{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T05:29:41Z","timestamp":1741238981919,"version":"3.38.0"},"reference-count":43,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1016\/j.patrec.2011.03.022","type":"journal-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T22:38:41Z","timestamp":1306276721000},"page":"1436-1446","source":"Crossref","is-referenced-by-count":72,"title":["A survey and experimental evaluation of image spam filtering techniques"],"prefix":"10.1016","volume":"32","author":[{"given":"Battista","family":"Biggio","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Fumera","sequence":"additional","affiliation":[]},{"given":"Ignazio","family":"Pillai","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patrec.2011.03.022_b0005","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, A., Koutsias, J., Cbandrinos, K.V., Spyropoulos, C.D., 2000. An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proc. ACM Internat. Conf. Res. Dev. Inf. Retrieval, pp. 160\u2013167.","DOI":"10.1145\/345508.345569"},{"key":"10.1016\/j.patrec.2011.03.022_b0010","doi-asserted-by":"crossref","unstructured":"Aradhye, H., Myers, G., Herson, J.A., 2005. Image analysis for efficient categorization of image-based spam e-mail. In: Proc. Internat. Conf. Doc. Anal. Recog., pp. 914\u2013918.","DOI":"10.1109\/ICDAR.2005.135"},{"key":"10.1016\/j.patrec.2011.03.022_b0015","unstructured":"Baird, H.S., Chew, M., 2003. Baffletext: a human interactive proof. In: Proc. IS& T\/SPIE Doc. Recog. & Retrieval Conf."},{"key":"10.1016\/j.patrec.2011.03.022_b0020","series-title":"14th Internat. Conf. Image Anal. Process","first-page":"105","article-title":"Image spam filtering using visual information","author":"Biggio","year":"2007"},{"key":"10.1016\/j.patrec.2011.03.022_b0025","doi-asserted-by":"crossref","unstructured":"Biggio, B., Fumera, G., Pillai, I., Roli, F., 2008. Improving image spam filtering using image text features. In: Proc. Fifth Conf. Email Anti-Spam (CEAS).","DOI":"10.1109\/ICIAP.2007.4362765"},{"key":"10.1016\/j.patrec.2011.03.022_b0030","unstructured":"Byun, B., Lee, C.-H., Webb, S., Pu, C., 2007. A discriminative classifier learning approach to image modeling and spam image identification. In: Proc. Fourth Conf. Email Anti-Spam (CEAS)."},{"key":"10.1016\/j.patrec.2011.03.022_b0035","unstructured":"Chang, C.-C., Lin, C.-J., 2001. Lib SVM: a library for support vector machines, ."},{"key":"10.1016\/j.patrec.2011.03.022_b0040","doi-asserted-by":"crossref","unstructured":"Cormack, G.V., 2006. Trec 2006 spam track overview. In: Voorhees, E.M., Buckland, L.P. (Eds.), TREC. Vol. Special Publication 500-272. National Institute of Standards and Technology (NIST).","DOI":"10.6028\/NIST.SP.500-272.spam-overview"},{"key":"10.1016\/j.patrec.2011.03.022_b0045","doi-asserted-by":"crossref","unstructured":"Cormack, G.V., 2007. Trec 2007 spam track overview. In: Voorhees, E.M., Buckland, L.P. (Eds.), TREC. Vol. Special Publication 500-274. National Institute of Standards and Technology (NIST).","DOI":"10.6028\/NIST.SP.500-274.spam-overview"},{"issue":"8","key":"10.1016\/j.patrec.2011.03.022_b0050","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/280324.280336","article-title":"Spam!","volume":"41","author":"Cranor","year":"1998","journal-title":"Commun. ACM"},{"key":"10.1016\/j.patrec.2011.03.022_b0055","unstructured":"Dredze, M., Gevaryahu, R., Elias-Bachrach, A., 2007. Learning fast classifiers for image spam. In: Proc. Fourth Conf. Email Anti-Spam (CEAS)."},{"issue":"5","key":"10.1016\/j.patrec.2011.03.022_b0060","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","article-title":"Support vector machines for spam categorization","volume":"10","author":"Drucker","year":"1999","journal-title":"IEEE Trans. Neural Networks"},{"issue":"2","key":"10.1016\/j.patrec.2011.03.022_b0065","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1145\/980972.980990","article-title":"In vivo spam filtering: a challenge problem for KDD","volume":"5","author":"Fawcett","year":"2003","journal-title":"SIGKDD Explor. Newsletter"},{"key":"10.1016\/j.patrec.2011.03.022_b0070","first-page":"2699","article-title":"Spam filtering based on the analysis of text information embedded into images","volume":"7","author":"Fumera","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.patrec.2011.03.022_b0075","series-title":"Proc. Int. Conf. Acoust. Speech Sig. Process. (ICASSP)","first-page":"1765","article-title":"Image spam hunter","author":"Gao","year":"2008"},{"key":"10.1016\/j.patrec.2011.03.022_b0080","unstructured":"Graham, P., 2002a. A plan for spam, ."},{"key":"10.1016\/j.patrec.2011.03.022_b0085","unstructured":"Graham, P., 2002b. Will filters kill spam?, ."},{"key":"10.1016\/j.patrec.2011.03.022_b0090","series-title":"Proc. 10th Int. Conf. Inf. Integr. Web-based Appl. & Serv.","first-page":"520","article-title":"Evaluation of spam detection and prevention frameworks for email and image spam: a state of art.","author":"Hayati","year":"2008"},{"key":"10.1016\/j.patrec.2011.03.022_b0095","series-title":"IEEE\/ACIS Int. Conf. Comput. Inf. Sci.","first-page":"910","article-title":"A simple method for filtering image spam","author":"He","year":"2009"},{"key":"10.1016\/j.patrec.2011.03.022_b0100","doi-asserted-by":"crossref","unstructured":"Hsia, J., Chen, M., 2009. Language-model-based detection cascade for efficient classification of image-based spam e-mail. In: IEEE Int. Conf. Multimedia Expo, pp. 1182\u20131185.","DOI":"10.1109\/ICME.2009.5202711"},{"key":"10.1016\/j.patrec.2011.03.022_b0105","unstructured":"IBM, 2008. The 2008 x-force threat and risk report, http:\/\/www-935.ibm.com\/services\/us\/iss\/xforce\/trendreports\/."},{"key":"10.1016\/j.patrec.2011.03.022_b0110","unstructured":"Ittner, D.J., Lewis, D.D., Ahn, D.D., 1995. Text categorization of low quality images. In: 4th Annu. Symp. Doc. Anal. Inf. Retrieval, pp. 301\u2013315."},{"issue":"3","key":"10.1016\/j.patrec.2011.03.022_b0115","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/34.667881","article-title":"On combining classifiers","volume":"20","author":"Kittler","year":"1998","journal-title":"IEEE Trans. Pattern Anal. Mach. Int."},{"issue":"10","key":"10.1016\/j.patrec.2011.03.022_b0120","doi-asserted-by":"crossref","first-page":"2167","DOI":"10.1016\/j.ins.2006.12.005","article-title":"Learning to classify e-mail","volume":"177","author":"Koprinska","year":"2007","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.patrec.2011.03.022_b0125","first-page":"423","article-title":"Feature selection using particle swarm optimization with application in spam filtering","volume":"5","author":"Lai","year":"2009","journal-title":"Int. J. Innovative Comput."},{"key":"10.1016\/j.patrec.2011.03.022_b0130","series-title":"Int. Symp. Int. Inf. Tech. Secur. Inf.","first-page":"663","article-title":"Efficient modeling of spam images","author":"Liu","year":"2010"},{"key":"10.1016\/j.patrec.2011.03.022_b0135","series-title":"Proc. 17th Int. Conf. World Wide Web","first-page":"497","article-title":"Detecting image spam using visual features and near duplicate detection","author":"Mehta","year":"2008"},{"key":"10.1016\/j.patrec.2011.03.022_b0140","unstructured":"Meyer, T.A., Whateley, B., 2004. Spambayes: Effective open-source, bayesian based, email classification system. In: First Conf. Email Anti-Spam (CEAS)."},{"key":"10.1016\/j.patrec.2011.03.022_b0145","doi-asserted-by":"crossref","first-page":"4646","DOI":"10.1016\/j.visres.2006.04.023","article-title":"Feature detection and letter identification","volume":"46","author":"Pelli","year":"2006","journal-title":"Vision Res."},{"key":"10.1016\/j.patrec.2011.03.022_b0150","first-page":"600","article-title":"Filtering image spam using image semantics and near-duplicate detection","volume":"Vol. 1","author":"Qu","year":"2009"},{"year":"1993","series-title":"C4.5: programs for machine learning","author":"Quinlan","key":"10.1016\/j.patrec.2011.03.022_b0155"},{"issue":"107","key":"10.1016\/j.patrec.2011.03.022_b0160","first-page":"3","article-title":"A statistical approach to the spam problem","volume":"2003","author":"Robinson","year":"2003","journal-title":"Linux J."},{"key":"10.1016\/j.patrec.2011.03.022_b0165","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E., 1998. A bayesian approach to filtering junk e-mail. AAAI Tech. Rep. WS-98-05, Madison, Wisconsin."},{"key":"10.1016\/j.patrec.2011.03.022_b0170","unstructured":"Samosseiko, D., Thomas, R., 2006. The game goes on: an analysis of modern spam techniques. In: Virus Bulletin Conference."},{"issue":"6","key":"10.1016\/j.patrec.2011.03.022_b0175","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MSP.2004.100","article-title":"How to win an evolutionary arms race","volume":"2","author":"Somayaji","year":"2004","journal-title":"IEEE Security and Privacy"},{"key":"10.1016\/j.patrec.2011.03.022_b0180","unstructured":"Stern, H., 2008. A survey of modern spam tools. In: Proc. Fifth Conf. Email Anti-Spam (CEAS)."},{"key":"10.1016\/j.patrec.2011.03.022_b0185","doi-asserted-by":"crossref","unstructured":"Uemura, M., Tabata, T., 2008. Design and evaluation of a bayesian-filter-based image spam filtering method. In: Int. Conf. Inf. Secur. Assur., pp. 46\u201351.","DOI":"10.1109\/ISA.2008.84"},{"key":"10.1016\/j.patrec.2011.03.022_b0190","unstructured":"Wang, Z., Josephson, W., Lv, Q., Charikar, M., Li, K., 2007. Filtering image spam with near-duplicate detection. In: Proc. Fourth Conf. Email Anti-Spam (CEAS)."},{"issue":"8","key":"10.1016\/j.patrec.2011.03.022_b0195","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1145\/859670.859703","article-title":"Inside risks: spam wars","volume":"46","author":"Weinstein","year":"2003","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/j.patrec.2011.03.022_b0200","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10489-008-0116-0","article-title":"Robust classification for spam filtering by back-propagation neural networks using behavior-based features","volume":"31","author":"Wu","year":"2009","journal-title":"Appl. Int."},{"key":"10.1016\/j.patrec.2011.03.022_b0205","unstructured":"Wu, C.-T., Cheng, K.-T., Zhu, Q., Wu, Y.-L., 2005. Using visual features for anti-spam filtering. In: Proc. IEEE Int. Conf. Image Process., Vol. III. pp. 501\u2013504."},{"key":"10.1016\/j.patrec.2011.03.022_b0210","series-title":"Proc. 18th Int. Conf. World Wide Web","first-page":"1187","article-title":"Detecting image spam using local invariant features and pyramid match kernel","author":"Zuo","year":"2009"},{"key":"10.1016\/j.patrec.2011.03.022_b0215","series-title":"Proc. Int. Conf. Acoust. Speech Signal Process.","first-page":"849","article-title":"Image spam filtering using Fourier\u2013Mellin invariant features","author":"Zuo","year":"2009"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865511000936?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865511000936?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T20:05:35Z","timestamp":1741205135000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167865511000936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["S0167865511000936"],"URL":"https:\/\/doi.org\/10.1016\/j.patrec.2011.03.022","relation":{},"ISSN":["0167-8655"],"issn-type":[{"type":"print","value":"0167-8655"}],"subject":[],"published":{"date-parts":[[2011,7]]}}}