SlideShare a Scribd company logo
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
Convolutional Neural Network Based Text Steganalysis
In this paper author is proposing concept for Steganalysis on text using
Convolution Neural Networks (CNN). Steganalysis is the process of
detecting hidden text from text cover. All existing text Steganalysis
using manually hand crafted features with SVM algorithm for detection
but this technique detection accuracy is very less. To increase
Steganalysis accuracy author is using CNN Machine Learning
algorithm.
In CNN we will train neural network using word embedding
(Converting documents into integer representation vector) features
vector from documents. Below is the example to generate vector from
document
Example we have 3 documents
Document 1) Apple a day keep doctor away
Document 2) Shipment of gold damaged in a fire
Document 3) Apple good for health
From above 3 documents we will extract all unique words and put in
vector column header
Apple day doctor away shipment gold damaged fire health good
In above text all bold names are the vector column header and all this
column header values will maintain count of each word. In above 3
documents apple appear 1 time in document 1 and we put 1 in vector.
See below example
Apple day doctor away shipment gold damaged fire health good
1 1 1 1 0 0 0 0 0 0
0 0 0 0 1 1 1 1 0 0
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
1 0 0 0 0 0 0 0 1 1
In above vector all 3 documents converted to integer representation
in vector we put value 1 if word appear in that row document and 0 if
not appear. Some time we will put count of each words in that vector.
So above vector will be passed to CNN for training purpose and after
training CNN model we can give test input values and then CNN apply
test input values on trained model to get it predicted class.
In propose work also we will build embedding vector with all non-steg
and steg sentences and then build CNN training model. This model
later will applied on new sentences to check whether that sentence
contain steg or non-steg words. To implement this project we are
using some non-steg sentences from GUTENBERG dataset and we got
some steg sentences from T-Lex website. Below are the non-steg
sentences
‘Kolkata is a nice little city’ is a non-steg sentence and by manipulating
main words with synonyms or adjectives or adverbs they will convert
non-steg text to steg text. After applying stegnography on above
sentence we will get ‘Kolkata is a good miniscule metropolis’. So by
using above type of non-steg and steg sentences we will build CNN
model.
We are building CNN model with below steg sentences
‘Kolkata is a nice little city’ non-steg
‘Kolkata is a good miniscule metropolis’ steg
‘Hansel and Gretel are the young children of a poor woodcutter’ non-
steg
‘Hansel and Gretel are the little children of a unfortunate woodcutter’
steg
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
Non-steg sentence we are taking from GUTENBERG dataset.
Screen shot
Double click on ‘run.bat’ file to get below screen
In above screen click on ‘Upload Text File with Sentences’ button to
upload dataset
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen I am uploading ‘Gutenberg dataset’ and after
uploading dataset will get below screen
In above screen click on ‘Preprocess and Convert Text To indexes’
button to apply preprocessing such as removing stopwords, special
symbols and digits etc. Then build vector from sentences
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen all sentences from dataset converted to vector. Now
click on ‘Run CNN Algorithm Embeded Words’ button to convert
above words vector to integer vector and then apply CNN model on
that vector to generate train model
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen after applying CNN we got integer vector from text
vector and then we are seeing accuracy of propose LC-CNN work as
100%. We can see CNN model details in below screen
In above console screens we can see we generated CNN model with
multiple embedding vectors. After building model click on ‘Predict
Steg Analsysis from sentence’ button to enter sentence and then
identify whether sentence contains steg or non-steg words
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above screen dialog I entered one sentence and below is the result
In above screen in text area we can see the sentences result as
sentence contains no steg text. Now enter other sentence and test
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
in above screen I entered other sentence and below is the result
In above screen in selected text we got message as sentence contains
‘steg text’. Now click on ‘Accuracy Graph’ button to see accuracy
between propose LC-CNN and existing algorithm
Venkat Java Projects
Mobile:+91 9966499110
Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com
In above graph x-axis represents algorithm name and y-axis represents
Accuracy. From above graph we can conclude propose LC-CNN got
better accuracy compare to existing L-TEX algorithm.

More Related Content

Similar to Convolutional Neural Network Based Text Steganalysis Complete screens

Similar to Convolutional Neural Network Based Text Steganalysis Complete screens (20)

Deep clue visual interpretation of text based deep stock prediction
Deep clue visual interpretation of text based deep stock predictionDeep clue visual interpretation of text based deep stock prediction
Deep clue visual interpretation of text based deep stock prediction
 
Date fruit classification for robotic harvesting in a natural environment usi...
Date fruit classification for robotic harvesting in a natural environment usi...Date fruit classification for robotic harvesting in a natural environment usi...
Date fruit classification for robotic harvesting in a natural environment usi...
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application4.detection of fake news through implementation of data science application
4.detection of fake news through implementation of data science application
 
Image classification using cnn (convolution neural networks) algorithm
Image classification using cnn (convolution neural networks) algorithmImage classification using cnn (convolution neural networks) algorithm
Image classification using cnn (convolution neural networks) algorithm
 
Deep learning for smartphone based malaria parasite detection in thick blood ...
Deep learning for smartphone based malaria parasite detection in thick blood ...Deep learning for smartphone based malaria parasite detection in thick blood ...
Deep learning for smartphone based malaria parasite detection in thick blood ...
 
Automating e government using ai
Automating e government using aiAutomating e government using ai
Automating e government using ai
 
Comparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosisComparison of machine learning methods for breast cancer diagnosis
Comparison of machine learning methods for breast cancer diagnosis
 
Opinion mining for feedback management system screenshots
Opinion mining for feedback management system screenshotsOpinion mining for feedback management system screenshots
Opinion mining for feedback management system screenshots
 
A local metric for defocus blur detection cnn feature learning screenshots
A local metric for defocus blur detection   cnn feature learning screenshotsA local metric for defocus blur detection   cnn feature learning screenshots
A local metric for defocus blur detection cnn feature learning screenshots
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithms
 
Software defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithmsSoftware defect estimation using machine learning algorithms
Software defect estimation using machine learning algorithms
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance system
 
Recommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance systemRecommender system with artificial intelligence for fitness assistance system
Recommender system with artificial intelligence for fitness assistance system
 
Exploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methodsExploring trajectory prediction through machine learning methods
Exploring trajectory prediction through machine learning methods
 
A knowledge based recommendation system that includes sentiment analysis and ...
A knowledge based recommendation system that includes sentiment analysis and ...A knowledge based recommendation system that includes sentiment analysis and ...
A knowledge based recommendation system that includes sentiment analysis and ...
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
A hierarchical attention model for social contextual image recommendation
A hierarchical attention model for social contextual image recommendationA hierarchical attention model for social contextual image recommendation
A hierarchical attention model for social contextual image recommendation
 
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
 
Forecasting crude oil prices a deep learning based model
Forecasting crude oil prices a deep learning based modelForecasting crude oil prices a deep learning based model
Forecasting crude oil prices a deep learning based model
 

More from Venkat Projects

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 

Recently uploaded

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Convolutional Neural Network Based Text Steganalysis Complete screens

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Convolutional Neural Network Based Text Steganalysis In this paper author is proposing concept for Steganalysis on text using Convolution Neural Networks (CNN). Steganalysis is the process of detecting hidden text from text cover. All existing text Steganalysis using manually hand crafted features with SVM algorithm for detection but this technique detection accuracy is very less. To increase Steganalysis accuracy author is using CNN Machine Learning algorithm. In CNN we will train neural network using word embedding (Converting documents into integer representation vector) features vector from documents. Below is the example to generate vector from document Example we have 3 documents Document 1) Apple a day keep doctor away Document 2) Shipment of gold damaged in a fire Document 3) Apple good for health From above 3 documents we will extract all unique words and put in vector column header Apple day doctor away shipment gold damaged fire health good In above text all bold names are the vector column header and all this column header values will maintain count of each word. In above 3 documents apple appear 1 time in document 1 and we put 1 in vector. See below example Apple day doctor away shipment gold damaged fire health good 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 1 0 0 0 0 0 0 0 1 1 In above vector all 3 documents converted to integer representation in vector we put value 1 if word appear in that row document and 0 if not appear. Some time we will put count of each words in that vector. So above vector will be passed to CNN for training purpose and after training CNN model we can give test input values and then CNN apply test input values on trained model to get it predicted class. In propose work also we will build embedding vector with all non-steg and steg sentences and then build CNN training model. This model later will applied on new sentences to check whether that sentence contain steg or non-steg words. To implement this project we are using some non-steg sentences from GUTENBERG dataset and we got some steg sentences from T-Lex website. Below are the non-steg sentences ‘Kolkata is a nice little city’ is a non-steg sentence and by manipulating main words with synonyms or adjectives or adverbs they will convert non-steg text to steg text. After applying stegnography on above sentence we will get ‘Kolkata is a good miniscule metropolis’. So by using above type of non-steg and steg sentences we will build CNN model. We are building CNN model with below steg sentences ‘Kolkata is a nice little city’ non-steg ‘Kolkata is a good miniscule metropolis’ steg ‘Hansel and Gretel are the young children of a poor woodcutter’ non- steg ‘Hansel and Gretel are the little children of a unfortunate woodcutter’ steg
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Non-steg sentence we are taking from GUTENBERG dataset. Screen shot Double click on ‘run.bat’ file to get below screen In above screen click on ‘Upload Text File with Sentences’ button to upload dataset
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen I am uploading ‘Gutenberg dataset’ and after uploading dataset will get below screen In above screen click on ‘Preprocess and Convert Text To indexes’ button to apply preprocessing such as removing stopwords, special symbols and digits etc. Then build vector from sentences
  • 5. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen all sentences from dataset converted to vector. Now click on ‘Run CNN Algorithm Embeded Words’ button to convert above words vector to integer vector and then apply CNN model on that vector to generate train model
  • 6. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen after applying CNN we got integer vector from text vector and then we are seeing accuracy of propose LC-CNN work as 100%. We can see CNN model details in below screen In above console screens we can see we generated CNN model with multiple embedding vectors. After building model click on ‘Predict Steg Analsysis from sentence’ button to enter sentence and then identify whether sentence contains steg or non-steg words
  • 7. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above screen dialog I entered one sentence and below is the result In above screen in text area we can see the sentences result as sentence contains no steg text. Now enter other sentence and test
  • 8. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com in above screen I entered other sentence and below is the result In above screen in selected text we got message as sentence contains ‘steg text’. Now click on ‘Accuracy Graph’ button to see accuracy between propose LC-CNN and existing algorithm
  • 9. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com In above graph x-axis represents algorithm name and y-axis represents Accuracy. From above graph we can conclude propose LC-CNN got better accuracy compare to existing L-TEX algorithm.