Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Table 3

Analysis of pixel based techniques on various attacks.

ApproachZero-hour protectionEmbedded objectLanguage independencePartially copied webpageDNS attack

Discriminative keypoint features [72]××××
Goldphish [73]××
Dynamic watermarking [74]××××
Image layout analysis based approach [75]××××
Earth Mover’s Distance [77]×××
Unknown victim information [70]××××