Preview

Using Artificial Neural Networks to Identify Image Spam

Powerful Essays
Open Document
Open Document
2824 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Using Artificial Neural Networks to Identify Image Spam
Spam Image Identification Using an Artificial Neural Network
Jason R. Bowling, Priscilla Hope, Kathy J. Liszka
The University of Akron
Akron, Ohio 44325-4003
{bowling, ph11, liszka}@uakron.edu
Abstract
We propose a method for identifying image spam by training an artificial neural network. A detailed process for preprocessing spam image files is given, followed by a description on how to train an artificial neural network to distinguish between ham and spam. Finally, we exercise the trained network by testing it against unknown images.

1. Introduction
Select – delete – repeat. It’s what we spend the first ten minutes of every day doing -- purging spam from our inboxes. In the first month after the National Do Not Call
Registry went into affect, we noticed about a 30% increase in spam. No, that’s not backed by scientific process, just personal observation. And then, it got worse.
Clearly spam isn’t going away, at least not in the foreseeable future. People still respond to it, buy products from it, and are scammed by it.
Filters are available to combat these unsolicited nuisances. But spammers continually develop new techniques to avoid detection by filters. See [1] for a current and comprehensive list of spam techniques. This paper focuses on one specific category of unsolicited bulk email – image spam. This is a fairly recent phenomenon that has appeared in the past few years. In 2005, it comprised roughly 1% of all emails, then grew to an estimated 21% by mid 2006 [2]. They come as image attachments that contain text with what looks like a legitimate subject and from address. They are successfully getting by traditional spam filters and optical character recognition (OCR) systems. As a result, they are often referred to as OCR-evading spam images. A common example is shown in Figure 1. These come in many forms by way of file type, multipart images where the image is split into multiple images, and even angled, or twisted.



References: vol. 2, pp. 914-918, 2005. Conference on Email and Anti-Spam (CEAS), 2007. Li, “Filtering Image Spam with Near-Duplicate Detection,” Fourth Conference on Email and AntiSpam (CEAS), 2007. 7, 2699–2720, 2006.

You May Also Find These Documents Helpful

  • Best Essays

    9/11 Tragedy

    • 383 Words
    • 2 Pages

    * Stanley, S. (2001, ). TruthOrFiction.com-Is that forwarded email Truth or Fiction? Research into stories, scams, hoaxes, myths, and urban legends on the Internet. Search Results. Retrieved March 1, 2013, from http://www.truthorfiction.com/google-result.htm?q=9%2F11…

    • 383 Words
    • 2 Pages
    Best Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    One of America’s fast food chains, Chick-fil-A, started a controversy with public comments and opinions after president Dan Cathy made a comment opposing same-sex marriage. Chick-fil-A’s charitable endeavor, WinShape Foundation, gave millions in donations to political organizations that oppose LGBT (Lesbian, gay, bisexual, and transgender) rights. While LGBT and similar groups are boycotting this chain, others are opposing by gathering in support by eating at Chick-fil-A restaurants. People across the US, such as political figures and American citizens, are rallied both for and against the statement made by Chick-fil-A’s president. Businesses partners working hand and hand detached ties with this chain.…

    • 1772 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cctv Fraud Papers

    • 542 Words
    • 3 Pages

    On 8/2/16 at approximately 2050 hours while I was working secondary employment at Wegmans 9001 McHugh Drive, Glenarden, Md., I observed two males on the CCTV closed circuit monitors walk into the store. They got a cart then went over to the gift card stand. F-2 later identified as (Marcus Savoy) grabbed a handfull of gift cards and put them in the cart under a pizza box. The arrestee later identified as (Christopher Smith) was standing there and then began pushing the cart thoughout the store, and they picked a few items. They picked up 15-20 packs of Huggies Diapers from off the shelf and continued towards the self check out area. Once there they rung up their items, a store employee noticed all the gift cards in the cart. The employee advised them that because they had so many of them they had to go over to customer service check out to pay for…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Spam

    • 266 Words
    • 2 Pages

    Explain how the following changes in reaction conditions will affect the position of the equilibrium below, and explain your reasoning.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Analyzing Images

    • 1026 Words
    • 5 Pages

    In the consumer driven society that we live in, major manufacturers are always looking for ways to produce effective marketing so that the general public will buy their product. To relate to the public in these advertisements, advertisers create an image using a subject, a number of objects, unique placement of the objects, and specific color and lighting. Advertisers will also use the gaze, pose and mouth position of the models in their advertisements to market their product successfully.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Fraud in AIS

    • 2849 Words
    • 12 Pages

    References: Inside Employee Embezzlement--Just Another $19.2 Million Case. (2011). Security Director 's Report, 11(9), 1-11.…

    • 2849 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Having already established itself as a very popular series in the action and adventure genre, the Transformers movies have been both praised and criticized. But when a movie is about transforming alien robots fighting to the death, many can’t resist watching it. To say the least, the transformers movies have revolutionized the use of CGI graphics in a way no other movie has. Transformers: Age of Extinction (2014) is a “soft” reboot of the series and a sequel to Transformers: Dark of the Moon (2011). The film was a huge success, earning more than $1 billion at the global box office. That number indicates that the film had a very large audience, including both kids and adults alike, and that the movie was adroitly advertised, especially in other countries. Two of the movie posters used in the advertising campaign caught my eye because of their similarities and how they presented the movie. The two posters deliver the audience two different key messages about the movie, giving insight on the character relationships, and most of all, the plot.…

    • 1898 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    In order for a baby to develop properly, I believe that a strong secure attachment is necessary between caregiver and the baby. To show a child a secure attachment means that the child would feel secure which will enable the child to experience optimal development of the nervous system. This will provide the child with a better foundation in life to function properly in many different ways. For example, the child need the feeling of safety, trust and empathy. An insecure attachment can harm the child life in ways such as emotional, mental, and possibly physical. Most importantly, this can lead to learning difficulties and also forming relationships with others in the later life span.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I find myself as a secure attachment style. When I feel vulnerable to injury, I will seek comfort and support from my parents, family members, and loved ones. Oppositely, when my loved ones encounter problems, I am willing to provide them comfort and support. I think that my adult attachment style is related to my parents and my family greatly. I am twins and have a brother that born one minute before me. My father worked a lot when we were little. My parents were afraid that they could not take care of two babies at the same time, so they decided that one of us will be living with our grandmother and uncle’s family from my mother’s side; we would switch every one week. I think that my parents made this decision so they could take care one…

    • 174 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Good Essays

    Facial Recognition

    • 930 Words
    • 4 Pages

    Facial memory and recognition are common daily activities and important forensic evidence in a trial or an investigation. Some people have difficulty in social interaction because of having face blindness and sometimes a suspect can be determined by the witness’ facial recognition. However, the reliability of facial recognition is being questioned for years because memory is a recreation of given information. It raises an interesting question to ask what factors improve or affect the accuracy of facial recognition and memory.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Fraud detection

    • 2073 Words
    • 24 Pages

    How the Fraudsters Fool the Auditors History of financial statement frauds acquisition accounting related party transactions non existent bank accounts - relationship with auditors overstated bank balance off balance sheet accounting misleading disclosures Changes occurring from Sarbanes Oxley Higher standards for corporate governance and accountability Creating an independent regulatory framework for the accounting profession Enhancing the quality and transparency of financial reports Developing severe civil and criminal penalties for corporate wrongdoers Establishing new protections for corporate whistleblowers PCAOB established by SOX Registering public accounting firms that audit publicly traded companies Establishing or adopting auditing, quality control, ethics, independence, and other standards relating to audits of publicly traded companies…

    • 2073 Words
    • 24 Pages
    Powerful Essays