Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 1 , PP: 62-76, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques

Himani Jain 1 , Amit Dixit 2 , Aditi Sharma 3 *

  • 1 Quantum University, Roorkee, Uttarakhand Ph.D. Scholar, India; Department of MCA, ABES Engineering College, Ghaziabad, Uttar Pradesh, India - (himanijain1987ap@gmail.com)
  • 2 Dean Research Quantum University, Roorkee, Uttarakhand, India - (dixitamit777@gmail.com)
  • 3 Department of Computer Sc. and Eng., Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, India - (aditi.sharma@ieee.org)
  • Doi: https://doi.org/10.54216/JCIM.150106

    Received: January 29, 2024 Revised: April 28, 2024 Accepted: July 24, 2024
    Abstract

    Image spam involves the practice of concealing text within an image.  Various machine-learning techniques are used to categories image spam, utilizing a wide range of features extracted from the images.   Convolutional neural networks (CNNs) are commonly used for image classification and feature extraction tasks because of their outstanding performance. In this study, our focus is to analyses image spam using a CNN model that incorporates deep learning techniques. This model has been meticulously fine-tuned and optimized to deliver exceptional performance in both feature extraction and classification tasks. In addition, we performed comparative evaluations of our model on different image spam datasets that were specifically created to make the classification task more challenging. The results we obtained show a significant improvement in classification accuracy compared to other methods used on the same datasets.

    Keywords :

    Deep Learning , Image Spam , Spam Detection , CNN , Social Sites

    References

    [1]       N. M. AlShariah and A. K. Jilani Saudagar, “Detecting fake images on social media using machine learning,” Int. J. Adv. Comput. Sci. Appl., 2019, doi: 10.14569/ijacsa.2019.0101224.

    [2]       V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, “Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey,” IEEE Access, 2020, doi: 10.1109/ACCESS.2020.3022661.

    [3]       S. Aphiwongsophon and P. Chongstitvatana, “Detecting fake news with machine learning method,” in ECTI-CON 2018 - 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2019. doi: 10.1109/ECTICon.2018.8620051.

    [4]       F. Aiwan and Y. Zhaofeng, “Image spam filtering using convolutional neural networks,” Pers. Ubiquitous Comput., 2018, doi: 10.1007/s00779-018-1168-8

    [5]       A. M, R. P, S. R, and K. S, “A secure model on Advanced Fake Image-Feature Network (AFIFN) based on deep learning for image forgery detection,” Pattern Recognit. Lett., 2021, doi: 10.1016/j.patrec.2021.10.011

    [6]       S. T. Suganthi et al., “Deep learning model for deep fake face recognition and detection,” PeerJ Comput. Sci., 2022, doi: 10.7717/PEERJ-CS.881.

    [7]       A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” Commun. ACM, 2017, doi: 10.1145/3065386.

    [8]       G. Choudhary, V. Sharma, I. You, K. Yim, I. R. Chen, and J. H. Cho, “Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey,” in 2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018, 2018. doi: 10.1109/IWCMC.2018.8450305.

    [9]       T. Sharmin, F. Di Troia, K. Potika, and M. Stamp, “Convolutional neural networks for image spam detection,” Inf. Secur. J., 2020, doi: 10.1080/19393555.2020.1722867.

    [10]    N. Imam and V. G. Vassilakis, “Detecting spam images with embedded Arabic text in twitter,” in 2019 International Conference on Document Analysis and Recognition Workshops, ICDARW 2019, 2019. doi: 10.1109/ICDARW.2019.50107.

    [11]    M. Mateen, M. A. Iqbal, M. Aleem, and M. A. Islam, “A hybrid approach for spam detection for Twitter,” in Proceedings of 2017 14th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2017, 2017. doi: 10.1109/IBCAST.2017.7868095.

    [12]    A. Annadatha and M. Stamp, “Image spam analysis and detection,” J. Comput. Virol. Hacking Tech., 2018, doi: 10.1007/s11416-016-0287-x.

    [13]    C. Fatichah, W. F. Lazuardi, D. A. Navastara, N. Suciati, and A. Munif, “Image spam detection on instagram using convolutional neural network,” in Lecture Notes in Networks and Systems, 2019. doi: 10.1007/978-981-13-6031-2_19.

    [14]    Bhatnagar, Amrita. , Giri, Arun. , Sharma, Aditi. A Hybrid Intrusion Detection Approach for Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, vol. 13, no. 2, 2024, pp. 08-18. DOI: https://doi.org/10.54216/JCIM.130201

    [15]    B. Kim, S. Abuadbba, and H. Kim, “DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2020. doi: 10.1007/978-3-030-55304-3_24.

    [16]    A. Amir, B. Srinivasan, and A. I. Khan, “Distributed classification for image spam detection,” Multimed. Tools Appl., 2018, doi: 10.1007/s11042-017-4944-y.

    [17]    T. C. Lu, “CNN Convolutional layer optimisation based on quantum evolutionary algorithm,” Conn. Sci., 2021, doi: 10.1080/09540091.2020.1841111.

    [18]    D. H. Kim and H. Y. Lee, “Image manipulation detection using convolutional neural network,” Int. J. Appl. Eng. Res., 2017.

    [19]    A. Neisari, L. Rueda, and S. Saad, “Spam review detection using self-organizing maps and convolutional neural networks,” Comput. Secur., 2021, doi: 10.1016/j.cose.2021.102274.

    [20]    A. Choudhary, A. Tripathi, A. Sharma and R. Singh, "Evolution and comparative analysis of different Cloud Access Security Brokers in current era," 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 2022, pp. 36-43, doi: 10.1109/ICFIRTP56122.2022.10059416.

    [21]    V. Sreenivasulu and M. A. Wajeed, “Image based classification of rumor information from the social network platform,” Trait. du Signal, 2021, doi: 10.18280/ts.380516.

    [22]    Ashish Dixit, R. P. Aggarwal, B. K. Sharma, Aditi Sharma. (2023). Safeguarding Digital Essence: A Subband DCT Neural Watermarking Paradigm Leveraging GRNN and CNN for Unyielding Image Protection and Identification. Journal of Journal of Intelligent Systems and Internet of Things, 10 ( 1 ), 33-47 (Doi : https://doi.org/10.54216/JISIoT.100103)

    [23]    V. Gupta, N. Kumar, A. Sharma and A. Abraham, "Sensor Routing Protocol with Optimized Delay and Overheads in Mobile based WSN", Journal of Information Assurance & Security, vol. 16, no. 4, 2021.

    [24]    K. V. Samarthrao and V. M. Rohokale, “Enhancement of email spam detection using improved deep learning algorithms for cyber security,” J. Comput. Secur., 2022, doi: 10.3233/JCS-200111.

    [25]    G. Stringhini et al., “Follow the green: Growth and dynamics in Twitter follower markets,” in Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 2013. doi: 10.1145/2504730.2504731.

    [26]    R. Asif and M. A. Islam, “Finding most collaborating mathematicians a co-Author network analysis of mathematics domain,” in 2016 International Conference on Computing, Electronic and Electrical Engineering, ICE Cube 2016 - Proceedings, 2016. doi: 10.1109/ICECUBE.2016.7495240.

    [27]    J. Hussain and M. A. Islam, “Evaluation of graph centrality measures for tweet classification,” in 2016 International Conference on Computing, Electronic and Electrical Engineering, ICE Cube 2016 - Proceedings, 2016. doi: 10.1109/ICECUBE.2016.7495209.

    [28]    Q. Li, Z. Qin, L. Chai, H. Zhang, J. Guo, and B. Bhanu, “Representative reference-set and betweenness centrality for scene image categorization,” in 2013 IEEE International Conference on Image Processing, ICIP 2013 - Proceedings, 2013. doi: 10.1109/ICIP.2013.6738670.

    [29]    Jiang Li, William Rich, Donald Buhl-Brown,"Texture Analysis of Remote Sensing Imagery with Clustering and Bayesian Inference", IJIGSP, vol.7, no.9, pp.1-10, 2015.DOI: 10.5815/ijigsp.2015.09.01

    [30]  Cariow, A.; Papli  ́nski, J.P.;Makowska, M. VLSI-FriendlyFiltering Algorithms for Deep NeuralNetworks. Appl. Sci. 2023, 13, 9004.https://doi.org/10.3390/app13159004

    Cite This Article As :
    Jain, Himani. , Dixit, Amit. , Sharma, Aditi. Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 62-76. DOI: https://doi.org/10.54216/JCIM.150106
    Jain, H. Dixit, A. Sharma, A. (2025). Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques. Journal of Cybersecurity and Information Management, (), 62-76. DOI: https://doi.org/10.54216/JCIM.150106
    Jain, Himani. Dixit, Amit. Sharma, Aditi. Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques. Journal of Cybersecurity and Information Management , no. (2025): 62-76. DOI: https://doi.org/10.54216/JCIM.150106
    Jain, H. , Dixit, A. , Sharma, A. (2025) . Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques. Journal of Cybersecurity and Information Management , () , 62-76 . DOI: https://doi.org/10.54216/JCIM.150106
    Jain H. , Dixit A. , Sharma A. [2025]. Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques. Journal of Cybersecurity and Information Management. (): 62-76. DOI: https://doi.org/10.54216/JCIM.150106
    Jain, H. Dixit, A. Sharma, A. "Detecting Image Spam on Social Media Platforms Using Deep Learning Techniques," Journal of Cybersecurity and Information Management, vol. , no. , pp. 62-76, 2025. DOI: https://doi.org/10.54216/JCIM.150106