Apparatus and method for detecting images within spam
First Claim
Patent Images
1. A computer-implemented method for determining spam features of a present image, comprising:
- determining whether a format of the present image is in a supported format of an image analyzer;
reading the present image by an image reader of the image analyzer when the format of the present image is determined to be in the supported format;
analyzing the present image by the image analyzer to determine whether the present image is corrupted, wherein the present image is determined to be corrupted when the image reader of the image analyzer determines that the format of the present image has been changed;
selecting between at least a first feature detection algorithm and a second feature detection algorithm based on the determination of whether the present image is corrupted;
when the present image is determined not to be corrupted, executing the first feature detection algorithm by the image analyzer to create a first signature to determine if the present image is a spam image, wherein the first feature detection algorithm comprises depixelating at least a first portion of the present image and processing the portion of the present image after the depixelation to create the first signature, wherein processing the portion of the present image comprises comparing a vector associated to the portion of the present image with a set of vectors of known spam images, and determining if the vector is within a range of similarity with one of the set of vectors; and
when the present image is determined to be corrupted, executing the second feature detection algorithm by the image analyzer to create a second signature to determine if the present image is a spam image, wherein the second feature detection algorithm comprises analyzing at least a second portion of the present image to create the second signature, and comparing the second signature to stored signatures of known spam images.
4 Assignments
0 Petitions
Accused Products
Abstract
A method is described that includes comparing a characteristic of an image to stored characteristics of spam images. The method also includes generating a signature of the present image. The method further includes comparing the signature of the present image to stored signatures of spam images. The method also includes determining the spam features corresponding to the stored signatures of spam images that match the signature of the present image.
90 Citations
8 Claims
-
1. A computer-implemented method for determining spam features of a present image, comprising:
-
determining whether a format of the present image is in a supported format of an image analyzer; reading the present image by an image reader of the image analyzer when the format of the present image is determined to be in the supported format; analyzing the present image by the image analyzer to determine whether the present image is corrupted, wherein the present image is determined to be corrupted when the image reader of the image analyzer determines that the format of the present image has been changed; selecting between at least a first feature detection algorithm and a second feature detection algorithm based on the determination of whether the present image is corrupted; when the present image is determined not to be corrupted, executing the first feature detection algorithm by the image analyzer to create a first signature to determine if the present image is a spam image, wherein the first feature detection algorithm comprises depixelating at least a first portion of the present image and processing the portion of the present image after the depixelation to create the first signature, wherein processing the portion of the present image comprises comparing a vector associated to the portion of the present image with a set of vectors of known spam images, and determining if the vector is within a range of similarity with one of the set of vectors; and when the present image is determined to be corrupted, executing the second feature detection algorithm by the image analyzer to create a second signature to determine if the present image is a spam image, wherein the second feature detection algorithm comprises analyzing at least a second portion of the present image to create the second signature, and comparing the second signature to stored signatures of known spam images. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine-readable medium having machine-executable instructions stored thereon, which when executed by a computer processing system, causes the computer processing system to perform a method for determining spam features of a present image, the method comprising:
-
determining whether a format of the present image is in a supported format of an image analyzer; reading the present image by an image reader of the image analyzer when the format of the present image is determined to be in the supported format; analyzing the present image by the image analyzer to determine whether the present image is corrupted, wherein the present image is determined to be corrupted when the image reader of the image analyzer determines that the format of the present image has been changed; selecting between at least a first feature detection algorithm and a second feature detection algorithm based on the determination of whether the present image is corrupted; when the present image is determined not to be corrupted, executing the first feature detection algorithm by the image analyzer to create a first signature to determine if the present image is a spam image, wherein the first feature detection algorithm comprises depixelating at least a first portion of the present image and processing the portion of the present image after the depixelation to create the first signature, wherein processing the portion of the present image comprises comparing a vector associated to the portion of the present image with a set of vectors of known spam images, and determining if the vector is within a range of similarity with one of the set of vectors; and when the present image is determined to be corrupted, executing the second feature detection algorithm by the image analyzer to create a second signature to determine if the present image is a spam image, wherein the second feature detection algorithm comprises analyzing at least a second portion of the present image to create the second signature, and comparing the second signature to stored signatures of known spam images.
-
Specification