How To Filter Spam Image From A Picture By Color Or Color
|
|
|
- Richard Barnett
- 5 years ago
- Views:
Transcription
1 Image Content-Based Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, has become one of the main methods of communication among people. Due to the flood of online information, great amount of the spam s brings troubles to people. The number of technical approaches of spam filtering are increasing which are mostly based on the text spam filtering technologies. But it is not very effective for test messages imbedded into images which are developing rapidly in recent years. In this paper, we propose an approach of spam image filtering. Our approach combines the characteristics of spam images with the corner point density to detect spam images. The effectiveness of the proposed approach is experimentally evaluated. (Examples: subscriber newsletters, customer communications, discussion lists). However spam mail can also appear in the form of an image. Spam image is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the [4], [5]. Fig. 1 shows us some examples of spam image. And Fig. 2 shows us an example of non-spam images. Index Terms Spam filtering, spam images, the corner point density. I. INTRODUCTION A. The Background of the With the popularization of Internet around the world, has become one of the main methods of communication among people. However, because of the flood of online information in the recent years, a lot of people`s inbox space is plagued by spam s. These spam s not only waste internet users network bandwidth and computing resources, but can also, on a much larger scale, interrupt enterprises normal network operation. For years, about 80% to 95% of s on Internet are somehow composed of spams [1]. In 2012, the proportion of spam was at its lowest level in 5 years, but it still composed 72% of all s, among which spam image has grown to 17%. [2] (a) Image containing only text (b) Image with photographic elements Fig. 1. Examples of spam images. B. The Definition of Spam The word Spam as applied to means "Unsolicited and Bulk ". Unsolicited means that the recipient has not granted verifiable permission for the message to be received. Bulk means that the message is sent as part of a larger collection of messages, which has substantively identical content [3]. A message is a spam only if it is both Unsolicited and Bulk. Unsolicited is normal (Examples: first contact enquiries, job enquiries, sales enquiries) Bulk is normal Fig. 2. Example of non-spam images. Manuscript received September 12, 2013; revised December 18, Jianyi Wang is with the University of Tsukuba Tennodai1-1-1, Tsukuba, Ibaraki , Japan ( [email protected]). Kazuki Katagishi is with Academic Computing and Communications Center, Organization for Information Infrastructure, University of Tsukuba, Tennoudai 1-1-1, Tsukuba, Ibaraki , Japan ( [email protected]). DOI: /JACN.2014.V2.92 II. EXISTING RESEARCH Although it is very subjective for users to judge whether a message is a spam or not. But according to the delivery address and contents of s, it can be very beneficial for users to filter spams in advance. 110
2 We will make a brief introduction of existing filtering methods as follows: Word lists Simple and complex lists of words that are known to be associated with spam. For example, property sales. Black lists and White lists These lists contain known IP addresses of spam and non-spam senders, respectively. Hash-tables These systems summarize s into pseudo-unique values. Repeated sightings of hash values are symptomatic of a bulk mailing. Artificial Intelligence and Probabilistic systems Systems such as SVM are used to identify word frequencies and patterns that usually are associated with both spam and non-spam messages. Most of the above methods are based on the text spam filtering technologies. But they are not very effective for spam images which are growing rapidly in recent years. images in corpus, we worked out the average histogram of all. The result is Fig. 4. Fig. 4. The average histogram with 999 pieces of spam images. At the same time we also have carried out contrast experiments on non-spam images. We have collected a total of 453 various images. The histogram of a non-spam image is in Fig. 5. III. EXPERIMENT A. Preparation By collecting spam mails, corpus is established. And then we pick 999 pieces of typical spam to analyze the color characteristics. Here we used the 8-bit RGB mode to analyze. The histograms are shown in Fig. 3 as follows: Fig. 5. The histogram of non-spam image in Fig. 2. Fig. 6 shows us the average histogram of all non-spam images. (a) The histogram of the spam image in Fig.1 (a). Fig. 6. The average histogram with 453 pieces of non-spam images. By comparing Fig. 4 with Fig. 6, we find that spams have no rich color information, which is more monotonous. But non-spam images have more uniform color distribution. After analyzing the characteristics, we did the following several steps ahead of image processing: (b) The histogram of the spam image in Fig.1 (b). Fig. 3. The histograms of two spam images in Fig.1. In order to reflect the overall characteristics of spam 111
3 Step1: Color Edge Detection In our researches, for the purpose of image preprocessing, we transformed from RGB mode to gray level and the outline of the image is obtained (in Fig. 7) [6]. Because of the sensitivity of the human`s eye to color is different, so the According to statistics, the best value is Gray=0.3R+0.59G+0.11B Fig. 10. The result of corner detection. B. Spam Image Discrimination The general idea of the algorithm is based on the corner proportion of the images to judge if it is a spam or not. Since the information must be expressed in words, and it`s difficult to detect out whether the words are in the images or not. Spammers disguise spam information by graphical words. In this way, the spam images should have much more graphical text than non-spam images. At the same time, words have larger number of corner points than number of curves, so we can judge if it is a text area according to the corner proportion of the area. [4] Furthermore, we can judge whether it is a spam or not. The marked matrix is established in accordance with the calculated corner point coordinate. 1) The whole zero matrix mk which has the same size as the original image is generated which the length and the width which are marked as H and W respectively. Fig. 7. The histogram of the gray level in Fig. 1. (b). After obtaining gray level s value, through trial and error, we get the best outline effect which ranges between 40 and 180. Step 2: Image Binarization This study uses the simplest constant threshold segmentation. After repeatedly testing the system the threshold value is set to 120 [7], [8]. (See Fig. 8) mk (i, j ) 0 (i 0,1, 2...H 1; j 0,1, 2...W 1) 2) In accordance with the corner point coordinate the place of the corner point is set as 1 and then the matrix represents the distribution of the corner points in original images. Fig. 8. The result of spam image by Image Binarization in Fig. 1 (b). Step 3: Corner Point Detection By improving gradient operator from [ ] which is used in Harris corner detection to [5 0-5; 8 0-8; 5 0-5], 8 neighborhoods is taken into account to expand the scope of the detection in the x-axis. Similarly in the y-axis operator [-2,-1, 0, 1, 2] also changed to [5 8 5; 0 0 0; ]. By the maximum obtained within the operator, we can get the positions and the number of corner points. As the result of improving the operator, corner points increased from 489 to 573. (In Fig. 9 and Fig. 10) 0 mk (i, j ) 1 (i, j ) is not a corner (i, j ) is a corner The calculation concept is to count the total number of all pixel of 1 in mk in the area of model matrix mask. 1) A model matrix mask which is composed of 1 will generate the length and the width which are marked as m and n. And at the same time also a marked matrix R is set as all values are 0. mask(m, n) 1 (m 0,1, 2...M 1; n 0,1, 2...N 1) R(i, j ) 0 (i 0,1, 2...H 1; j 0,1, 2...W 1) 2) The pixel coincided by mask and mk should be multiplied, then comes the summation. The value is taken as the central location of mask matrix. Then Fig. 9. Computing process in x-axis. 112
4 mask will be changed in pixel and the calculation will be made again to get the value of another point in R. The process is two-dimensional convolution. The value of the point got from R matrix represents that the point is taken as the center. The value of the corner points in the area corresponding to mask matrix area will be summed up. larger than rat-spam, it means that there are many areas with larger corner point density and it is also correspondent to larger text area. Then it will be regarded as spam image. Otherwise, it will be regarded as normal pictures. rat spam denr rat spam spam non spam According to experimental results from collected corpus, the value of the rat-spam 0.01 is given here. The value rate of the image in Fig. 1 (b) is So the image is judged as a spam image. IV. EVALUATION We collected and extracted a corpus of spam mails with the images, and then pick up 999 pieces of typical spam images to analyze. At the same time, we also select 453 pieces of non-spam images mixed into spam images in the experiment. Fig. 11. Process diagram. When the value of a point in R matrix is k, it represents that the corner point density of the area with center point and the same size with mask is k/ (M N). Here we use denr to express the density of R. denr R(i, j ) / (M N ) k / (M N ) Fig. 13. The results by different thresholds. From the results shown in Fig. 13 we find that by taking 0.01 as threshold we can obtain the best results. Based on the results, the detection rate of spam images is 904/999=90.5%. The non-spam s is 421/453=92.0%. Comprehensive detection rate is ( )/ ( ) =91.3%. A threshold value of corner point density will be determined as rate, when the value of denr is lower than the threshold value rate, it means that the density is low and the denr here is set as 0. Through this method, the corner point area which distributes scatteredly will be removed and the values of R represents that the threshold value of corner point is larger than rate. (See Fig. 12) V. CONCLUSION On the whole, by the corner point density in images to filtering the spam images, the detection rate is relatively high. Our proposal method can be effective against spam images from spam mails. Combined with pre-existing methods which have been used into practical application, we can effectively filter spam mails. Effectively identify the corner and conduct corner statistics is the key point in this experiment. In future researches, we strive to optimize the algorithm design of corner detection. We also hope to remove the noise around the outline of the binary image as much as possible in order to provide better image quality for corner point detection in next step. Because spam image`s style changes fast, newer modifications of spam image are already found in the span of our research. Consequently, anti-spam technology should be improved continuously. In next step, our work will focus Fig. 12. The result of text corner point recognition. We judge a spam image by getting the ratio of non-zero elements in the matrix R where the value is larger than rate. A threshold value rat-spam will be used to distinguish whether the image is a spam picture or not. When the ratio is 113
5 on finding new algorism to cope with more crafty spams. REFERENCES [1] Symantec s quarterly report, (2009, September). [Online]. Available: _01 [2] Chinese Anti-Spam Survey Report in the Fourth Quarter of 2012, Internet Society of China, December [3] The official website of The Spamhaus Project. [4] S. Krasser et al. Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning, in Proc the 2007 IEEE Workshop on Information Assurance, 2007, pp [5] D. G. Bachrachae, Learning fast classifiers for image spam, presented at the 4th Conference on and Anti Spam, [6] Y. Y. Xu and H. Yuan, The advertisement spam image filtering method based on image content, Journal of Shandong University (Natural Science), vol. 2006, no. 3, pp. 9, [7] H. B. Aradhye, G. K. Myers, and J. A. Herson, Image analysis for efficient categorization of image-based spam , in Proc. Eighth International Conference on Document Analysis and Recognition, 2005, vol. 2, pp [8] D. Sagarmay and Y. C. Zhang, An overview of content-based image retrieval techniques, in Proc. 18th International Conference on Advanced Information Networking and Applications, 2004, vol. 1, pp Jianyi Wang had received the B. E. in computer science and technology from Tianjin University of Technology, China in Now he is pursuing his master of engineering at the University of Tsukuba, Japan. His current researches focus on network security especially spam mail filtering. Kazuki Katagishi had received his B.E. in electronics engineering from Nagoya Institute of Technology, Japan in He had received two M.S. and Ph.D in information sciences and electronics from the University of Tsukuba, Japan in 1982, 1984, and 1987 respectively. In 1987, he joined in KDD R&D Laboratories. From 1990 to 1993, he worked in ATR Interpreting Telephony Research Laboratories and was mainly engaged in the development of speech recognition systems. From 1993 to 1999, he was engaged in the development of security mail gateway. He is now an associate professor of University of Tsukuba. His current researches include network security, network management and hyperfunctions-based signal processing and their applications to the new generation network. 114
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 [email protected] ABSTARCT:
AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION
AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION Shashi Kant Rathore Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, Punjab [email protected] Jyoti
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning
Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning Sven Krasser, Yuchun Tang, Jeremy Gould, Dmitri Alperovitch, Paul Judge Abstract
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
Domain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
Fusion of Text and Image Features: A New Approach to Image Spam Filtering
Fusion of Text and Image Features: A New Approach to Image Spam Filtering Congfu Xu 1, Kevin Chiew 2, Yafang Chen 1,andJuxinLiu 1 1 Institute of Artificial Intelligence, Zhejiang University, Hangzhou,
PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR
PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR V. Sathiya *1 M.Divakar #2 T.S. Sumi *3 1 Faculty, Department of M.C.A, Panimalar Engineering College, Anna University, Chennai, India 2 PG Scholar, Department
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
Image Spam Filtering Using Visual Information
Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering
2007 IEEE/WIC/ACM International Conference on Web Intelligence PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering Khurum Nazir Juneo Dept. of Computer Science Lahore University
[email protected]. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam
An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State [email protected] Abdulhamid Shafi i
Image Spam Filtering by Content Obscuring Detection
Image Spam Filtering by Content Obscuring Detection Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari Piazza d Armi, 09123 Cagliari,
Image Based Spam: White Paper
The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because
A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
Identifying Potentially Useful Email Header Features for Email Spam Filtering
Identifying Potentially Useful Email Header Features for Email Spam Filtering Omar Al-Jarrah, Ismail Khater and Basheer Al-Duwairi Department of Computer Engineering Department of Network Engineering &
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Galaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
Data Pre-Processing in Spam Detection
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers Isack Bulugu Department of Electronics Engineering, Tianjin University of Technology and Education, Tianjin, P.R.
SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China [email protected] Mingjun Liu
A Fast Algorithm for Multilevel Thresholding
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 713-727 (2001) A Fast Algorithm for Multilevel Thresholding PING-SUNG LIAO, TSE-SHENG CHEN * AND PAU-CHOO CHUNG + Department of Electrical Engineering
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
K-means Clustering Technique on Search Engine Dataset using Data Mining Tool
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 505-510 International Research Publications House http://www. irphouse.com /ijict.htm K-means
A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
Lasso-based Spam Filtering with Chinese Emails
Journal of Computational Information Systems 8: 8 (2012) 3315 3322 Available at http://www.jofcis.com Lasso-based Spam Filtering with Chinese Emails Zunxiong LIU 1, Xianlong ZHANG 1,, Shujuan ZHENG 2 1
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters Wei-Lun Teng, Wei-Chung Teng
Towards better accuracy for Spam predictions
Towards better accuracy for Spam predictions Chengyan Zhao Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 2E4 [email protected] Abstract Spam identification is crucial
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Spam Detection and the Types of Email
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Spam Detection
An Anti-Spam Engine using Fuzzy Logic with Enhanced Performance Tuning
An Anti-Spam Engine using Fuzzy Logic with Enhanced Performance Tuning Vijayan R Assistant Professor (Senior), Viknesh S T G M M.S. in Software Engineering, Subhashini S M.S. in Software Engineering, ABSTRACT
An Approach to Detect Spam Emails by Using Majority Voting
An Approach to Detect Spam Emails by Using Majority Voting Roohi Hussain Department of Computer Engineering, National University of Science and Technology, H-12 Islamabad, Pakistan Usman Qamar Faculty,
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
Mean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Learning Fast Classifiers for Image Spam
Learning Fast Classifiers for Image Spam Mark Dredze Computer and Information Sciences Dept. University of Pennsylvania Philadelphia, PA 19104 [email protected] Reuven Gevaryahu Philadelphia, PA 19104
Improved Spam Filter via Handling of Text Embedded Image E-mail
J Electr Eng Technol Vol. 9, No.?: 742-?, 2014 http://dx.doi.org/10.5370/jeet.2014.9.7.742 ISSN(Print) 1975-0102 ISSN(Online) 2093-7423 Improved Spam Filter via Handling of Text Embedded Image E-mail Seongwook
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift Sarah Jane Delany 1 and Pádraig Cunningham 2 and Barry Smyth 3 Abstract. While text classification has been identified for some time
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
Florida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
Email Spam Detection A Machine Learning Approach
Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
FireEye Email Threat Prevention Cloud Evaluation
Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Table of Contents Executive Summary... 1 Introduction... 1 About
The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
FCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao [email protected] Fei Li Department of Computer Science
Adjust Webmail Spam Settings
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
Visibility optimization for data visualization: A Survey of Issues and Techniques
Visibility optimization for data visualization: A Survey of Issues and Techniques Ch Harika, Dr.Supreethi K.P Student, M.Tech, Assistant Professor College of Engineering, Jawaharlal Nehru Technological
