{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:44:58Z","timestamp":1761965098718,"version":"build-2065373602"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,8,11]],"date-time":"2011-08-11T00:00:00Z","timestamp":1313020800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10462-011-9280-4","type":"journal-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T11:36:38Z","timestamp":1312976198000},"page":"71-105","source":"Crossref","is-referenced-by-count":31,"title":["A survey of image spamming and filtering techniques"],"prefix":"10.1007","volume":"40","author":[{"given":"Abdolrahman","family":"Attar","sequence":"first","affiliation":[]},{"given":"Reza Moradi","family":"Rad","sequence":"additional","affiliation":[]},{"given":"Reza Ebrahimi","family":"Atani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,11]]},"reference":[{"key":"9280_CR1","doi-asserted-by":"crossref","unstructured":"Aradhye HB, Myers GK, Herson JA (2005) Image analysis for efficient categorization of image-based spam e-mail. In: Eight international conference on document analysis and recognition (ICDAR\u201905), IEEE, Korea","DOI":"10.1109\/ICDAR.2005.135"},{"key":"9280_CR2","doi-asserted-by":"crossref","unstructured":"Biggio B, Fumera G, Pillai I, Roli F (2007) Image spam filtering using visual information. In: The 14th international conference on image analysis and processing, Modena, Italy, 10\u201314 September 2007. IEEE Computer Society, pp 105\u2013110","DOI":"10.1109\/ICIAP.2007.4362765"},{"key":"9280_CR3","unstructured":"Biggio B, Fumera G, Pillai I, Roli F (2007) Image spam filtering by content obscuring detection. In: The 4th conference on email and AntiSpam, CEAS2007, Mountain View, California, USA, August 2007"},{"key":"9280_CR4","doi-asserted-by":"crossref","unstructured":"Biggio B, Fumera G, Pillai I, Roli F (2008) Improving image spam filtering using image text features. In: Fifth conference on email and anti-spam (CEAS 2008), Mountain View, CA, USA","DOI":"10.1109\/ICIAP.2007.4362765"},{"key":"9280_CR5","doi-asserted-by":"crossref","unstructured":"Biggio B, Fumera G, Pillai I, Roli F (2011) A survey and experimental evaluation of image spam filtering techniques. Pattern Recogn Lett (in press)","DOI":"10.1016\/j.patrec.2011.03.022"},{"key":"9280_CR6","doi-asserted-by":"crossref","unstructured":"Blanzieri E, Bryl A (2009) A survey of learning-based techniques of email spam filtering. J Artif Intell Rev","DOI":"10.1007\/s10462-009-9109-6"},{"key":"9280_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Zhang C (2009) Image spam clustering\u2014an unsupervised approach. In: Proceedings of the first ACM workshop on multimedia in forensics, China, October 2009","DOI":"10.1145\/1631081.1631088"},{"key":"9280_CR8","unstructured":"Cheng H, Qin Z, Fu C, Wang Y (2010) Novel spam image filtering framework with multi-label classification. In: International conference on communications, circuits and systems (ICCCAS), China"},{"key":"9280_CR9","doi-asserted-by":"crossref","unstructured":"Chew M, Tygar JD (2004) Image recognition CAPTCHAs. In: 7th International information security conference, ISC2004, Palo Alto, CA, USA, September 2004","DOI":"10.1007\/978-3-540-30144-8_23"},{"key":"9280_CR10","unstructured":"Dredze M, Gevaryahu R, Elias-Bachrach A (2007) Learning fast classifiers for image spam. In: Proceedings of the 4th conference on email and anti-spam (CEAS), California, USA"},{"key":"9280_CR11","unstructured":"Fritsch Ch, Netter M, Reisser A, Pernul G (2010) Attacking image recognition captchas. In: The 7th international conference, TrustBus 2010, Bilbao, Spain, August, 2010"},{"key":"9280_CR12","first-page":"2699","volume":"7","author":"G Fumera","year":"2006","unstructured":"Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7: 2699\u20132720","journal-title":"J Mach Learn Res"},{"key":"9280_CR13","unstructured":"Fumera G, Pillai I, Roli F, Biggio B (2007) Image spam filtering using textual and visual information. In: The MIT spam conference 2007, Cambridge, USA, March 2007"},{"key":"9280_CR14","doi-asserted-by":"crossref","unstructured":"Gao Y (2009) Choudhary a active learning image spam hunter. In: 5th International symposium on visual computing (ISVC), USA","DOI":"10.1007\/978-3-642-10520-3_27"},{"key":"9280_CR15","unstructured":"Gao Y, Yang M, Zhao X, Pardo B, Wu Y, Pappas TN, Choudhary A (2008) Image spam hunter. Acoustics, speech and signal processing ICASSP. In: IEEE international conference on ICASSP, IEEE, USA"},{"key":"9280_CR16","doi-asserted-by":"crossref","unstructured":"Gao Y, Yang M, Choudhary A (2009)Semi supervised image spam hunter: a regularized discriminant EM approach. In: The international conference on advanced data mining and applications (ADMA), China","DOI":"10.1007\/978-3-642-03348-3_17"},{"key":"9280_CR17","doi-asserted-by":"crossref","unstructured":"Gao Y, Choudhary A, Hua G (2010) A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images. In: International conference on acoustics speech and signal processing (ICASSP), USA","DOI":"10.1109\/ICASSP.2010.5495246"},{"key":"9280_CR18","doi-asserted-by":"crossref","unstructured":"Gargiulo F, Sansone C (2008) Combining visual and textual features for filtering spam emails. In: 19th International conference on pattern recognition (ICPR), USA","DOI":"10.1109\/ICPR.2008.4761828"},{"key":"9280_CR19","doi-asserted-by":"crossref","unstructured":"Gargiulo F, Penta A, Picariello A, Sansone C (2008) Using heterogeneous features for anti-spam filters. In: 19th International conference on database and expert systems application, Italy","DOI":"10.1109\/DEXA.2008.90"},{"key":"9280_CR20","unstructured":"Gargiulo F, Penta A, Picariello A, Sansone C (2009) A personal anti spam system based on a behaviour-knowledge space approach. Springer J Stud Comput Intell, vol 245"},{"key":"9280_CR21","volume-title":"Stopping spam","author":"J Goodman","year":"2005","unstructured":"Goodman J, Heckerman D, Rounthwaite R (2005) Stopping spam. Scientific American, USA"},{"key":"9280_CR22","doi-asserted-by":"crossref","unstructured":"Hayati P, Potdar V (2008) Evaluation of spam detection and prevention frameworks for email and image spam\u2014a state of art. In: Proceedings of iiWAS, ACM, Linz, Austria","DOI":"10.1145\/1497308.1497402"},{"key":"9280_CR23","doi-asserted-by":"crossref","unstructured":"He P, Sun Y, Zheng W, Wen X (2008) Filtering short message spam of group sending using CAPTCHA. In: IEEE, workshop on knowledge discovery and data mining, Australia, March 2008","DOI":"10.1109\/WKDD.2008.131"},{"key":"9280_CR24","doi-asserted-by":"crossref","unstructured":"He P, Wen X, Zheng W (2009) A simple method for filtering image spam. In: ACIS international conference on computer and information science, IEEE, Australia-Japan","DOI":"10.1109\/ICIS.2009.101"},{"key":"9280_CR25","doi-asserted-by":"crossref","unstructured":"Huang H, Guo W, Zhang Y (2008) A novel method for image spam filtering. In: The 9th international conference for young computer scientists","DOI":"10.1109\/ICYCS.2008.440"},{"key":"9280_CR26","doi-asserted-by":"crossref","unstructured":"Issac B, Raman V (2006) Spam detection proposal in regular and text-based image emails. In: IEEE Region 10 Conference TENCON, China","DOI":"10.1109\/TENCON.2006.343905"},{"key":"9280_CR27","unstructured":"Jithesh K, Sulochana KG, Kumar RR (2003) Optical character recognition (OCR) system for Malayalam language. In: National Workshop on application of language technology in Indian languages"},{"key":"9280_CR28","unstructured":"Johnston N (2007) Spam evolves, PDF becomes the latest threat. Anti-Spam Development at MessageLabs, A MessageLabs Whitepaper, August 2007"},{"key":"9280_CR29","unstructured":"Kelly N (2007) Image spam: the new email scourge. McAfee, Inc. 3965 Freedom Circle Santa Clara, CA 95054, 888.847.8766 www.mcafee.com"},{"key":"9280_CR30","doi-asserted-by":"crossref","unstructured":"Kim J, Kim SH, Yang HJ, Son HJ, Kim WP (2007) Text extraction for spam-mail image filtering using a text color estimation technique. In: The 20th international conference on industrial, engineering and other applications of applied intelligent systems, IEA\/AIE, Japan, June 2007","DOI":"10.1007\/978-3-540-73325-6_11"},{"key":"9280_CR31","doi-asserted-by":"crossref","unstructured":"Kim H, Chang H, Lee J, Lee D (2010) BASIL: effective near-duplicate image detection using gene sequence alignment. In: 32nd European conference on information retrieval. Springer, UK","DOI":"10.1007\/978-3-642-12275-0_22"},{"key":"9280_CR32","doi-asserted-by":"crossref","unstructured":"Klangpraphant P, Bhattarakosol P (2010) PIMSI: A partial image SPAM inspector. In: 5th International conference on future information technology (FutureTech), Thailand","DOI":"10.1109\/FUTURETECH.2010.5482767"},{"key":"9280_CR33","doi-asserted-by":"crossref","unstructured":"Krasser S, Tang Y, Gould J, Alperovitch D, Judge P (2007) Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning. In: Proceedings of the IEEE, workshop on information assurance, United States Military Academy, West Point","DOI":"10.1109\/IAW.2007.381941"},{"key":"9280_CR34","unstructured":"Lang SR, Williams N (2010) Impeding CAPTCHA breakers with visual decryption. In: The 8th Australasian information security conference (AISC 2010), Brisbane, Australia"},{"key":"9280_CR35","unstructured":"Lawton G (2007) News briefs. Published by the IEEE Computer Society"},{"key":"9280_CR36","doi-asserted-by":"crossref","unstructured":"Liu Q, Zhang F, Qin Z, Wang C, Chen S, Ma Q (2010) Feature selection for image spam classification. In: International conference on communications, circuits and systems (ICCCAS), China","DOI":"10.1109\/ICCCAS.2010.5581994"},{"key":"9280_CR37","doi-asserted-by":"crossref","unstructured":"Liu T, Tsao W, Lee C (2010) A high performance image-spam filtering system. In: Ninth international symposium on distributed computing and applications to business, engineering and science, China","DOI":"10.1109\/DCABES.2010.97"},{"key":"9280_CR38","doi-asserted-by":"crossref","unstructured":"Liu Q, Qin Z, Cheng H, Wan M (2010) Efficient modeling of spam images. In: 3th International symposium on intelligent information technology and security informatics, IEEE, China","DOI":"10.1109\/IITSI.2010.40"},{"key":"9280_CR39","unstructured":"Ma W, Tran D, Sharma D (2006) Detecting image based spam email. In: Proceedings of the Asia-Pacific workshop on visual information processing, Asia-Pacific Workshop on Visual Information Processing, Beijing, China"},{"key":"9280_CR40","volume-title":"Detecting image spam using visual features and near duplicate detection. security and privacy","author":"B Mehta","year":"2008","unstructured":"Mehta B, Nangia S, Gupta M, Nejdl W (2008) Detecting image spam using visual features and near duplicate detection. security and privacy. ACM, Beijing"},{"key":"9280_CR41","volume-title":"An efficient method for filtering image-based spam E-mail, research, innovation and vision for the future","author":"N Nhung","year":"2007","unstructured":"Nhung N, Phuong T (2007) An efficient method for filtering image-based spam E-mail, research, innovation and vision for the future. IEEE International, Vietnam"},{"key":"9280_CR42","doi-asserted-by":"crossref","unstructured":"Nielson J, Castro D, Aycock J (2008) Image Spam\u2014ASCII to the Rescue!. In: 3rd International conference on malicious and unwanted software (MALWARE), USA","DOI":"10.1109\/MALWARE.2008.4690859"},{"key":"9280_CR43","doi-asserted-by":"crossref","unstructured":"Qu Z, Zhang Y (2009) Filtering image spam using image semantics and near-duplicate detection. In: Second international conference on intelligent computation technology and automation, IEEE, China","DOI":"10.1109\/ICICTA.2009.151"},{"key":"9280_CR44","unstructured":"Rusu A, Govindaraju V (2004) Handwritten CAPTCHA: using the difference in the abilities of humans and machines in reading handwritten words. In: 9th International workshop on frontiers in handwriting recognition (IWFHR-9 2004), IEEE, Japan"},{"key":"9280_CR45","doi-asserted-by":"crossref","unstructured":"Saraubon K, Limthanmaphon B (2009) Fast effective botnet spam detection. In: Fourth international conference on computer sciences and convergence information technology, Korea","DOI":"10.1109\/ICCIT.2009.128"},{"key":"9280_CR46","doi-asserted-by":"crossref","unstructured":"Soranamageswari M, Meena C (2010) Statistical feature extraction for classification of image spam using artificial neural networks. In: 2nd International conference on machine learning and computing, IEEE Press, Bangalore, India","DOI":"10.1109\/ICMLC.2010.72"},{"key":"9280_CR47","unstructured":"Stone B (2006) Spam doubles, finding new ways to deliver itself. The New York Times, A01 6. E"},{"key":"9280_CR48","unstructured":"Stern H (2008) A survey of modern spam tools. In: The fifth conference on email and anti-spam, CEAS, Mountain View, USA"},{"key":"9280_CR49","first-page":"442","volume-title":"A neural network classifier for junk mail","author":"I Stuart","year":"2004","unstructured":"Stuart I, Cha H, Tappert C (2004) A neural network classifier for junk mail. Springer, Link, pp 442\u2013450"},{"key":"9280_CR50","unstructured":"Thomas R, Samosseiko D (2006) The game goes on: an analysis of modern spam techniques. Virus Bulletin conference, VB2006, October, Canada"},{"key":"9280_CR51","doi-asserted-by":"crossref","unstructured":"Uemura M, Tabat T (2008) Design and evaluation of a Bayesian-filter-based image spam filtering method. In: International conference on information security and assurance, IEEE Press, Busan, Korea","DOI":"10.1109\/ISA.2008.84"},{"key":"9280_CR52","unstructured":"Wang Z, Josephson W, Lv Q, Charikar M, Li K (2007) Filtering image spam with near-duplicate detection. In: Fourth conference on email and anti-spam, Mountain View, CA, USA"},{"key":"9280_CR53","unstructured":"Wang C, Zhang F, Li F, Liu Q (2010) Image spam classifcation based on low-level image features. In: IEEE international conference on communications, circuits and systems (ICCCAS 2010), Chengdu, China, July, 2010"},{"key":"9280_CR54","unstructured":"Wu C, Cheng K, Zhu Q, Wu Y (2005) Using visual features for anti-spam filtering. In: IEEE international conference on image processing III, pp 501\u2013504"},{"key":"9280_CR55","doi-asserted-by":"crossref","unstructured":"Ye M, Tao T, Mai FJ, Cheng XH (2008) An spam discrimination based on mail header feature and SVM. In: The 4th international conference on wireless communications, networking and mobile computing, WiCOM \u201908, China, November, 2008","DOI":"10.1109\/WiCom.2008.1139"},{"key":"9280_CR56","doi-asserted-by":"crossref","unstructured":"Youn S, McLeod D (2009) Improved spam filtering by extraction of information from text embedded image E-mail. In: Proceedings of the ACM symposium on applied computing, USA","DOI":"10.1145\/1529282.1529677"},{"key":"9280_CR57","unstructured":"Zinman A, Donath J (2007) Is Britney spears spam? In: Fourth conference on email and anti-spam mountain view, California, USA, August 2007"},{"key":"9280_CR58","unstructured":"Zhen X, Hong-guo W, Zeng-zhen S (2009) Evaluation of image spam classification system based on AHP. In: International conference on computational intelligence and software engineering (CiSE), China"},{"key":"9280_CR59","doi-asserted-by":"crossref","unstructured":"Zuo H, Hu W, Wu O, Chen Y, Luo G (2009) Detecting image spam using local invariant features and pyramid match kernel. In: 18th International world wide web conference (WWW), Spain","DOI":"10.1145\/1526709.1526921"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9280-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-011-9280-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9280-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T23:42:18Z","timestamp":1560469338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-011-9280-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,11]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["9280"],"URL":"https:\/\/doi.org\/10.1007\/s10462-011-9280-4","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"type":"print","value":"0269-2821"},{"type":"electronic","value":"1573-7462"}],"subject":[],"published":{"date-parts":[[2011,8,11]]}}}