Home Page

VPN & Cryptography


Email & Spam

Security Topics


Email Spam

Zero Day Window


Bayesian Algorithm

Content and Connection control

Directory Harvesting Attacks

Email Encryption

Email Archiving

File attachments

Image scanning

Port forwarding and MX records

Reputation filters

Encrypted attachments

Grey Listing

Email Monitoring

Internal Email Security

Open Relay

Per user quarantine area

Reverse DNS lookup & SPF

RFC Compliant emails


Email Throttling

What is Spam

Whitelists and Blacklists



The importance of Image Scanning - Email Security Guide


Images can just as easily break laws, send out abusive immoral messages, offend staff and damage company reputation. Images coming from your company can make you liable to prosecution and attract unwanted media. Some firewall proxy servers support image scanning usually purchased as an additional subscription, which can detect pornography and other unsuitable material.

For example, a feature known as Image Manager by a security vendor known as Clearswift not only scans for images within the body of an email, but also scans for images deep within attached files, completely breaking them down extracting embedded images and passing them on to Image Manager to scan for unwanted images.

When Image Manager is scanning for images, it checks its pre-populated database. It checks the hash of the image and compares this hash with hashes within its database. These hashes within the database are a bulk of known images downloaded from Clearswift servers periodically.

If there is no match within the database then Image Manager scans the image and looks for certain characteristics within the image to classify it appropriately. These features and characteristics are compared to its built in image feature database. This database contains values for thousands of features, and if the feature matches with one in the database or even a close match, then appropriate action is taken depending on the classification of the matched feature within the database.

Further Reading

Wikipedia's guide to Spam Techniques