Review Article
Phishing Detection: Analysis of Visual Similarity Based Approaches
Table 3
Analysis of pixel based techniques on various attacks.
| Approach | Zero-hour protection | Embedded object | Language independence | Partially copied webpage | DNS attack |
| Discriminative keypoint features [72] | × | √ | × | × | × | Goldphish [73] | √ | √ | × | √ | × | Dynamic watermarking [74] | × | √ | × | × | × | Image layout analysis based approach [75] | × | √ | × | × | × | Earth Mover’s Distance [77] | × | √ | √ | × | × | Unknown victim information [70] | × | √ | × | × | × |
|
|