Skip to main content

Features Assimilation via Three-Stream Deep Networks for Spam Attack Detection from Images

  • Conference paper
  • First Online:
  • 384 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1777))

Abstract

Spam filters typically use optical character recognition (OCR) for extracting the text from images. These days spammers have circumvented optical scanning by fracturing the text within the images thereby improving their attacks and finally reaching to the users. This paper proposes a three-stream deep learning-based model which uses Convolutional Neural Networks (CNN), Transfer Learning, SIFT and HOG features via hybrid fusion framework. Transfer learning alone can only achieve an accuracy of 95% but our hybrid model shows improved performance and obtains an accuracy of 96%, eclipsing the existing techniques. We have created our dataset of challenging HAM images which will be publicly available. On our challenging dataset as well, the proposed method outperforms other existing methods for effectively detecting the spam attacks targeted via images.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Radicati group email statistics report 2021–25. https://www.radicati.com/wp/wp-content/uploads/2021/Email_Statistics_Report,_2021-2025_Executive_Summary.pdf. Accessed 2 Jun 2022

  2. Lai, C.-C., Tsai, M.-C.: An empirical performance comparison of machine learning methods for spam e-mail categorization. In: Fourth International Conference on Hybrid Intelligent Systems (HIS’04), pp. 44–48. IEEE (2004)

    Google Scholar 

  3. Image spam classification using OCR technique. January 2017. Sunita V. Dhavale: https://www.researchgate.net/publication/315388437_Image_Spam_Filters_Based_on_Optical_Character_Recognition_OCR_Techniques

  4. Kumar, A.D., Vinayakumar, R., Soman, K.P.: Deep Learning based Image Spam Detection 3 Oct 2018. https://arxiv.org/abs/1810.03977

  5. Vinayakumar, R., Soman, K., Poornachandran, P., Akarsh, S.: Application of deep learning architectures for cyber security. In: Hassanien, A., Elhoseny, M. (eds) Cybersecurity and Secure Information Systems, pp. 125–160. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16837-7_7

  6. Venkatraman, S., Alazab, M., Vinayakumar, R.: A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 47, 377–389 (2019)

    Google Scholar 

  7. Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Venkatraman, S.: Robust intelligent malware detection using deep learning. IEEE Access 7, 46 717-46 738 (2019)

    Article  Google Scholar 

  8. Mohan, V.S., Vinayakumar, R., Soman, K., Poornachandran, P.: Spoof net: syntactic patterns for identification of ominous online factors. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 258–263. IEEE (2018)

    Google Scholar 

  9. Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., AlNemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41 525-41 550 (2019)

    Article  Google Scholar 

  10. https://ieeexplore.ieee.org/document/9044249

  11. https://doi.org/10.1007/s42979-021-00762-x

  12. https://www.researchgate.net/publication/306186011_Facial_Expression_Recognition_Using_a_Hybrid_CNN-SIFT_Aggregator

  13. https://www.researchgate.net/publication/355152280_Image-Based_Malware_Classification_Using_VGG19_Network_and_Spatial_Convolutional_Attention

  14. https://ieeexplore.ieee.org/document/7860934

  15. https://link.springer.com/article/10.1007/s00779-018-1168-8

  16. ADAM: Kingma, D., Adam, B.J.: A method for stochastic optimization. Comput. Sci. (2014)

    Google Scholar 

  17. Bansal. https://doi.org/10.1007/s12652-021-03488-z

  18. Xception: 7 Oct 2016: François Chollet: arXiv:1610.02357v3

  19. https://www.researchgate.net/publication/346534797_Color_Model _Based_Convolutional_Neural_Network_for_Image_Spam_Classification

  20. https://arxiv.org/abs/2204.01710

  21. https://docs.opencv.org/4.x/da/d22/tutorial_py_canny.html

  22. https://www.researchgate.net/publication/338511771_An_Overview _of_Bag_of_WordsImportance_Implementation_Applications_and_Challenges

  23. Introduction to machine learning with applications in information security. Chapman & Hall/CRC

    Google Scholar 

  24. Dredze, M., Gevaryahu, R., Elias-Bachrach, A.: Learning fast classifiers for image spam. In: CEAS, pp. 2007–487 (2007)

    Google Scholar 

  25. Gao, Y., et al.: Image spam hunter. In: 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1765–1768. IEEE (2008)

    Google Scholar 

  26. ResNet251: He, K., Zhang, X., Ren, S., Sun, J.:10 Dec 2015: arXiv:1512.03385

  27. DenseNet201: https://arxiv.org/abs/1608.06993v5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tushar Sandhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, S. et al. (2023). Features Assimilation via Three-Stream Deep Networks for Spam Attack Detection from Images. In: Gupta, D., Bhurchandi, K., Murala, S., Raman, B., Kumar, S. (eds) Computer Vision and Image Processing. CVIP 2022. Communications in Computer and Information Science, vol 1777. Springer, Cham. https://doi.org/10.1007/978-3-031-31417-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-31417-9_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-31416-2

  • Online ISBN: 978-3-031-31417-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics