Filters








12 Hits in 3.7 sec

Image spam filtering using Fourier-Mellin invariant features

Haiqiang Zuo, Xi Li, Ou Wu, Weiming Hu, Guan Luo
2009 2009 IEEE International Conference on Acoustics, Speech and Signal Processing  
In this paper, a framework for filtering image spams by using the Fourier-Mellin invariant features is described. Fourier-Mellin features are robust for most kinds of image spam variations.  ...  Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters.  ...  IMAGE SPAM FEATURE EXTRACTION In this paper, we extract Fourier-Mellin invariant features as the low-level image feature.  ... 
doi:10.1109/icassp.2009.4959717 dblp:conf/icassp/ZuoLWHL09 fatcat:z2oscolisjbvrfz2yyriqqp6xq

Detecting image spam using local invariant features and pyramid match kernel

Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan Luo
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
In this paper, we extract local invariant features of images and run a one-class SVM classifier which uses the pyramid match kernel as the kernel function to detect image spam.  ...  Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters.  ...  Our previous work [4] involved extracting global Fourier-Mellin invariant features to fight image spam.  ... 
doi:10.1145/1526709.1526921 dblp:conf/www/ZuoHWCL09 fatcat:tgw5bz5yhbhc5jthqdg7264xpe

A survey and experimental evaluation of image spam filtering techniques

Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli
2011 Pattern Recognition Letters  
In their arms race against developers of spam filters, spammers have recently introduced the image spam trick to make the analysis of emails' body text ineffective.  ...  Detecting image spam turns out to be an interesting instance of the problem of content-based filtering of multimedia data in adversarial environments, which is gaining increasing relevance in several applications  ...  Stern for useful discussions, and M. Dredze for making his data set publicly available and sending us his code for feature extraction.  ... 
doi:10.1016/j.patrec.2011.03.022 fatcat:s6y5g4wsqjco3ab4zcbz7ud5tu

Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods

Samir A. Elsagheer Mohamed
2013 International Journal of Communications, Network and System Sciences  
Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks.  ...  It allows the email servers to query the system for email filtering. They can also allow the users via the mail user agents to participate in the subjective spam filtering problem.  ...  In [33] , a framework for filtering image spams by using the Fourier-Mellin invariant features is presented. Fourier-Mellin features are robust for most kinds of image spam variations.  ... 
doi:10.4236/ijcns.2013.62011 fatcat:curedd5gerg2tfxlk27oanebui

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection

Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu
2019 IEEE Access  
First, the Zernike moment of the normalized cover image is extracted and the new cover is obtained by the dither modulation algorithm.  ...  And finally, the stego image is generated by changing the original Zernike moment according to the modified amplitude of the new cover.  ...  Fourier Transform) on the LPM image and extracting its amplitude to obtain the RST (Rotation, Scaling, Translation) invariant domain.  ... 
doi:10.1109/access.2019.2900286 fatcat:sidgwedoevgt7fjm6o6ev2zvuu

Digital image forgery detection using passive techniques: A survey

Gajanan K. Birajdar, Vijay H. Mankar
2013 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Verifying the integrity of images and detecting traces of tampering without requiring extra prior knowledge of the image content or any embedded watermarks is an important research field.  ...  Blind or passive methods do not need any explicit priori information about the image. First, various image forgery detection techniques are classified and then its generalized structure is developed.  ...  The Fourier-Mellin transform (FMT) features, which are invariant to scale and rotation was extracted and lexicographic sorting is used to detect copy move forgery by Bayram et al. (2009) .  ... 
doi:10.1016/j.diin.2013.04.007 fatcat:pqlzh2yciveqxgw2pbwfnay7nq

Applications of Support Vector Machines for Pattern Recognition: A Survey [chapter]

Hyeran Byun, Seong-Whan Lee
2002 Lecture Notes in Computer Science  
Byungchul Ko for many useful suggestions that helped to improve the presentation of the paper.  ...  [11] , they applied SVM to invariant Orthogonal Fourier-Mellin Moments as features for binary face/non-face classification on skin color-based segmented image and compared the performance of SVM face  ...  as an input [83] - orthogonal Fourier-Mellin Moments as an input [11] - overcomplete wavelet decomposition as an input [76]  ... 
doi:10.1007/3-540-45665-1_17 fatcat:umfkn5bl35bath5onrutdyshtq

A SURVEY ON PATTERN RECOGNITION APPLICATIONS OF SUPPORT VECTOR MACHINES

HYERAN BYUN, SEONG-WHAN LEE
2003 International journal of pattern recognition and artificial intelligence  
In Terrillon et al., 99 they applied SVM to invariant Orthogonal Fourier-Mellin Moments as features for binary face or non-face classification on skin color-based segmented image and compared the performance  ...  with CD: 93.1% N/A RBF et al. 99 Fourier- 144 face images CR: 72.8% Mellin Moments Romdhani 20×20 RBF et al. 87 gray image CMU-set A 81.9% (465) SMO (2207 SVs, C = 200) Bassiou mosaic  ... 
doi:10.1142/s0218001403002460 fatcat:6zuelkdkf5bgjatnfebfmka7wi

Information Forensics: An Overview of the First Decade

Matthew C. Stamm, Min Wu, K. J. Ray Liu
2013 IEEE Access  
This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users  ...  Additionally, features of each block's Fourier-Mellin transform [27] and blur invariants [28] have been proposed as block matching features.  ...  A support vector machine (SVM) can then be trained to detect median filtering in JPEG compressed images using these features.  ... 
doi:10.1109/access.2013.2260814 fatcat:l3hs7vh2nzakpkihwmkubh24dy

Digital image forensics: a booklet for beginners

Judith A. Redi, Wiem Taktak, Jean-Luc Dugelay
2010 Multimedia tools and applications  
Two main problems are addressed: the identification of the imaging device that captured the image, and the detection of traces of forgeries.  ...  Digital image forensics is a brand new research field which aims at validating the authenticity of images by recovering information about their history.  ...  Dealing with the same problem, in [51] Bayram and others represent image segments in a Fourier-Mellin Transform domain, known for its invariance to geometric transformations.  ... 
doi:10.1007/s11042-010-0620-1 fatcat:47qhse4ucrdezkxqvulmv53gui

Developing a 21st Century Global Library for Mathematics Research [article]

Committee on Planning a Global Library of the Mathematical Sciences (Board on Mathematical Sciences and Their Applications, Division on Engineering and Physical Sciences, National Research Council of the National Academies)
2014 arXiv   pre-print
One approach would be to use feature vectors such as the Scale -Invariant Feature Transform (SIFT) to characterize mathematical expressions.  ...  MathTransforms MathTransforms would be a searchable and browsable lookup table for classical transforms (e.g., Laplace, Fourier, Mellin) with links to computational resources.  ... 
arXiv:1404.1905v1 fatcat:mf5mzrxwuncyzphoj44g2rmwga

Proceedings of the GRASPA 2019 Conference, Pescara, 15-16 July 2019 [article]

Cameletti Michela
2019
The methodology uses ideas from Kalman filtering, directional statistics and multivariate analysis.  ...  Using the two measures, the functional boxplot of the trajectory reveals center-outward patterns and potential outliers using the raw curves, whereas the MSBD-WO plot illustrates such patterns and outliers  ...  According to periodic feature of circular data and close relationship between Wrapped Normal and Von Mises distribution, in simulation study, we show the performance of this test. Acknowledgments.  ... 
doi:10.6092/graspa19 fatcat:frys2ozttzhlbdy54n4s5yntmq