Eighth International Conference on Document Analysis and Recognition (ICDAR'05) 2005
DOI: 10.1109/icdar.2005.135
|View full text |Cite
|
Sign up to set email alerts
|

Image analysis for efficient categorization of image-based spam e-mail

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(35 citation statements)
references
References 6 publications
0
34
0
Order By: Relevance
“…Second, e-mails can contain multiple images and it is not clear how to combine them towards a single prediction. One approach has been done by Aradhye et al [17]. They treated each image separately, avoiding this difficulty.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Second, e-mails can contain multiple images and it is not clear how to combine them towards a single prediction. One approach has been done by Aradhye et al [17]. They treated each image separately, avoiding this difficulty.…”
Section: Related Workmentioning
confidence: 99%
“…The classification can then be fed into existing content filters as a feature. Others have followed this approach [17] and it had several advantages. First, it separates image classification from spam e-mail classification, which is a difficult and well-studied problem.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, spammers have used distorted and noisy images to convey text messages, much attention has been paid to the specific problem of extracting features from these images [8,14,22,52,62,186], however, the overall impact of image-specific techniques has yet to be established [74].…”
Section: Tokenizationmentioning
confidence: 99%
“…filters that learn and identify textual patterns of spam messages, are used by most ESPs [7,8]. Unfortunately, spammers have developed their own techniques to circumvent content based filters, such as image-spam mails [9] and hashbusters [10].…”
Section: Introductionmentioning
confidence: 99%