DETECTING ONLINE ABUSE IN IMAGES
First Claim
Patent Images
1. A method of monitoring a web site, the method comprising:
- maintaining a database comprising representations of a plurality of elements of interest;
downloading a suspect image from the web site;
preprocessing the suspect image with a computer to identify at least one suspect blob in the image, the suspect blob having an associated set of suspect blob characteristics and an associated set of suspect blob boundaries;
based at least in part of the set of suspect blob boundaries, creating, with the computer, a suspect fingerprint for the suspect blob, the suspect fingerprint comprising a set of suspect fingerprint signals;
based at least in part on the set of blob characteristics, identifying, from a database of image templates, at least one candidate fingerprint comprising a plurality of candidate fingerprint signals, the at least one candidate fingerprint being associated with an element of interest;
calculating a plurality of similarity measures between the suspect fingerprint and the candidate fingerprint, each of the similarity measures being calculated based on a suspect fingerprint signal a respective candidate fingerprint signal;
weighting each of the plurality of similarity measures;
calculating a composite similarity score for the candidate blob, based on the weighted similarity measures;
identifying a minimum individual similarity score from among the plurality of similarity measures;
comparing the composite similarity score with a first threshold;
comparing the minimum individual similarity score with a second threshold;
based at least in part on a comparison of the composite similarity score with the first threshold and a comparison of the minimum similarity score with the second threshold, determining whether the suspect image is a likely match for the element of interest; and
determining whether the web site is likely to be part of an illegitimate online activity, based at least in part on a determination of whether the suspect image is a likely match for the element of interest.
8 Assignments
0 Petitions
Accused Products
Abstract
Tools for analyzing images are disclosed. In some cases, the images are analyzed in order to determine whether a particular web site and/or email message is part of an illegitimate online activity. In an aspect, an image analysis process comprises comparing a suspect image with one or more elements of interest (which can include images, words, etc.) by generating fingerprints characterizing the suspect image and the elements of interest, to allow for a quantitative comparison.
91 Citations
25 Claims
-
1. A method of monitoring a web site, the method comprising:
-
maintaining a database comprising representations of a plurality of elements of interest;
downloading a suspect image from the web site;
preprocessing the suspect image with a computer to identify at least one suspect blob in the image, the suspect blob having an associated set of suspect blob characteristics and an associated set of suspect blob boundaries;
based at least in part of the set of suspect blob boundaries, creating, with the computer, a suspect fingerprint for the suspect blob, the suspect fingerprint comprising a set of suspect fingerprint signals;
based at least in part on the set of blob characteristics, identifying, from a database of image templates, at least one candidate fingerprint comprising a plurality of candidate fingerprint signals, the at least one candidate fingerprint being associated with an element of interest;
calculating a plurality of similarity measures between the suspect fingerprint and the candidate fingerprint, each of the similarity measures being calculated based on a suspect fingerprint signal a respective candidate fingerprint signal;
weighting each of the plurality of similarity measures;
calculating a composite similarity score for the candidate blob, based on the weighted similarity measures;
identifying a minimum individual similarity score from among the plurality of similarity measures;
comparing the composite similarity score with a first threshold;
comparing the minimum individual similarity score with a second threshold;
based at least in part on a comparison of the composite similarity score with the first threshold and a comparison of the minimum similarity score with the second threshold, determining whether the suspect image is a likely match for the element of interest; and
determining whether the web site is likely to be part of an illegitimate online activity, based at least in part on a determination of whether the suspect image is a likely match for the element of interest. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of monitoring a web site, the method comprising:
-
maintaining a database comprising representations of a plurality of elements of interest;
downloading a suspect image from the web site;
analyzing the suspect image to determine whether the suspect image matches any of the elements of interest; and
determining whether the web site is likely to be part of an illegitimate online activity, based at least in part upon an analysis of the suspect image. - View Dependent Claims (11, 12)
-
-
13. A method of monitoring email messages, the method comprising:
-
maintaining a database comprising representations of a plurality of elements of interest;
receiving an email message;
analyzing the email message to identify a suspect image in the email message;
analyzing the suspect image to determine whether the suspect image matches any of the elements of interest; and
determining whether the email message is likely to be part of an illegitimate online activity, based at least in part upon an analysis of the suspect image. - View Dependent Claims (14)
-
-
15. A method of analyzing an image, the method comprising:
-
maintaining a database comprising representations of a plurality of elements of interest;
segmenting the image into a plurality of blobs, each of the plurality of blobs being described by a set of characteristics and having a set of boundaries;
creating, for each of the plurality of blobs, a fingerprint for the blob, based at least in part on the boundaries of the blob;
collecting, for at least one of the plurality of blobs and from the database, a list of one or more candidate elements, based on the characteristics the at least one of the plurality of blobs;
assigning, for each of the one or more candidate elements, a score to the candidate element based on similarities between a fingerprint of the candidate element and the fingerprint of the at least one of the plurality of blobs; and
determining, based at least in part on the scores assigned to the candidate elements, whether the image is a likely match for one or more of the candidate elements. - View Dependent Claims (16, 17, 18)
-
-
19. A system comprising:
-
a processor;
a database comprising representations of a plurality of elements of interest; and
a set of instructions executable by the processor, the set of instructions comprising;
a) instructions to maintain a database comprising representations of a plurality of elements of interest;
b) instructions to segment the image into a plurality of blobs, each of the plurality of blobs being described by a set of characteristics and having a set of boundaries;
c) instructions to create, for each of the plurality of blobs, a fingerprint for the blob, based at least in part on the boundaries of the blob;
d) instructions to collect, for at least one of the plurality of blobs and from the database, a list of one or more candidate elements, based on the characteristics the at least one of the plurality of blobs;
e) instructions to assign, for each of the one or more candidate elements, a score to the candidate element based on similarities between a fingerprint of the candidate element and the fingerprint of the at least one of the plurality of blobs; and
f) instructions to determine, based at least in part on the scores assigned to the candidate elements, whether the blob is a likely match for one or more of the candidate elements.
-
-
20. A software program comprising a set of instructions executable by one or more processors, the set of instructions comprising:
-
instructions to maintain a database comprising representations of a plurality of elements of interest;
instructions to segment the image into a plurality of blobs, each of the plurality of blobs being described by a set of characteristics and having a set of boundaries;
instructions to create, for each of the plurality of blobs, a fingerprint for the blob, based at least in part on the boundaries of the blob;
instructions to collect, for at least one of the plurality of blobs and from the database, a list of one or more candidate elements, based on the characteristics the at least one of the plurality of blobs;
instructions to assign, for each of the one or more candidate elements, a score to the candidate element based on similarities between a fingerprint of the candidate element and the fingerprint of the at least one of the plurality of blobs; and
instructions to determine, based at least in part on the scores assigned to the candidate elements, whether the blob is a likely match for one or more of the candidate elements.
-
-
21. A computer system for analyzing an image, the system comprising:
-
a database configured to store of image templates for a plurality of elements of interest, each of the image templates comprising a candidate fingerprint, each candidate fingerprint comprising a plurality of candidate fingerprint signals;
a processor in communication with the database; and
a computer readable medium having embodied thereon a software program executable by the processor, the software program comprising;
a) an image preprocessing and segmentation component configured to receive a suspect image and identify, within the suspect image, a suspect blob having an associated set of suspect blob boundaries;
b) a fingerprint generation component configured to create a suspect fingerprint, based at least in part on the suspected blob boundaries, the suspect blob fingerprint comprising a set of suspect blob fingerprint signals; and
c) a fingerprint matching component configured to calculate a similarity score for an element of interest, the similarity score being based on a plurality of similarity measures between the suspect fingerprint and a candidate fingerprint for the element of interest, each of the similarity measures being calculated based on a suspect fingerprint signal and a respective candidate fingerprint signal, and to determine, based at least in part on the similarity score, determine whether the suspect image is a likely match for the element of interest. - View Dependent Claims (22, 23, 24, 25)
-
Specification