A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Image spam filtering using Fourier-Mellin invariant features
2009
2009 IEEE International Conference on Acoustics, Speech and Signal Processing
In this paper, a framework for filtering image spams by using the Fourier-Mellin invariant features is described. Fourier-Mellin features are robust for most kinds of image spam variations. ...
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. ...
IMAGE SPAM FEATURE EXTRACTION In this paper, we extract Fourier-Mellin invariant features as the low-level image feature. ...
doi:10.1109/icassp.2009.4959717
dblp:conf/icassp/ZuoLWHL09
fatcat:z2oscolisjbvrfz2yyriqqp6xq
Detecting image spam using local invariant features and pyramid match kernel
2009
Proceedings of the 18th international conference on World wide web - WWW '09
In this paper, we extract local invariant features of images and run a one-class SVM classifier which uses the pyramid match kernel as the kernel function to detect image spam. ...
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. ...
Our previous work [4] involved extracting global Fourier-Mellin invariant features to fight image spam. ...
doi:10.1145/1526709.1526921
dblp:conf/www/ZuoHWCL09
fatcat:tgw5bz5yhbhc5jthqdg7264xpe
A survey and experimental evaluation of image spam filtering techniques
2011
Pattern Recognition Letters
In their arms race against developers of spam filters, spammers have recently introduced the image spam trick to make the analysis of emails' body text ineffective. ...
Detecting image spam turns out to be an interesting instance of the problem of content-based filtering of multimedia data in adversarial environments, which is gaining increasing relevance in several applications ...
Stern for useful discussions, and M. Dredze for making his data set publicly available and sending us his code for feature extraction. ...
doi:10.1016/j.patrec.2011.03.022
fatcat:s6y5g4wsqjco3ab4zcbz7ud5tu
Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods
2013
International Journal of Communications, Network and System Sciences
Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. ...
It allows the email servers to query the system for email filtering. They can also allow the users via the mail user agents to participate in the subjective spam filtering problem. ...
In [33] , a framework for filtering image spams by using the Fourier-Mellin invariant features is presented. Fourier-Mellin features are robust for most kinds of image spam variations. ...
doi:10.4236/ijcns.2013.62011
fatcat:curedd5gerg2tfxlk27oanebui
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection
2019
IEEE Access
First, the Zernike moment of the normalized cover image is extracted and the new cover is obtained by the dither modulation algorithm. ...
And finally, the stego image is generated by changing the original Zernike moment according to the modified amplitude of the new cover. ...
Fourier Transform) on the LPM image and extracting its amplitude to obtain the RST (Rotation, Scaling, Translation) invariant domain. ...
doi:10.1109/access.2019.2900286
fatcat:sidgwedoevgt7fjm6o6ev2zvuu
Digital image forgery detection using passive techniques: A survey
2013
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Verifying the integrity of images and detecting traces of tampering without requiring extra prior knowledge of the image content or any embedded watermarks is an important research field. ...
Blind or passive methods do not need any explicit priori information about the image. First, various image forgery detection techniques are classified and then its generalized structure is developed. ...
The Fourier-Mellin transform (FMT) features, which are invariant to scale and rotation was extracted and lexicographic sorting is used to detect copy move forgery by Bayram et al. (2009) . ...
doi:10.1016/j.diin.2013.04.007
fatcat:pqlzh2yciveqxgw2pbwfnay7nq
Applications of Support Vector Machines for Pattern Recognition: A Survey
[chapter]
2002
Lecture Notes in Computer Science
Byungchul Ko for many useful suggestions that helped to improve the presentation of the paper. ...
[11] , they applied SVM to invariant Orthogonal Fourier-Mellin Moments as features for binary face/non-face classification on skin color-based segmented image and compared the performance of SVM face ...
as an input [83]
-
orthogonal Fourier-Mellin Moments as
an input [11]
-
overcomplete wavelet decomposition
as an input [76] ...
doi:10.1007/3-540-45665-1_17
fatcat:umfkn5bl35bath5onrutdyshtq
A SURVEY ON PATTERN RECOGNITION APPLICATIONS OF SUPPORT VECTOR MACHINES
2003
International journal of pattern recognition and artificial intelligence
In Terrillon et al., 99 they applied SVM to invariant Orthogonal Fourier-Mellin Moments as features for binary face or non-face classification on skin color-based segmented image and compared the performance ...
with
CD: 93.1%
N/A
RBF
et al. 99
Fourier-
144 face images
CR: 72.8%
Mellin Moments
Romdhani
20×20
RBF
et al. 87
gray image
CMU-set A
81.9% (465)
SMO
(2207 SVs,
C = 200)
Bassiou
mosaic ...
doi:10.1142/s0218001403002460
fatcat:6zuelkdkf5bgjatnfebfmka7wi
Information Forensics: An Overview of the First Decade
2013
IEEE Access
This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users ...
Additionally, features of each block's Fourier-Mellin transform [27] and blur invariants [28] have been proposed as block matching features. ...
A support vector machine (SVM) can then be trained to detect median filtering in JPEG compressed images using these features. ...
doi:10.1109/access.2013.2260814
fatcat:l3hs7vh2nzakpkihwmkubh24dy
Digital image forensics: a booklet for beginners
2010
Multimedia tools and applications
Two main problems are addressed: the identification of the imaging device that captured the image, and the detection of traces of forgeries. ...
Digital image forensics is a brand new research field which aims at validating the authenticity of images by recovering information about their history. ...
Dealing with the same problem, in [51] Bayram and others represent image segments in a Fourier-Mellin Transform domain, known for its invariance to geometric transformations. ...
doi:10.1007/s11042-010-0620-1
fatcat:47qhse4ucrdezkxqvulmv53gui
Developing a 21st Century Global Library for Mathematics Research
[article]
2014
arXiv
pre-print
One approach would be to use feature vectors such as the Scale -Invariant Feature Transform (SIFT) to characterize mathematical expressions. ...
MathTransforms MathTransforms would be a searchable and browsable lookup table for classical transforms (e.g., Laplace, Fourier, Mellin) with links to computational resources. ...
arXiv:1404.1905v1
fatcat:mf5mzrxwuncyzphoj44g2rmwga
Proceedings of the GRASPA 2019 Conference, Pescara, 15-16 July 2019
[article]
2019
The methodology uses ideas from Kalman filtering, directional statistics and multivariate analysis. ...
Using the two measures, the functional boxplot of the trajectory reveals center-outward patterns and potential outliers using the raw curves, whereas the MSBD-WO plot illustrates such patterns and outliers ...
According to periodic feature of circular data and close relationship between Wrapped Normal and Von Mises distribution, in simulation study, we show the performance of this test. Acknowledgments. ...
doi:10.6092/graspa19
fatcat:frys2ozttzhlbdy54n4s5yntmq