Two complementary techniques for digitized document analysis
DOCPROCS '88 Proceedings of the ACM conference on Document processing systems
ACM Computing Surveys (CSUR)
Preliminary investigation of techniques for automated reading of unformatted text
Communications of the ACM
Comparison of texts streams in the presence of mild adversaries
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Communications of the ACM - Next-generation cyber forensics
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Detecting spam web pages through content analysis
Proceedings of the 15th international conference on World Wide Web
Invasive browser sniffing and countermeasures
Proceedings of the 15th international conference on World Wide Web
Detecting semantic cloaking on the web
Proceedings of the 15th international conference on World Wide Web
Why spoofing is serious internet fraud
Communications of the ACM
Communications of the ACM
Protecting Users against Phishing Attacks
The Computer Journal
The effects of online advertising
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Learning to detect phishing emails
Proceedings of the 16th international conference on World Wide Web
Spam Filtering Using Statistical Data Compression Models
The Journal of Machine Learning Research
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
The Journal of Machine Learning Research
The Emperor's New Security Indicators
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Communications of the ACM
An Interactive System for Reading Unformatted Printed Text
IEEE Transactions on Computers
Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics)
Detecting image spam using visual features and near duplicate detection
Proceedings of the 17th international conference on World Wide Web
A literature review and classification of recommender systems research
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Hidden salting in digital media involves the intentional addition or distortion of content patterns with the purpose of content filtering. We propose a method to detect portions of a digital text source which are invisible to the end user, when they are rendered on a visual medium (like a computer monitor). The method consists of "tapping" into the rendering process and analyzing the rendering commands to identify portions of the source text (plaintext) which will be invisible for a human reader, using criteria based on text character and background colors, font size, overlapping characters, etc. Moreover, text deemed visible (covertext) is reconstructed from rendering commands and then the character reading order is identified, which could differ from the rendering order. The detection and resolution of hidden salting is evaluated on two e-mail corpora, and the effectiveness of this method in spam filtering task is assessed. We provide a solution to a relevant open problem in content filtering applications, namely the presence of tricks aimed at circumventing automatic filters.