Detection of image spam
First Claim
1. A method of detecting spam images in electronic objects, the method comprising:
- extracting images embedded in the electronic objects;
compressing the extracted images into a common representation using a lossy compression function;
determining if the compressed forms of the extracted images are identical to the compressed form of any known spam image from a corpus of known spam images, which compressed forms are the known spam images compressed into said common representation using said lossy compression function; and
signalling electronic objects as embedding a spam image on the basis of a compressed form of an extracted image extracted from an electronic object being determined to be identical to the compressed form of a known spam image.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of detecting spam images in electronic objects such as emails comprises compressing images extracted from the electronic object into a common representation using a lossy compression function and determining if the compressed forms of the extracted images are identical to the compressed form of any known spam image from a corpus of known spam images, which compressed forms are the known spam images compressed into said common representation using said lossy compression function. The electronic objects are signalled as embedding a spam image on the basis of a compressed form of an extracted image extracted from an electronic object being determined to be identical to the compressed form of a known spam image.
45 Citations
35 Claims
-
1. A method of detecting spam images in electronic objects, the method comprising:
-
extracting images embedded in the electronic objects; compressing the extracted images into a common representation using a lossy compression function; determining if the compressed forms of the extracted images are identical to the compressed form of any known spam image from a corpus of known spam images, which compressed forms are the known spam images compressed into said common representation using said lossy compression function; and signalling electronic objects as embedding a spam image on the basis of a compressed form of an extracted image extracted from an electronic object being determined to be identical to the compressed form of a known spam image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for detecting spam images in electronic objects, the system comprising:
-
an image extraction engine operative to extract images embedded in the electronic objects; a compression unit operative to compress the extracted images into a common representation using a lossy compression function; a determination unit operative to determine if the compressed forms of the extracted images are identical to the compressed form of any known spam image from a corpus of known spam images, which compressed forms are the known spam images compressed into said common representation using said lossy compression function; and a signal unit operative to signal electronic objects as embedding a spam image responsive to the determination unit determining that a compressed form of an extracted image extracted from an electronic object is identical to the compressed form of a known spam image. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of detecting reference images in electronic objects, the method comprising:
-
extracting images embedded in the electronic objects; compressing the extracted images into a common representation; determining if the compressed forms of the extracted images are identical to the compressed form, in said common representation, of any reference image from a corpus of reference images; and signalling electronic objects as embedding a reference image on the basis of a compressed form of an extracted image extracted from an electronic object being determined to be identical to the compressed form of a reference image.
-
Specification