Review Article
Phishing Detection: Analysis of Visual Similarity Based Approaches
Algorithm 2
Algorithm for searching and storing images in database (image seek) [
70].
(1) imgSeek(, , , ) | (2) if (Similarity(, ) > threshold) | (3) if (domain() = domain()) then return(“Legitimate”) | (4) else return(“Phishing”) | (5) end if | (8) else | (9) store_Database(, domain(), Unknown) | (10) end if |
|