Preview

Using Artificial Neural Networks to Identify Image Spam

Powerful Essays
Open Document
Open Document
2824 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Using Artificial Neural Networks to Identify Image Spam
Spam Image Identification Using an Artificial Neural Network
Jason R. Bowling, Priscilla Hope, Kathy J. Liszka
The University of Akron
Akron, Ohio 44325-4003
{bowling, ph11, liszka}@uakron.edu
Abstract
We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam. Finally, we exercise the trained network by testing it against unknown images.

1. Introduction
Select – delete – repeat. It’s what we spend the first ten minutes of every day doing -- purging spam from our inboxes. In the first month after the National Do Not Call
Registry went into affect, we noticed about a 30% increase in spam. No, that’s not backed by scientific process, just personal observation. And then, it got worse.
Clearly spam isn’t going away, at least not in the foreseeable future. People still respond to it, buy products from it, and are scammed by it.
Filters are available to combat these unsolicited nuisances. But spammers continually develop new techniques to avoid detection by filters. See [1] for a current and comprehensive list of spam techniques. This paper focuses on one specific category of unsolicited bulk email – image spam. This is a fairly recent phenomenon that has appeared in the past few years. In 2005, it comprised roughly 1% of all emails, then grew to an estimated 21% by mid 2006 [2]. They come as image attachments that contain text with what looks like a legitimate subject and from address. They are successfully getting by traditional spam filters and optical character recognition (OCR) systems. As a result, they are often referred to as OCR-evading spam images. A common example is shown in Figure 1. These come in many forms by way of file type, multipart images where the image is split into multiple images, and even angled, or twisted.



References: vol. 2, pp. 914-918, 2005. Conference on Email and Anti-Spam (CEAS), 2007. Li, “Filtering Image Spam with Near-Duplicate Detection,” Fourth Conference on Email and AntiSpam (CEAS), 2007. 7, 2699–2720, 2006.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Spam is expected to increase to 80 to 90 percent of total email. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. You can expect the occurrence of these spam-virus hybrids to increase and develop into even more dangerous and damaging threats…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Analyzing Images

    • 1026 Words
    • 5 Pages

    In the consumer driven society that we live in, major manufacturers are always looking for ways to produce effective marketing so that the general public will buy their product. To relate to the public in these advertisements, advertisers create an image using a subject, a number of objects, unique placement of the objects, and specific color and lighting. Advertisers will also use the gaze, pose and mouth position of the models in their advertisements to market their product successfully.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Cctv Fraud Papers

    • 542 Words
    • 3 Pages

    On 8/2/16 at approximately 2050 hours while I was working secondary employment at Wegmans 9001 McHugh Drive, Glenarden, Md., I observed two males on the CCTV closed circuit monitors walk into the store. They got a cart then went over to the gift card stand. F-2 later identified as (Marcus Savoy) grabbed a handfull of gift cards and put them in the cart under a pizza box. The arrestee later identified as (Christopher Smith) was standing there and then began pushing the cart thoughout the store, and they picked a few items. They picked up 15-20 packs of Huggies Diapers from off the shelf and continued towards the self check out area. Once there they rung up their items, a store employee noticed all the gift cards in the cart. The employee advised them that because they had so many of them they had to go over to customer service check out to pay for…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In order for a baby to develop properly, I believe that a strong secure attachment is necessary between caregiver and the baby. To show a child a secure attachment means that the child would feel secure which will enable the child to experience optimal development of the nervous system. This will provide the child with a better foundation in life to function properly in many different ways. For example, the child need the feeling of safety, trust and empathy. An insecure attachment can harm the child life in ways such as emotional, mental, and possibly physical. Most importantly, this can lead to learning difficulties and also forming relationships with others in the later life span.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I find myself as a secure attachment style. When I feel vulnerable to injury, I will seek comfort and support from my parents, family members, and loved ones. Oppositely, when my loved ones encounter problems, I am willing to provide them comfort and support. I think that my adult attachment style is related to my parents and my family greatly. I am twins and have a brother that born one minute before me. My father worked a lot when we were little. My parents were afraid that they could not take care of two babies at the same time, so they decided that one of us will be living with our grandmother and uncle’s family from my mother’s side; we would switch every one week. I think that my parents made this decision so they could take care one…

    • 174 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Facial Recognition

    • 930 Words
    • 4 Pages

    Facial memory and recognition are common daily activities and important forensic evidence in a trial or an investigation. Some people have difficulty in social interaction because of having face blindness and sometimes a suspect can be determined by the witness’ facial recognition. However, the reliability of facial recognition is being questioned for years because memory is a recreation of given information. It raises an interesting question to ask what factors improve or affect the accuracy of facial recognition and memory.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Powerful Essays

    Phishing

    • 2531 Words
    • 11 Pages

    The Internet has brought an exciting global marketplace directly to our fingertips, allowing us to shop and invest at our convenience. Yet when you provide personal information and check out your "shopping cart" at an online store, can you be certain your purchase will be safe? Can someone steal your credit card number during a transaction? Can you confirm that you are doing business with a reputable Web site and not with a shady imposter?…

    • 2531 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Fraud in AIS

    • 2849 Words
    • 12 Pages

    References: Inside Employee Embezzlement--Just Another $19.2 Million Case. (2011). Security Director 's Report, 11(9), 1-11.…

    • 2849 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Spam

    • 266 Words
    • 2 Pages

    Explain how the following changes in reaction conditions will affect the position of the equilibrium below, and explain your reasoning.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    detect the fraud

    • 623 Words
    • 3 Pages

    There are many ways to detect the fraud .They can simply be divided into two categories…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    One of America’s fast food chains, Chick-fil-A, started a controversy with public comments and opinions after president Dan Cathy made a comment opposing same-sex marriage. Chick-fil-A’s charitable endeavor, WinShape Foundation, gave millions in donations to political organizations that oppose LGBT (Lesbian, gay, bisexual, and transgender) rights. While LGBT and similar groups are boycotting this chain, others are opposing by gathering in support by eating at Chick-fil-A restaurants. People across the US, such as political figures and American citizens, are rallied both for and against the statement made by Chick-fil-A’s president. Businesses partners working hand and hand detached ties with this chain.…

    • 1772 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Having already established itself as a very popular series in the action and adventure genre, the Transformers movies have been both praised and criticized. But when a movie is about transforming alien robots fighting to the death, many can’t resist watching it. To say the least, the transformers movies have revolutionized the use of CGI graphics in a way no other movie has. Transformers: Age of Extinction (2014) is a “soft” reboot of the series and a sequel to Transformers: Dark of the Moon (2011). The film was a huge success, earning more than $1 billion at the global box office. That number indicates that the film had a very large audience, including both kids and adults alike, and that the movie was adroitly advertised, especially in other countries. Two of the movie posters used in the advertising campaign caught my eye because of their similarities and how they presented the movie. The two posters deliver the audience two different key messages about the movie, giving insight on the character relationships, and most of all, the plot.…

    • 1898 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Fraud detection

    • 2073 Words
    • 24 Pages

    How the Fraudsters Fool the Auditors History of financial statement frauds acquisition accounting related party transactions non existent bank accounts - relationship with auditors overstated bank balance off balance sheet accounting misleading disclosures Changes occurring from Sarbanes Oxley Higher standards for corporate governance and accountability Creating an independent regulatory framework for the accounting profession Enhancing the quality and transparency of financial reports Developing severe civil and criminal penalties for corporate wrongdoers Establishing new protections for corporate whistleblowers PCAOB established by SOX Registering public accounting firms that audit publicly traded companies Establishing or adopting auditing, quality control, ethics, independence, and other standards relating to audits of publicly traded companies…

    • 2073 Words
    • 24 Pages
    Powerful Essays