2018
DOI: 10.3166/isi.23.6.115-125
|View full text |Cite
|
Sign up to set email alerts
|

Different techniques for hiding the text information using text steganography techniques: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…A data classifier requires a choice of features that must be custom fitted independently for different issues [19] [20]. Following component determination, classifier improvement requires detachment of the data into preparing and test data and experiences two noteworthy periods of data classifier development as shown in the Figure 2.…”
Section: Fig 1: Schematic Classification Representationmentioning
confidence: 99%
See 1 more Smart Citation
“…A data classifier requires a choice of features that must be custom fitted independently for different issues [19] [20]. Following component determination, classifier improvement requires detachment of the data into preparing and test data and experiences two noteworthy periods of data classifier development as shown in the Figure 2.…”
Section: Fig 1: Schematic Classification Representationmentioning
confidence: 99%
“…The Bayesian system is additionally seen as a procedure in medical expectation Particular it has been used for Brest malignancy guess and determination [20]. In future we mean to plan and actualize such framework for online applications [21].…”
Section: Literature Workmentioning
confidence: 99%
“…The standard speck item can be invested to the exact portion kernel space by opening up the space [12].Direct component determination can be ideally performed in the limited dimensional experimental bit kernel space prompting ideal choice of relating unbounded dimensional kernel spaces. This is proportionate to ideal nonlinear choice of unique highlights in the info space that would have created those relating dimensional kernel spaces [13] [14].…”
Section: Fig 1: Kernel Function Flowmentioning
confidence: 99%
“…This oversampled informational index is then used by the classifier to take in a discriminative border between the two classes that isn't onesided because of class circulation in the informational collection. Cost-sensitive strategies in [15] and [16], then again, use an information subordinate cost framework either amid preparing or adjust a ultimate choice capacity [14].…”
Section: Nonlinear Separable Problemmentioning
confidence: 99%
“…We additionally consider the virtual machine screen programming and comprehend the extent of upgrade in the equivalent. Virtual machine the board utilizing programming segments are famous and exhibited utilizing numerous inquiries about [15]. The virtual machine screen or VMM are the product A Novel Hadoop Based Virtualization Automated Framework…”
Section: Introductionmentioning
confidence: 99%