filtering framework with multi-label classification. In: International conference on communications, circuits and systems (ICCCAS), China.
[9]
Chew M, Tygar JD (2004) Image recognition CAPTCHAs. In: 7th International information security conference, ISC2004, Palo Alto, CA, USA, September 2004.
[10]
Dredze M, Gevaryahu R, Elias-Bachrach A (2007) Learning fast classifiers for image spam. In: Proceedings of the 4th conference on email and anti-spam (CEAS), California, USA.
[11]
Fritsch Ch, Netter M, Reisser A, Pernul G (2010) Attacking image recognition captchas. In: The 7th international conference, TrustBus 2010, Bilbao, Spain, August, 2010.
[12]
Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7:2699-2720.
[13]
Fumera G, Pillai I, Roli F, Biggio B (2007) Image spam filtering using textual and visual information. In: The MIT spam conference 2007, Cambridge, USA, March 2007.
[14]
Gao Y (2009) Choudhary a active learning image spam hunter. In: 5th International symposium on visual computing (ISVC), USA.
[15]
Gao Y, Yang M, Zhao X, Pardo B, Wu Y, Pappas TN, Choudhary A (2008) Image spam hunter. Acoustics, speech and signal processing ICASSP. In: IEEE international conference on ICASSP, IEEE, USA.
[16]
Gao Y, Yang M, Choudhary A (2009)Semi supervised image spam hunter: a regularized discriminant EM approach. In: The international conference on advanced data mining and applications (ADMA), China.
[17]
Gao Y, Choudhary A, Hua G (2010) A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images. In: International conference on acoustics speech and signal processing (ICASSP), USA.
[18]
Gargiulo F, Sansone C (2008) Combining visual and textual features for filtering spam emails. In: 19th International conference on pattern recognition (ICPR), USA.
[19]
Gargiulo F, Penta A, Picariello A, Sansone C (2008) Using heterogeneous features for anti-spam filters. In: 19th International conference on database and expert systems application, Italy.
[20]
Gargiulo F, Penta A, Picariello A, Sansone C (2009) A personal anti spam system based on a behaviour-knowledge space approach. Springer J Stud Comput Intell, vol 245.
[21]
Goodman J, Heckerman D, Rounthwaite R (2005) Stopping spam. Scientific American, USA.
[22]
Hayati P, Potdar V (2008) Evaluation of spam detection and prevention frameworks for email and image spam--a state of art. In: Proceedings of iiWAS, ACM, Linz, Austria.
[23]
He P, Sun Y, Zheng W, Wen X (2008) Filtering short message spam of group sending using CAPTCHA. In: IEEE, workshop on knowledge discovery and data mining, Australia, March 2008.
[24]
He P, Wen X, Zheng W (2009) A simple method for filtering image spam. In: ACIS international conference on computer and information science, IEEE, Australia-Japan.
[25]
Huang H, Guo W, Zhang Y (2008) A novel method for image spam filtering. In: The 9th international conference for young computer scientists.
[26]
Issac B, Raman V (2006) Spam detection proposal in regular and text-based image emails. In: IEEE Region 10 Conference TENCON, China.
[27]
Jithesh K, Sulochana KG, Kumar RR (2003) Optical character recognition (OCR) system for Malayalam language. In: National Workshop on application of language technology in Indian languages.
[28]
Johnston N (2007) Spam evolves, PDF becomes the latest threat. Anti-Spam Development at MessageLabs, A MessageLabs Whitepaper, August 2007.
[29]
Kelly N (2007) Image spam: the new email scourge. McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054, 888.847.8766 www.mcafee.com.
[30]
Kim J, Kim SH, Yang HJ, Son HJ, Kim WP (2007) Text extraction for spam-mail image filtering using a text color estimation technique. In: The 20th international conference on industrial, engineering and other applications of applied intelligent systems, IEA/AIE, Japan, June 2007.
[31]
Kim H, Chang H, Lee J, Lee D (2010) BASIL: effective near-duplicate image detection using gene sequence alignment. In: 32nd European conference on information retrieval. Springer, UK.
[32]
Klangpraphant P, Bhattarakosol P (2010) PIMSI: A partial image SPAM inspector. In: 5th International conference on future information technology (FutureTech), Thailand.
[33]
Krasser S, Tang Y, Gould J, Alperovitch D, Judge P (2007) Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning. In: Proceedings of the IEEE, workshop on information assurance, United States Military Academy, West Point.
[34]
Lang SR, Williams N (2010) Impeding CAPTCHA breakers with visual decryption. In: The 8th Australasian information security conference (AISC 2010), Brisbane, Australia.
[35]
Lawton G (2007) News briefs. Published by the IEEE Computer Society.
[36]
Liu Q, Zhang F, Qin Z, Wang C, Chen S, Ma Q (2010) Feature selection for image spam classification. In: International conference on communications, circuits and systems (ICCCAS), China.
[37]
Liu T, Tsao W, Lee C (2010) A high performance image-spam filtering system. In: Ninth international symposium on distributed computing and applications to business, engineering and science, China.
[38]
Liu Q, Qin Z, Cheng H, Wan M (2010) Efficient modeling of spam images. In: 3rd International symposium on intelligent information technology and security informatics, IEEE, China.
[39]
Ma W, Tran D, Sharma D (2006) Detecting image based spam email. In: Proceedings of the Asia-Pacific workshop on visual information processing, Asia-Pacific Workshop on Visual Information Processing, Beijing, China.
[40]
Mehta B, Nangia S, Gupta M, Nejdl W (2008) Detecting image spam using visual features and near duplicate detection. security and privacy. ACM, Beijing.
[41]
Nhung N, Phuong T (2007) An efficient method for filtering image-based spam E-mail, research, innovation and vision for the future. IEEE International, Vietnam.
[42]
Nielson J, Castro D, Aycock J (2008) Image Spam--ASCII to the Rescue!. In: 3rd International conference on malicious and unwanted software (MALWARE), USA.
[43]
Qu Z, Zhang Y (2009) Filtering image spam using image semantics and near-duplicate detection. In: Second international conference on intelligent computation technology and automation, IEEE, China.
[44]
Rusu A, Govindaraju V (2004) Handwritten CAPTCHA: using the difference in the abilities of humans and machines in reading handwritten words. In: 9th International workshop on frontiers in handwriting recognition (IWFHR-9 2004), IEEE, Japan.
[45]
Saraubon K, Limthanmaphon B (2009) Fast effective botnet spam detection. In: Fourth international conference on computer sciences and convergence information technology, Korea.
[46]
Soranamageswari M, Meena C (2010) Statistical feature extraction for classification of image spam using artificial neural networks. In: 2nd International conference on machine learning and computing, IEEE Press, Bangalore, India.
[47]
Stone B (2006) Spam doubles, finding new ways to deliver itself. The New York Times, A01 6. E.
[48]
Stern H (2008) A survey of modern spam tools. In: The fifth conference on email and anti-spam, CEAS, Mountain View, USA.
[49]
Stuart I, Cha H, Tappert C (2004) A neural network classifier for junk mail. Springer, Link 442-450.
[50]
Thomas R, Samosseiko D (2006) The game goes on: an analysis of modern spam techniques. Virus Bulletin conference, VB2006, October, Canada.
[51]
Uemura M, Tabat T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method. In: International conference on information security and assurance, IEEE Press, Busan, Korea.
[52]
Wang Z, Josephson W, Lv Q, Charikar M, Li K (2007) Filtering image spam with near-duplicate detection. In: Fourth conference on email and anti-spam, Mountain View, CA, USA.
[53]
Wang C, Zhang F, Li F, Liu Q (2010) Image spam classifcation based on low-level image features. In: IEEE international conference on communications, circuits and systems (ICCCAS 2010), Chengdu, China, July, 2010.
[54]
Wu C, Cheng K, Zhu Q, Wu Y (2005) Using visual features for anti-spam filtering. In: IEEE international conference on image processing III, pp 501-504.
[55]
Ye M, Tao T, Mai FJ, Cheng XH (2008) An spam discrimination based on mail header feature and SVM. In: The 4th international conference on wireless communications, networking and mobile computing, WiCOM '08, China, November, 2008.
[56]
Youn S, McLeod D (2009) Improved spam filtering by extraction of information from text embedded image E-mail. In: Proceedings of the ACM symposium on applied computing, USA.
[57]
Zinman A, Donath J (2007) Is Britney spears spam? In: Fourth conference on email and anti-spam mountain view, California, USA, August 2007.
[58]
Zhen X, Hong-guo W, Zeng-zhen S (2009) Evaluation of image spam classification system based on AHP. In: International conference on computational intelligence and software engineering (CiSE), China.
[59]
Zuo H, Hu W, Wu O, Chen Y, Luo G (2009) Detecting image spam using local invariant features and pyramid match kernel. In: 18th International world wide web conference (WWW), Spain.

Cited By

View all
  • (2022)An Improved Image Spam Classification Model Based on Deep Learning TechniquesSecurity and Communication Networks10.1155/2022/89054242022Online publication date: 1-Jan-2022
  • (2020)DeepCapture: Image Spam Detection Using Deep Learning and Data AugmentationInformation Security and Privacy10.1007/978-3-030-55304-3_24(461-475)Online publication date: 30-Nov-2020
  • (2019)An efficient character recognition method using enhanced HOG for spam image detectionSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-03728-z23:22(11759-11774)Online publication date: 1-Nov-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Artificial Intelligence Review
Artificial Intelligence Review  Volume 40, Issue 1
June 2013
104 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 June 2013

Author Tags

  1. Image classification
  2. Image spam
  3. Spam filtering techniques

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)An Improved Image Spam Classification Model Based on Deep Learning TechniquesSecurity and Communication Networks10.1155/2022/89054242022Online publication date: 1-Jan-2022
  • (2020)DeepCapture: Image Spam Detection Using Deep Learning and Data AugmentationInformation Security and Privacy10.1007/978-3-030-55304-3_24(461-475)Online publication date: 30-Nov-2020
  • (2019)An efficient character recognition method using enhanced HOG for spam image detectionSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-03728-z23:22(11759-11774)Online publication date: 1-Nov-2019
  • (2018)Image spam filtering using convolutional neural networksPersonal and Ubiquitous Computing10.5555/3288897.328892722:5-6(1029-1037)Online publication date: 1-Oct-2018
  • (2018)Distributed classification for image spam detectionMultimedia Tools and Applications10.1007/s11042-017-4944-y77:11(13249-13278)Online publication date: 1-Jun-2018
  • (2017)An intelligent character recognition method to filter spam images on cloudSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-015-1811-521:3(753-763)Online publication date: 1-Feb-2017
  • (2015)On robust image spam filtering via comprehensive visual modelingPattern Recognition10.1016/j.patcog.2015.02.02748:10(3227-3238)Online publication date: 1-Oct-2015
  • (2013)Pattern Recognition Systems under AttackProceedings, Part I, of the 18th Iberoamerican Congress on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - Volume 825810.1007/978-3-642-41822-8_1(1-8)Online publication date: 20-Nov-2013

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media