
used the NB and DT classifiers on emails that went
through the OCR after rendering and capturing, both
classifiers demonstrated a remarkable performance
improvement. The adaptation of OCR technology
appeared to enhance the classifier’s ability to dis-
cern spam characteristics within the text, showcas-
ing the versatility of the NB and DT classifiers in
the context of our VBSF’s first pipeline. This nu-
anced observation underscores the importance of tai-
loring spam filters to the unique characteristics of the
dataset at hand, optimizing their performance for di-
verse sources and formats of email content.
Now, we assess the performance of the VBSF
solution. Table 2 shows the test accuracy of the
meta classifier after augmenting the first pipeline of
the VBSF. Several meta-classifiers underwent test-
ing, again, among which LR produced superior per-
formance compared to others reaching more than
98% accuracy, hence it was selected as the preferred
choice.
Through experimentation and evaluation, we ob-
served a remarkable increase in testing accuracy. The
integration of the DT classifier proved to be par-
ticularly impactful, contributing to a significant en-
hancement in predictive performance. These find-
ings underscore the importance of model composi-
tion and the value of incorporating diverse classifiers
to achieve superior results. Our enhanced variant of
VBSF represents a promising advancement in predic-
tive modeling, offering a pathway for further refine-
ment and optimization of our approach.
6 CONCLUSIONS
We have proposed a new approach to detect emails
that use visual tricks (or hidden salting tricks)and
HTML-related tricks, to convey spam messages to
end users. By employing a multi-step process imitat-
ing the natural processing of visual information by the
human eye, alongside text extraction of email snap-
shots using OCR followed by textual content classi-
fication using an NB classifier, augmented by a DT
classifier, our system efficiently cleans and analyzes
email text content. Moreover, integrating a CNN as
a visual perception classification model enhances the
system’s ability to discern between spam and legiti-
mate emails based on visual features and cues.
A remarkable strength of our proposed solution
lies in its adaptability to the dynamic nature of spam-
ming techniques, especially the visual ones. The pro-
posed model includes parsing all HTML tags and for-
matting the content according to their specifications.
Whether it’s normal content, known spam content
hiding tricks, or crafty spam tactics, all elements are
visually visible and ready for further investigation. By
integrating text-based and image-based classifiers in a
meta-classifier using stacking ensemble learning, our
system achieves a very good final classification accu-
racy exceeding 98%. This holistic approach enhances
both the accuracy and the resilience against evolving
spam tactics.
REFERENCES
Bergholz, A., Paass, G., Reichartz, F., Strobel, S., Moens,
M.-F., and Witten, B. (2008). Detecting known and
new salting tricks in unwanted emails. In Proc. Fifth
Conference on Email and Anti-Spam (CEAS), vol-
ume 9.
Biggio, B., Fumera, G., Pillai, I., and Roli, F. (2007). Im-
age spam filtering using visual information. In Proc.
Int. Conf. on Image Analysis and Processing (ICIAP
2007), pages 105–110.
Freund, Y. and Schapire, R. E. (1997). A decision-theoretic
generalization of on-line learning and an application
to boosting. Journal of Computer and System Sci-
ences, 55(1):119–139.
Gibson, S., Issac, B., Zhang, L., and Jacob, S. M. (2020).
Detecting spam email with machine learning op-
timized with bio-inspired metaheuristic algorithms.
IEEE Access, 8:187914–187932.
J
´
a
˜
nez-Martino, F., Alaiz-Rodr
´
ıguez, R., Gonz
´
alez-Castro,
V., Fidalgo, E., and Alegre, E. (2023). A review of
spam email detection: analysis of spammer strategies
and the dataset shift problem. Artificial Intelligence
Review, 56(2):1145–1173.
Karim, A., Azam, S., Shanmugam, B., and Kannoorpatti, K.
(2021). An unsupervised approach for content-based
clustering of emails into spam and ham through multi-
angular feature formulation. IEEE Access, 9:135186–
135209.
Moens, M.-F., De Beer, J., Boiy, E., and Gomez, J. C.
(2010). Identifying and resolving hidden text salt-
ing. IEEE Trans. on Info. Forensics and Security,
5(4):837–847.
Naiemi, F., Ghods, V., and Khalesi, H. (2019). An ef-
ficient character recognition method using enhanced
HOG for spam image detection. Soft Computing,
23(22):11759–11774.
Nam, S.-G., Jang, Y., Lee, D.-G., and Seo, Y.-S. (2022). Hy-
brid features by combining visual and text information
to improve spam filtering performance. Electronics,
11(13).
Rizky, A. F., Yudistira, N., and Santoso, E. (2023). Text
recognition on images using pre-trained CNN. arXiv.
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., and
Xu, M. (2020). A survey on machine learning tech-
niques for cyber security in the last decade. IEEE Ac-
cess, 8:222310–222354.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
304