Views: 142 , Downloads: 113 | CTR: 80 % | Weekly Popularity: ⮙4
Research Paper | Information Technology | Myanmar | Volume 2 Issue 11, November 2013
Identification of Image Spam by Using Histogram and Hough Transform
Zin Mar Win, Nyein Aye
Today, the internet is the most powerful tools throughout the world. But the explosive growth of unsolicited emails has prompted the development of numerous spam filtering techniques. It needlessly obstruct the entire system. Spammers are creating new ways against anti-spam technology. By the end of 2006, the nature of spam had totally shifted. The newest of which is image-based spam. In general words, image spam is a type of email in which the text message is presented as a picture in an image file. This prevents text based spam filters from detecting and blocking such spam messages. There are several techniques available for detecting image spam (DNSBL, GrayListing, Spamtraps, etc). Each one has its own advantages and disadvantages. On behalf of their weakness, they become controversial to one another. This paper includes a general study on image spam detection using histogram and hough transform, which are explaind in the following sections. The proposed methods are tested on a spam archive dataset and are found to be effective in identifying all types of spam images having (1) only images (2) both text and images. The goal is to automatically classify an image directly as being spam or ham. The proposed method is able to identify a large amount of malicious images while being computationally inexpensive.
Keywords: histogram, hough transform, anti-spam technology, image spam detection, spam archive dataset
Edition: Volume 2 Issue 11, November 2013
Pages: 310 - 314
How to Cite this Article?
Zin Mar Win, Nyein Aye, "Identification of Image Spam by Using Histogram and Hough Transform", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013479, Volume 2 Issue 11, November 2013, 310 - 314
142 PDF Views | 113 PDF Downloads
Similar Articles with Keyword 'histogram'
Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙4
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
Views: 132 , Downloads: 112 | CTR: 85 % | Weekly Popularity: ⮙3
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2443 - 2447Separable Reversible Data Hiding In Image Using a Keyless Approach
Jitbahan Samanta, G. Sujatha
Views: 142 , Downloads: 113 | CTR: 80 % | Weekly Popularity: ⮙4
Research Paper, Information Technology, Myanmar, Volume 2 Issue 11, November 2013
Pages: 310 - 314Identification of Image Spam by Using Histogram and Hough Transform
Zin Mar Win, Nyein Aye
Views: 136 , Downloads: 121 | CTR: 89 % | Weekly Popularity: ⮙5
Research Paper, Information Technology, Indonesia, Volume 4 Issue 12, December 2015
Pages: 361 - 364Using Latent Semantic Index for Content-Based Image Retrieval
Andy, Bernardus Ari Kuncoro
Views: 135 , Downloads: 128 | CTR: 95 % | Weekly Popularity: ⮙6
Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 740 - 744A Survey on Image Contrast Enhancement
Kunal Dhote, Anjali Chandavale