The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Spam Image Clustering for Identifying Common Sources of Unsolicited Emails
|
Author(s): Chengcui Zhang (University of Alabama at Birmingham, USA), Xin Chen (University of Alabama at Birmingham, USA), Wei-Bang Chen (University of Alabama at Birmingham, USA), Lin Yang (University of Alabama at Birmingham, USA)and Gary Warner (University of Alabama at Birmingham, USA)
Copyright: 2009
Volume: 1
Issue: 3
Pages: 20
Source title:
International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/jdcf.2009070101
Purchase
|
Abstract
In this article, we propose a spam image clustering approach that uses data mining techniques to study the image attachments of spam emails with the goal to help the investigation of spam clusters or phishing groups. Spam images are first modeled based on their visual features. In particular, the foreground text layout, foreground picture illustrations and background textures are analyzed. After the visual features are extracted from spam images, we use an unsupervised clustering algorithm to group visually similar spam images into clusters. The clustering results are evaluated by visual validation since there is no prior knowledge as to the actual sources of spam images. Our initial results show that the proposed approach is effective in identifying the visual similarity between spam images and thus can provide important indications of the common source of spam images.
Related Content
Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev.
© 2024.
17 pages.
|
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu.
© 2024.
13 pages.
|
Dawei Zhang.
© 2024.
16 pages.
|
Yuwen Zhu, Lei Yu.
© 2023.
16 pages.
|
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu.
© 2023.
14 pages.
|
Wenjun Yao, Ying Jiang, Yang Yang.
© 2023.
20 pages.
|
Dawei Zhang.
© 2023.
14 pages.
|
|
|