×

Apparatus and method for detecting images within spam

  • US 8,290,203 B1
  • Filed: 01/11/2007
  • Issued: 10/16/2012
  • Est. Priority Date: 01/11/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for determining spam features of a present image, comprising:

  • determining if the present image is oversized and, if so, then classifying the present image as oversized refraining from additional analysis of the present image;

    preprocessing the present image if the image is not oversized, the preprocessing including analyzing the present image to obtain an image format, image width, image height and image size;

    determining if the image is of a type which is supported and, if not, then classifying the image as unsupported, and refraining from performing any additional analysis of the image;

    using a characteristic of the present image, whether corrupted, or not corrupted, as an index to a table having stored characteristics of known spam images, wherein the characteristic includes one or more of the image format, image, width, image height and image size;

    performing the following additional operations only if a match exists between the characteristic of the present image and one of the stored characteristics of known spam images;

    determining if the image is corrupted and, if the image is not corrupted, then performing a first set of operations which create a non-fuzzy signature of the present image and, if the image is corrupted, then performing a second set of operations which create a fuzzy signature of the image;

    comparing the fuzzy or non-fuzzy signature to stored signatures of known spam images, the stored signatures of known spam images having been previously generated from spam images having the same characteristic as the present image;

    determining spam features corresponding to the stored signatures of spam images that match the signature of the present image;

    wherein generating a signature of the present image includes performing a one-way hash function on the image.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×