Review Article
Phishing Detection: Analysis of Visual Similarity Based Approaches
Table 2
Comparison of visual features based approaches.
| Approach | Zero-hour protection | Embedded object | Language independence | Partially copied webpage | DNS attack |
| Visual signature [66] | No | No | No | No | No | Site signature [67] | No | Yes | No | Yes | No | PhishZoo [68] | No | Yes | Yes | Yes | No |
|
|