Soft Computing

, Volume 21, Issue 3, pp 753–763

An intelligent character recognition method to filter spam images on cloud

  • Jun Chen
  • Hong Zhao
  • Jufeng Yang
  • Jian Zhang
  • Tao Li
  • Kai Wang
Methodologies and Application

DOI: 10.1007/s00500-015-1811-5

Cite this article as:
Chen, J., Zhao, H., Yang, J. et al. Soft Comput (2017) 21: 753. doi:10.1007/s00500-015-1811-5
  • 133 Downloads

Abstract

Cloud storage has become an important way for data sharing in recent years. Data protection for data owner and harmful data filtering for data recipients are two non-negligible problems in cloud storage. Illegal or unsuitable messages on cloud have a negative impact on minors and they are easily converted into images to avoid text-based filtering. To detect the spam image with the embedded harmful messages on cloud, soft computing methods are required for intelligent character recognition. HOG, proposed by Dalal and Triggs, has been demonstrated so far to be one of the best features for intelligent character recognition. A pre-defined sliding window is always used for the generation of candidate character images when HOG is applied to recognize the whole word. However, due to the difference in character sizes, the pre-defined window cannot exactly match with each character. Variations on scale and translation usually occur in the character image to be recognized, which have a great influence on the performance of intelligent character recognition. Aiming to solve this problem, STRHOG, an extended version of HOG, is proposed in this paper. Experiments on two public datasets and one our dataset have shown encouraging results for our work. The improved intelligent character recognition is helpful for filtering spam images on cloud. To make a fair comparison with other methods, nearest neighbor classifier is used for the intelligent character recognition. It is expected that the performance should be further improved by using better classifiers such as fuzzy neural network.

Keywords

Intelligent character recognition Soft computing Spam image Data sharing Cloud storage 

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Jun Chen
    • 1
  • Hong Zhao
    • 1
  • Jufeng Yang
    • 1
  • Jian Zhang
    • 1
  • Tao Li
    • 1
  • Kai Wang
    • 1
  1. 1.College of Computer and Control EngineeringNankai UniversityTianjinPeople’s Republic of China