Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Algorithm 2

Algorithm for searching and storing images in database (image seek) [70].
(1)  imgSeek(, , , )
(2)  if (Similarity(, ) > threshold)
(3)   if (domain() = domain())  then return(“Legitimate”)
(4)   else return(“Phishing”)
(5)   end if
(8)  else
(9)  store_Database(, domain(), Unknown)
(10) end if