Data Management

Identification of Image Spam by Using Low Level & Metadata Features

Download Now Date Added: Mar 2012
Format: PDF

Spammers are constantly evolving new spam technologies, the latest of which is image spam. Till now research in spam image identification has been addressed by considering properties like colour, size, compressibility, entropy, content etc. However, the authors feel the methods of identification so evolved have certain limitations due to embedded obfuscation like complex backgrounds, compression artifacts and wide variety of fonts and formats. To overcome these limitations, they have proposed 2 methodologies(however, there can be more).