System and method for identifying spam in rasterized images
First Claim
1. A computer implemented method for identifying spam in an image, comprising:
- identifying one or more objects in the image, including text and graphic objects;
tracing contours of one or more identified objects;
computing angles of inclination of tangents at plurality of points on an object contour;
determining, based on the angles of inclination, one or more attributes of the object contour, including lengths of line segments of the contour, angles between line segments the contour, lengths of arcs of the contour and radii of curvature of the arcs of the contour;
generating object signatures containing one or more attributes of the object contours;
comparing signatures of one or more objects of the image with known spam signatures;
determining that the image contains spam if the number of object signatures that are substantially similar to the known spam signatures exceeds a predetermined threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems, methods and computer program products for detection of spam in raster images. In one example embodiment, a method comprises identifying objects in the raster image; tracing contours of identified objects; computing, angles of inclination of tangents at plurality of points on an object contour; determining, based on the computed angles of inclination, one or more attributes of the object contour, including lengths of line segments of the contour, angles between the line segments, lengths of arcs the contour and radii of curvature of the arcs; generating object signatures containing one or more attributes of the object contours; comparing object signatures of the image with known spam image signatures; and determining that the image contains spam if the number of object signatures that are substantially similar to the known spam image signatures exceeds a predetermined threshold.
21 Citations
20 Claims
-
1. A computer implemented method for identifying spam in an image, comprising:
-
identifying one or more objects in the image, including text and graphic objects; tracing contours of one or more identified objects; computing angles of inclination of tangents at plurality of points on an object contour; determining, based on the angles of inclination, one or more attributes of the object contour, including lengths of line segments of the contour, angles between line segments the contour, lengths of arcs of the contour and radii of curvature of the arcs of the contour; generating object signatures containing one or more attributes of the object contours; comparing signatures of one or more objects of the image with known spam signatures; determining that the image contains spam if the number of object signatures that are substantially similar to the known spam signatures exceeds a predetermined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for identifying spam in an image, comprising:
-
a memory being configured to store an image; and a processor coupled to the memory, the processor being configured to; identify one or more objects in the image, including text and graphic objects; trace contours of one or more identified objects; compute angles of inclination of tangents at plurality of points on an object contour; determine, based on the angles of inclination, one or more attributes of the object contour, including lengths of line segments of the contour, angles between line segments the contour, lengths of arcs of the contour and radii of curvature of the arcs of the contour; generate object signatures containing one or more attributes of the object contours; compare signatures of one or more objects of the image with known spam signatures; and determine that the image contains spam if the number of object signatures that are substantially similar to the known spam signatures exceeds a predetermined threshold. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embedded in a non-transitory computer-readable storage medium, the computer-readable storage medium comprising computer-executable instructions for identifying spam in an image, the medium includes instructions for:
-
identifying one or more objects in the image, including text and graphic objects; tracing contours of one or more identified objects; computing angles of inclination of tangents at plurality of points on an object contour; determining, based on the angles of inclination, one or more attributes of the object contour, including lengths of line segments of the contour, angles between line segments the contour, lengths of arcs of the contour and radii of curvature of the arcs of the contour; generating object signatures containing one or more attributes of the object contours; comparing signatures of one or more objects of the image with known spam signatures; determining that the image contains spam if the number of object signatures that are substantially similar to the known spam signatures exceeds a predetermined threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification