1. Introduction
Spam mail are becoming more of a security threat [1] than an annoyance. The classification of spam mail is a major challenge faced, as the adversaries are constantly updating the tools and techniques for the creation and dissemination of spam mails. Recent advancement in the area of machine learning [2,3] have proven to be useful in the area of spam classification tasks.
Image spam is a form of spam with embedded text information inside a base image file. The text information is embedded into the image file to evade the common practise of using text filtering in spam classification task. With advanced text embedding techniques [4], extracting the text using OCR is even proving to be difficult. Alternatively, instead of using normal text filtering techniques, image spam filtering is performed using features that are extracted from the input spam images. The accuracies, complexities and performance of such filter depends mainly on the types of image features, extraction method used and classification algorithm adopted.
One commonly used approach in the image spam classification requires manual feature engineering of different type of features and the selection of the most appropriate and useful one. Larger number of features usually results in better accuracies at the cost of computation and therefore many approaches focus on selecting useful features to improve the classification accuracy and reduce the overall computation. However, as the adversaries are using various image processing techniques to make the image spam looks more like non-spam, the manual feature engineering is becoming less accurate in the classification task.
Given that Image spam are usually created by editing or changing part of the base image to include certain textual information and therefore will results in different compression level in the image. These differences in the compression level in the image could be highlighted by applying error level analysis [5] in the input image. Therefore, we proposed to apply error level analysis to the input image in this research as a pre-processing technique and create a more distinct image features, which will improve the result of the spam classification task. One of the drawback of our approach is that error level analysis works only on lossy compression such as JPEG images and other image format such as PNG are not supported. Moreover, to overcome the challenges of the manual feature engineering and selection of useful features, we propose to use Deep Learning techniques [6–10]. Using this approach, the features are automatic extracted from the input image and therefore the accuracy and the complexity is improved. However, one of the issue in using a Deep Learning technique is the requirement of a large datasets for training and high compute to obtain a fine tuned model.
To sum up, our main contribution in the paper are as follows:
* Application of Error Level Analysis as a pre-processing techniques to the input images
* Use of Deep Learning approach for automatic feature extraction
* Fine-tuning of the deep learning model to improve the classification task
The rest of the sections of this work are organized as follows; Section 2 presents the related works. Section 3 contains the dataset description. Section 4 presents the proposed methodologies. Section 5 includes experimental results and discussion. Finally, the conclusion is placed in Section 6.
2. Related work
2.1 Image spam detection
Optical Character Recognition is widely used to extract textual information from a given image. Such approach is also used in image spam detection by first extracting the textual information from the given image and then applying the different text classification techniques [11–14] for the classification purpose. Textual features such as header, body, BoW, Structure, hyperlinks, attachments, Term Frequency etc [15] are commonly used features in the detection of spam mails. Advanced features such as rank score [16] which is generated by using the linkage information of the image, textual information of the image, and metadata information of the image helps improved the classification accuracy by increasing the relevance of the input image.
Instead of using textual features, many authors have used image features directly from the input spam images for the classification task. However, the resulting performance and the detection accuracy depends on the type and number of image features used. Different author manually generate the image features based on properties and meta data of the image file [17], global features including color and gradient histogram of the image file [18–24], some form of low level image features [25–29], Image texture based features related to run-length matrix, auto-regressive model, co-occurrence matrix, wavelet transform, histogram and gradient [30–32]. Other work uses image features based on Speeded Up Robust Features (SURF) [33] and n-gram feature from the Base64 format of the image file [34]. Different machine learning techniques such as KNN classifier [35], SVM [36–37], are applied for improving the classification task.
Improvement in the classification accuracy has been observed by using various form of CNN [38], Transfer Learning based on Pre-Trained Deep Learning models [39] and new pre-processing techniques such as illumination normalization techniques [40]. These models show very high accuracy even on improved [36] and challenge [37] datasets, which are especially handcrafted by superimposing the spam image on the non-spam images.
Our main contribution in this paper is that, we apply error level analysis to the input spam images, to further enhance the image features and thereby improve the accuracy and performance of the classification tasks and fine-tuned the model to improve the classification accuracy.
2.2 Error Level Analysis (ELA)
Some of the image format such as the JPEG is lossy in nature and uses the transform compression such as Discrete Cosine Transform to retain the low frequency components and when image is saved or resaved, some errors are introduced. However, the amount of error introduced by each resave is not linear, and when an image is modified, the 8x8 cells containing the modifications are no longer at the same error level as the rest of the unmodified image.
Error Level Analysis (ELA) [5] is a technique to identify various portions of an image with a varying level of compression ratio. This is achieved by resaving the image at a known error rate, and then computing the difference between the resaved image and the original image as given below.(1)
where:
Error_level is the difference between the original pixel value and the compressed pixel value
Px is the original pixel value in the image
Py is the compressed pixel value in the image
Many works in the field of image forensics uses ELA for the identification of tampered area in the input images. The works of [41–44] are based on the above approach of using ELA in image as well as video for forgery detection.
Image spams created by embedding the spam text in ordinary JPEG images usually introduce different level of compression in the embedded text portion. Using ELA, the image features extracted can enhance and improves the accuracy and performance of the detection task. The limitation of applying ELA is that, only lossy compression images such as JPEG format are supported and the result may be affected by the compression level used to generate the ELA. When lower compression level is used, the ELA image may not be able to detect any areas of manipulation. However, if the compression level is too high, then the ELA image may identify false positives. An example of an Error Level Analysis images is shown in Fig 1.
[Figure omitted. See PDF.]
3. Material and methods
This section discussed the datasets used in performing the different experiments along with the various deep learning models used.
3.1. Image spam datasets used
The details of the datasets used in the experiment are shown in Table 1.
[Figure omitted. See PDF.]
3.2. Convolutional neural network model
A convolutional neural network (CNN) is a type of artificial neural network that is specifically designed for processing data that has a grid-like structure, such as images. CNNs are able to learn to identify patterns in images, and they are often used for tasks such as image classification, object detection, and image segmentation. The basic idea behind a CNN is to use a series of convolutional layers to extract features from an image. A convolutional layer is a type of neural network layer that applies a filter to an image, which helps to identify specific features in the image. The filters are learned during the training process, and they are typically based on the features that are known to be important for the task at hand.
Once the features have been extracted, they are passed to a series of fully connected layers, which are responsible for classifying the image. The fully connected layers learn to map the extracted features to the labels of the different classes of images.
Pre-trained convolutional neural network models, which are trained on a large dataset can be used to save time and efforts by using the transfer learning technique. In our experiment, we choose the Pre-trained CNN model: BiT-M R50x1 [45], a high performing pre-trained model as our base model.
3.2.1 BiT–M R50×1.
The BiT-M R50x1 model is a high performance CNN model which is based on ResNet and is shown in Fig 2. The model takes as input a 224×224 colour image and generates a 2048–dimensional features vectors as output and consists a multi-class classifier as head. The model consists of Convolution Blocks shown in Fig 3 and Identity Blocks as given in Fig 4. The convolutional block in BiT-M R50x1 consists of a sequence of convolutional layers, followed by a shortcut connection. The shortcut connection simply adds the input to the output of the convolutional layers. This allows the convolutional block to learn residual connections, which helps to prevent the vanishing gradient problem. These blocks are of different dimensions and pooling are applied to these blocks to further reduce the dimension.
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
[Figure omitted. See PDF.]
The Big Transfer (BiT) models are a powerful set of pre-trained image models that can be used to achieve excellent performance on a variety of tasks, even with few labeled samples. The models are based on the ResNet 50 architecture and are pre-trained on a large supervised dataset. They are then efficiently tuned for specific target tasks using a technique called transfer learning.
One of the key innovations of the BiT models is the use of group normalization and convolutional core weight normalization. These normalization techniques help to improve the performance of the models by making them more robust to changes in the input data. As a result, the BiT models are able to achieve state-of-the-art performance on a variety of tasks, including image classification, object detection, and image segmentation.
4. Proposed classification model
There are three main components in the proposed model:
1. ELA image generator.
2. Feature extractor; and
3. Binary classifier.
The proposed model consisting of the ELA image generator, the base CNN model and the final classification unit is shown in Fig 5.
[Figure omitted. See PDF.]
The ELA image generator is part of the pre-processing module where the pre-processing on the datasets are performed. The main pre-processing carried out are:
* Resizing the input images to 224×224 dimensions,
* Normalizing the image data to values between 0–1.
* Generation of ELA Image by taking the pixel difference of the input image and the compressed input image.
The next module is the Base CNN model which has been strip of its classification head. The output of the ELA image generator is fed into the CNN model to extract the features. This is achieved by first freezing the convolution blocks along with the Identity and the pooling blocks of the Base CNN model. The input images of dimension 224×224×3 is then transformed into a 7×7×2048 through multiple stages consisting various blocks as shown in Fig 2 and finally it is flattened to output a 2048 dimensional feature vector.
Finally, the binary classification module consists of two dense layers as the last layer in the model. The first dense layer is of the dimension 1×1×2n ReDense Layer [46], where n is the dimension of the flatten vector and uses a Rectified Linear Unit as its activation function and the second dense layer is the output classification layer which uses a Sigmoid activation. The use of these two dense layers provides an improvement in the performance of the detection.
The parameters in the proposed model are shown in Table 2.
[Figure omitted. See PDF.]
Fine tuning is done through different values in the network hyper-parameters. The values provided in Table 3, results in the highest accuracies.
[Figure omitted. See PDF.]
5. Experiments and result
5.1. The experimental frameworks
The following frameworks were used in performing all the experiments:
* Python 3.6 with OpenCV [47].
* Intel workstation with Xeon Quad-Core processor, 32 GB RAM
* MS Windows 10 Pro 64bit,
* Nvidia Quatro-4000 GPU, 4GB VRAM
* Keras deep learning framework [48].
5.2. Performance measures
The performance measure is calculated using different evaluation indicators. Some of the measures are given below:(2)(3)(4)(5)
Where,
FP: The number of misclassified legitimate emails;
FN: The number of misclassified Spam;
TP: The number of correctly classified Spam;
TN: The number of correctly classified legitimate emails.
The confusion matrix can be used to define the performance of the classification algorithm and is given below in Table 4.
[Figure omitted. See PDF.]
5.3. Results
Using the proposed Deep Learning model along with the pre-processing, we performed experiments on image spam datasets as mentioned earlier, namely, “Improved” [36], Challenge-A [37], Challenge-B [37], Dredze [17], and ISH [18], and the results of the experiments are then validated by using the validation sets. The (Figs 6–10) presents the ROC curve and the validation loss of different experiment, on the datasets.
[Figure omitted. See PDF.]
(A,B): Validation Loss and ROC curve on Improved Dataset [36].
[Figure omitted. See PDF.]
(A,B): Validation Loss and ROC curve on Challenge-A Dataset [37].
[Figure omitted. See PDF.]
(A,B): Validation Loss and ROC curve on Challenge-B Dataset [37].
[Figure omitted. See PDF.]
(A,B): Validation Loss and ROC curve on Dredze Dataset [17].
[Figure omitted. See PDF.]
(A,B): Validation Loss and ROC curve on ISH Dataset [18].
From the above, we can see that the proposed model with ELA pre-processing achieved a higher accuracy than the non ELA images in all the datasets. We also note that there is insignificant difference in the accuracy for the two compression ratios used in generating the ELA images i.e., 90% and 95%.
The computational speeds of the proposed CNN model along with the speed of execution are shown in Table 5.
[Figure omitted. See PDF.]
The confusion matrix for the various experiment on different datasets with compression ratio of 90%, 95% and Non-ELA are shown in Fig 11.
[Figure omitted. See PDF.]
The model performance measures namely the accuracy, precision, recall and f1-score for the various experiment on different datasets are shown in Table 6.
[Figure omitted. See PDF.]
Our proposed CNN model performed very well on other publicly available datasets as given in Table 7 and achieved tremendous improvement in the accuracies as compared with the other approaches.
[Figure omitted. See PDF.]
6. Conclusion
Image spam detection is a binary classification problem that uses models to extract and train features for image classification. Models that rely on manual feature extraction are not suitable when presented with specially handcrafted image spam datasets. However, models that automatically extract image features from input images, such as those based on convolutional neural networks (CNNs), perform extremely well even on challenge datasets. The performance of such models can be improved by fine-tuning the hyper-parameters of the model and pre-processing the input images.
In our experiment, we used a deep learning model based on CNN and transfer learning to extract image features from input images that had been pre-processed using error level analysis (ELA). Our proposed approach achieved extremely high levels of accuracy not only on standard image spam datasets, but also on improved and challenge datasets. With the use of ELA, we were able to increase the efficiency and reduce the computational costs of the training process.
In our future work, we hope to apply the proposed approach to other image datasets using automatic parameter tuning methods and perform various statistical analysis on the performance.
Citation: Singh AB, Singh KM (2023) Application of error level analysis in image spam classification using deep learning model. PLoS ONE 18(12): e0291037. https://doi.org/10.1371/journal.pone.0291037
About the Authors:
Angom Buboo Singh
Roles: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Software, Validation, Visualization, Writing – original draft, Writing – review & editing
E-mail: [email protected]
Affiliation: National Institute of Technology, Manipur, India
ORICD: https://orcid.org/0000-0001-7125-7709
Khumanthem Manglem Singh
Roles: Supervision, Validation, Writing – review & editing
Affiliation: National Institute of Technology, Manipur, India
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
[/RAW_REF_TEXT]
1. Martínez Torres J., Iglesias Comesaña C. & García-Nieto P.J. Review: machine learning techniques applied to cybersecurity. Int. J. Mach. Learn. & Cyber. 10, 2823–2836 (2019).
2. Bhakta, D., Yousuf, M.A., Rana, M.S. (2023). Android Malware Detection Against String Encryption Based Obfuscation. In: Kumar, S., Sharma, H., Balachandran, K., Kim, J.H., Bansal, J.C. (eds) Third Congress on Intelligent Systems. CIS 2022. Lecture Notes in Networks and Systems, vol 613. Springer, Singapore. https://doi.org/10.1007/978-981-19-9379-4_39.
3. Sankara Rao P., Parida Priyadarsan, Sahu Gupteswar, Dash Sonali, A multi-view human gait recognition using hybrid whale and gray wolf optimization algorithm with a random forest classifier, Image and Vision Computing, Volume 136, 2023, 104721, ISSN 0262-8856,
4. Attar, Abdol rahman, Moradi. Rad, Reza, Ebrahimi. Atani, Reza. A survey of image spamming & filtering techniques. Artificial Intelligence Review—AIR, 2011, 40. 1–35.
5. Krawetz. N.: A picture’s worth: Digital image analysis & forensics (August 2007), https://hackerfactor.com/papers/bh-usa-07-krawetz-wp.pdf (accessed on 12th October 2022).
6. Wang. X, Zhao. Y, Pourpanah F. Recent advances in deep learning. International Journal of Machine Learning & Cybernetics. 2020 Apr;11(4):747–50.
7. Mohanty Ashima Sindhu, Parida Priyadarsan & Patra Krishna Chandra (2022) ASD detection using an advanced deep neural network, Journal of Information and Optimization Sciences, 43:8, 2143–2152.
8. Gheisari, M., et al.: Deep learning: applications, architectures, models, tools, and frameworks: a comprehensive survey. CAAI Trans. Intell. Technol. 1–26 (2023). https://doi.org/10.1049/cit2.12180.
9. Ran, Q., et al.: Deep transformer and few-shot learning for hyperspectral image classification. CAAI Trans. Intell. Technol. 1–14 (2023). https://doi.org/10.1049/cit2.12181.
10. Yang Y, Song X. Research on face intelligent perception technology integrating deep learning under different illumination intensities. Journal of Computational and Cognitive Engineering. 2022 Jan 25;1(1):32–6.
11. Wan P, Uehara. M. Spam detection using Sobel operators & OCR. In 2012 26th International Conference on Advanced Information Networking & Applications Workshops, 2012 Mar 26 (pp. 1017–1022). IEEE.
12. Wan P, Uehara. M. Multiple Filters of Spam Using Sobel Operators & OCR. In 2012 Sixth International Conference on Complex, Intelligent, & Software Intensive Systems, 2012 Jul 4 (pp. 164–169). IEEE.
13. Yamakawa. D, Yoshiura N. Applying Tesseract-OCR to Detection of Image Spam Mails. In 2012 14th Asia-Pacific Network Operations & Management Symposium (APNOMS) 2012 Sep 25 (pp. 1–4). IEEE.
14. Das. M, Bhomick A, Singh. YJ, Prasad V. A modular approach towards image spam filtering using multiple classifiers. In 2014 IEEE International Conference on Computational Intelligence & Computing Research, 2014 Dec 18 (pp. 1–8). IEEE.
15. M. RAZA, N. D. Jayasinghe and M. M. A. Muslam, "A Comprehensive Review on Email Spam Classification using Machine Learning Algorithms," 2021 International Conference on Information Networking (ICOIN), Jeju Island, Korea (South), 2021, pp. 327–332.
16. Makkar Aaisha, Kumar Neeraj, PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention, Future Generation Computer Systems, Volume 125, 2021, Pages 41–58, ISSN 0167-739X,
17. Dredze. M, Gevaryahu R, Elias-Bachrach A. Learning Fast Classifiers for Image Spam. In CEAS 2007 Aug 2 (pp. 2007–487). https://www.cs.jhu.edu/~mdredze/datasets/image_spam/.
18. Gao. Y, Yang M, Zhao. X, Pardo B, Wu Y, Pappas TN, Choudhary A. Image spam hunter. In 2008 IEEE international conference on acoustics, speech & signal processing, 2008 March 31 (pp. 1765–1768). IEEE. https://users.cs.northwestern.edu/~yga751/ML/ISH.htm#dataset.
19. Gao. Y, Choudhary. A. Active Learning Image Spam Hunter. In International Symposium on Visual Computing, 2009 Nov 30 (pp. 293–302). Springer, Berlin, Heidelberg.
20. Gao. Y, Yang M, Choudhary A. Semi supervised Image Spam Hunter: A regularized discriminant EM Approach. In International Conference on Advanced Data Mining and Applications, 2009 Aug 17 (pp. 152–164). Springer, Berlin, Heidelberg.
21. He P, Wen X, Zheng W. A simple method for filtering image spam. In 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science, 2009 Jun 1 (pp. 910–913). IEEE.
22. Wang Z, Josephson WK, Lv Q, Charikar M, Li K. Filtering image spam with near-duplicate detection. In CEAS 2007 Aug 2.
23. Soranamageswari M, Meena C. Statistical feature extraction for classification of image spam using artificial neural networks. In 2010 second international conference on machine learning and computing, 2010 Feb 9 (pp. 101–105). IEEE.
24. Gao Y, Choudhary A, Hua G. A comprehensive approach to image spam detection: from server to client solution. IEEE Transactions on Information Forensics and Security. 2010 Sep 27;5(4):826–36.
25. Win ZM, Aye N. Detecting image spam based on file properties, histogram and Hough transform. Journal of Advances in Computer Networks. 2014 Dec;2(4):287–92.
26. Wang C, Zhang F, Li F, Liu Q. Image spam classification based on low-level image features. In 2010 International Conference on Communications, Circuits and Systems (ICCCAS) 2010 Jul 28 (pp. 290–293). IEEE.
27. Gupta A, Singhal C, Aggarwal S. Identification of image spam by using low level & metadata features. International Journal of Network Security & ITS Applications. 2012 Mar 1;4(2):163.
28. Kumaresan T, Sanjushree S, Suhasini K, Palanisamy C. Image spam filtering using support vector machine and particle swarm optimization. International Journal Computer Application. 2015, 1:17–21.
29. Liu TJ, Tsao WL, Lee CL. A high performance image-spam filtering system. In 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2010 Aug 10 (pp. 445–449). IEEE.
30. Al-Duwairi B, Khater I, Al-Jarrah O. Texture analysis-based image spam filtering. In 2011 International Conference for Internet Technology and Secured Transactions, 2011 Dec 11 (pp. 288–293). IEEE.
31. Al-Duwairi B, Khater I, Al-Jarrah O. Detecting Image Spam using Image Texture Features. International Journal for Information Security Research (IJISR). 2012 Sep;2(3/4):344–53.
32. Kumar P, Biswas M. SVM with Gaussian kernel-based image spam detection on textual features. In 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), 2017 Feb 9 (pp. 1–6). IEEE.
33. Qian X, Zhang W, Zhang Y, Zhou G, Wang Z. Detecting image spam based on k-labels propagation model. In 2013 10th Web Information System and Application Conference, 2013 Nov 10 (pp. 170–175). IEEE.
34. Xu C, Chen Y, Chiew K. An Approach to Image Spam Filtering based on Base64 Encoding and N–Gram feature extraction. In 2010 22nd IEEE International Conference on Tools with Artificial Intelligence, 2010 Oct 27 (Vol. 1, pp. 171–177). IEEE.
35. Yuan S, Zhang C. An improved multiple features fusion method for image spam filtering. In 2016 3rd International Conference on Information Science and Control Engineering (ICISCE), 2016 Jul 8 (pp. 200–203). IEEE.
36. Annadatha A, Stamp M. Image spam analysis and detection. Journal of Computer Virology and Hacking Techniques. 2018 Feb;14(1):39–52.
37. Aneri Chavda, Katerina Potika, Fabio Di Troia, and Mark Stamp. Support Vector Machines for Image Spam Analysis. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications—Volume 1: BASS, 2018, 431–441. https://doi.org/10.5220/0006921404310441.
38. S. Sriram, R. Vinayakumar, V. Sowmya, Moez Krichen, Dhouha Ben Noureddine, A. Shashank, K.P. Soman. Deep Convolutional Neural Networks for Image Spam Classification. 2020. hal-02510594.
39. A.Buboo Singh, Kh.Manglem Singh, Y.Jina Chanu, Khelchandra Thongam, and Kh. Johnson Singh, An improved image spam classification model based on deep learning techniques, Security and Communication Networks, 2022, 1–11.
40. Dash, Sonali & Parida, Priyadarsan & Mohanty, Jnyana. (2023). Illumination robust deep convolutional neural network for medical image classification. Soft Computing. 1–13.
41. N. B. A. Warif, M. Y. I. Idris, A. W. A. Wahab and R. Salleh, "An evaluation of Error Level Analysis in image forensics," 2015 5th IEEE International Conference on System Engineering and Technology (ICSET), 2015, pp. 23–28.
42. R. afique, M. Nawaz, H. Kibriya and M. Masood, "DeepFake Detection Using Error Level Analysis and Deep Learning," 2021 4th International Conference on Computing & Information Sciences (ICCIS), 2021, pp. 1–4.
43. Sri C. G., Bano S., Deepika T., Kola N. and Pranathi Y. L., "Deep Neural Networks Based Error Level Analysis for Lossless Image Compression Based Forgery Detection," 2021 International Conference on Intelligent Technologies (CONIT), 2021, pp. 1–8.
44. S. Cha, U. Kang and E. Choi, "The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk)," 2018 International Conference on Software Security and Assurance (ICSSA), 2018, pp. 82–85.
45. Kolesnikov, Alexander, Lucas Beyer, Xiaohua Zhai, Joan Puigcerver, Jessica Yung, Sylvain Gelly and Neil Houlsby. “Big Transfer (BiT): General Visual Representation Learning.” European Conference on Computer Vision (2019).
46. Javid AM, Das S, Skoglund M, Chatterjee S. A Relu Dense Layer to improve the performance of Neural Networks. In ICASSP 2021–2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP,) 2021 Jun 6 (pp. 2810–2814). IEEE.
47. OpenCV. https://opencv.org/ (accessed on 12 May 2020).
48. Chollet, F. Keras: The Python Deep Learning library. https://keras.io/ (accessed on 12 May 2020).
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 Singh, Singh. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Image spam is a type of spam that contains text information inserted in an image file. Traditional classification systems based on feature engineering require manual extraction of certain quantitative and qualitative image features for classification. However, these systems are often not robust to adversarial attacks. In contrast, classification pipelines that use convolutional neural network (CNN) models automatically extract features from images. This approach has been shown to achieve high accuracies even on challenge datasets that are designed to defeat the purpose of classification. We propose a method for improving the performance of CNN models for image spam classification. Our method uses the concept of error level analysis (ELA) as a pre-processing step. ELA is a technique for detecting image tampering by analyzing the error levels of the image pixels. We show that ELA can be used to improve the accuracy of CNN models for image spam classification, even on challenge datasets. Our results demonstrate that the application of ELA as a pre-processing technique in our proposed model can significantly improve the results of the classification tasks on image spam datasets.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





