×

Apparatus and method for detecting images within spam

  • US 10,095,922 B2
  • Filed: 10/11/2012
  • Issued: 10/09/2018
  • Est. Priority Date: 01/11/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for determining spam features of a present image, comprising:

  • determining whether a format of the present image is in a supported format of an image analyzer;

    reading the present image by an image reader of the image analyzer when the format of the present image is determined to be in the supported format;

    analyzing the present image by the image analyzer to determine whether the present image is corrupted, wherein the present image is determined to be corrupted when the image reader of the image analyzer determines that the format of the present image has been changed;

    selecting between at least a first feature detection algorithm and a second feature detection algorithm based on the determination of whether the present image is corrupted;

    when the present image is determined not to be corrupted, executing the first feature detection algorithm by the image analyzer to create a first signature to determine if the present image is a spam image, wherein the first feature detection algorithm comprises depixelating at least a first portion of the present image and processing the portion of the present image after the depixelation to create the first signature, wherein processing the portion of the present image comprises comparing a vector associated to the portion of the present image with a set of vectors of known spam images, and determining if the vector is within a range of similarity with one of the set of vectors; and

    when the present image is determined to be corrupted, executing the second feature detection algorithm by the image analyzer to create a second signature to determine if the present image is a spam image, wherein the second feature detection algorithm comprises analyzing at least a second portion of the present image to create the second signature, and comparing the second signature to stored signatures of known spam images.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×