Proceedings of the 15th International Joint Conference on E-Business and Telecommunications 2018
DOI: 10.5220/0006921405970607
|View full text |Cite
|
Sign up to set email alerts
|

Support Vector Machines for Image Spam Analysis

Abstract: Email is one of the most common forms of digital communication. Spam is unsolicited bulk email, while image spam consists of spam text embedded inside an image. Image spam is used as a means to evade textbased spam filters, and hence image spam poses a threat to email-based communication. In this research, we analyze image spam detection using support vector machines (SVMs), which we train on a wide variety of image features. We use a linear SVM to quantify the relative importance of the features under conside… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(36 citation statements)
references
References 9 publications
0
36
0
Order By: Relevance
“…In [15], the performance of PCA and SVM based image spam classifiers are studied on two datasets in which the Linear and Radial Basis Function SVM models achieved better results. The first dataset is developed by [13] and the second improved dataset is developed by [16] which cannot be detected properly by PCA and SVM based approach.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], the performance of PCA and SVM based image spam classifiers are studied on two datasets in which the Linear and Radial Basis Function SVM models achieved better results. The first dataset is developed by [13] and the second improved dataset is developed by [16] which cannot be detected properly by PCA and SVM based approach.…”
Section: Related Workmentioning
confidence: 99%
“…This dataset is developed as a challenge dataset in work [16] in order to test the performance of image spam models with more advanced spam images. It contains a total of 1,029 spam images that are generated by embedding spam text in ham images as shown in Fig.…”
Section: B Improved Datasetmentioning
confidence: 99%
“…Combining two or machine learning models is discussed by a previous research, where malware files are classified by considering them as images, thus converting it to a image classification problem using CNNs [16]. Another previous research to detect metamorphic malware combines scores from different techniques, namely, HMMs, Simple Substitution Distance (SSD) and Opcode Graph Similarity (OGS) and uses a SVM to classify these scores [17].…”
Section: Previous Workmentioning
confidence: 99%
“…This dataset was created by Chavda et al [4] using image processing techniques on spam images to make them appear more like a ham image. A public corpus named Spam Archieve [18] consists of only spam images.…”
Section: Datasetmentioning
confidence: 99%
“…Previous research into image spam detection has shown that some types of image spam can be detected with high accuracy. For example, in [4,5] These experiments serve two purpose. First, we can determine an effective strategy in the ''cold start'' case, that is, in the case where the training data is severely limited.…”
Section: Introductionmentioning
confidence: 99%