Abstracto

Identifying and Restricting Abusive Images in Emails

G.V.Hindumathi, M.Sandhya, K.Sudha3, P.Sravya

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: Some people are sending attachments through emails like spam mails and some fraud images .In this project we check the mail before sending it to the receiver mail id for the fraud images using “Skin Detection Algorithm” and also identify the spam mails. If any fraud images and spam mails are identified then the IP address and physical location of that sender is identified by a third party application. This ethical hacking technique is effectively used for identifying the location of the spam mail. After identifying the sender of the mail, discard the mail and send some warning message to that sender mail id. If that mail doesnâ�?�?t contain any spam files or abusive images, send it to the receiver mail id.