SlideShare a Scribd company logo
1 of 13
Submitted by-
Abhishek Bansal
9911103404(F5)
Jaypee Institute of Information Technology, Noida
Introduction
Current Open Problem
Problem Statement
Background Study
Requirement Specification
Algorithms Used
Use Case Diagram
Limitations
Conclusion
Future Work
 Text substitution or textual obfuscation is the
art of substituting one word in place of some
another word. It helps in hiding the actual
meaning of the text. Text substitution means
replacing the words which attract attention
like threat or danger by words which are
normal and do not attract attention.
Substitution replaces words that are, or may
be, on the watch list by more innocuous
words, making the message seem more
“ordinary” and so likely to be not selected for
further analysis.
In the existing system, the mails are sent
to the authenticated users who are
intended to be received.
Some defects in existing system are-
 Suspicious mails cannot be detected.
 Offensive users cannot be identified.
To counter terrorism and to identify such
acts and prevent them from happening I
studied “Detecting word substitution in
text” through which the actual hidden
meaning of the message can be known.
List of all Sources
 Wikipedia
 IEEE Xplore Digital Library
 Acm digital library
 Springer Journals
 International Journal od Advanced
Research in Computer Science and
Software Engineering etc
Hardware requirements
Processor : Pentium 2.4 GHz or above
Memory : 256 MB RAM or above
Cache Memory: 128 KB or above
Hard Disk : 3 GB or above [at least 3mb of
free space required]
Software requirements
Operating System : Windows 7 and above
Fuzzy String Matching
Sentence Oddity
Cosine Similarity
Data base of suspicious words needs to be
updated regularly
Words are matched only for the ones
present in database.
Words are not checked in what context
they are written.
A target word is selected in a sentence to
check whether it has been substituted in
text or not.
 I was able to implement a system which blocks
emails that contains words which are not safe and
are harmful in nature by matching with the words
already present in the database and detecting
words which might have been replaced by some
other words to make the sentence normal. This
can be helpful in preventing activities which can
affect the society in a bad way. By analyzing the
emails which contain such words the information of
the person can also be obtained and illegal acts
can be prevented from happening.
 This application is capable of producing the
desired output. It currently uses words
already selected for checking whether it has
been substituted or not. And the current
system could also be made more accurate by
adding more words and updating the data
base regularly. Also some other features like
feature extraction can also be implemented
which will further help to classify the emails.
Using information science can further improve
the accuracy of the results.
THANK YOU

More Related Content

What's hot

Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - ExperimentsGaurav Marwaha
 
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...CSCJournals
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Fan Liang
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...cscpconf
 
Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341Editor IJARCET
 
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET Journal
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET Journal
 
Interpret gene expression results 2013
Interpret gene expression results 2013Interpret gene expression results 2013
Interpret gene expression results 2013Elsa von Licy
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searcheSAT Journals
 
Entity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutionsEntity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutionsPvrtechnologies Nellore
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAM Publications
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Wright State University, Dayton, OH, USA
 
Naming Disambiguation in Authors Database
Naming Disambiguation in Authors DatabaseNaming Disambiguation in Authors Database
Naming Disambiguation in Authors DatabaseMohammed Alsayyari
 
Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Ecway Technologies
 
An overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support SystemAn overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support SystemGan Keng Hoon
 

What's hot (19)

Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - Experiments
 
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
 
Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341
 
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & Autocorrection
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
Interpret gene expression results 2013
Interpret gene expression results 2013Interpret gene expression results 2013
Interpret gene expression results 2013
 
What is a spam ?
What is a spam ?What is a spam ?
What is a spam ?
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web search
 
Entity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutionsEntity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutions
 
TARANVEER_SINGH_CV
TARANVEER_SINGH_CVTARANVEER_SINGH_CV
TARANVEER_SINGH_CV
 
STTP_POSTER
STTP_POSTERSTTP_POSTER
STTP_POSTER
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam Mail
 
A017640107
A017640107A017640107
A017640107
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
Naming Disambiguation in Authors Database
Naming Disambiguation in Authors DatabaseNaming Disambiguation in Authors Database
Naming Disambiguation in Authors Database
 
Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...
 
An overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support SystemAn overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support System
 

Viewers also liked

School of social work faith based community collaborative visual
School of social work faith based community collaborative visualSchool of social work faith based community collaborative visual
School of social work faith based community collaborative visualjuanbtoribio
 
Resume - David Steele 14.05.15
Resume - David Steele 14.05.15Resume - David Steele 14.05.15
Resume - David Steele 14.05.15David Steele
 
Distribution part of scm ( supply chain management )
Distribution  part of scm ( supply chain management )Distribution  part of scm ( supply chain management )
Distribution part of scm ( supply chain management )Ariif Budiman
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreBenjamin Moore
 
Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15juanbtoribio
 
Patrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedinPatrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedinPatrick Romine
 
Pramod K Shukla Resume
Pramod K Shukla ResumePramod K Shukla Resume
Pramod K Shukla ResumePramod Shukla
 
ePollbook.Capstone.2015
ePollbook.Capstone.2015ePollbook.Capstone.2015
ePollbook.Capstone.2015Letian Zheng
 
SRS - Recruitment Presentation
SRS - Recruitment PresentationSRS - Recruitment Presentation
SRS - Recruitment PresentationSteven Fudge-Adams
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015juanbtoribio
 

Viewers also liked (20)

Doc1
Doc1Doc1
Doc1
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
School of social work faith based community collaborative visual
School of social work faith based community collaborative visualSchool of social work faith based community collaborative visual
School of social work faith based community collaborative visual
 
ProVIDE Newsletter 4
ProVIDE Newsletter 4 ProVIDE Newsletter 4
ProVIDE Newsletter 4
 
Trustmarksolutions.com
Trustmarksolutions.comTrustmarksolutions.com
Trustmarksolutions.com
 
Resume - David Steele 14.05.15
Resume - David Steele 14.05.15Resume - David Steele 14.05.15
Resume - David Steele 14.05.15
 
Distribution part of scm ( supply chain management )
Distribution  part of scm ( supply chain management )Distribution  part of scm ( supply chain management )
Distribution part of scm ( supply chain management )
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMoore
 
Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15
 
My Presentation
My PresentationMy Presentation
My Presentation
 
ForeStartFinish
ForeStartFinishForeStartFinish
ForeStartFinish
 
Gps03
Gps03Gps03
Gps03
 
ACTHIV 2016 ~ Recap
ACTHIV 2016 ~ RecapACTHIV 2016 ~ Recap
ACTHIV 2016 ~ Recap
 
Presentation1
Presentation1Presentation1
Presentation1
 
Patrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedinPatrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedin
 
Pramod K Shukla Resume
Pramod K Shukla ResumePramod K Shukla Resume
Pramod K Shukla Resume
 
ePollbook.Capstone.2015
ePollbook.Capstone.2015ePollbook.Capstone.2015
ePollbook.Capstone.2015
 
SRS - Recruitment Presentation
SRS - Recruitment PresentationSRS - Recruitment Presentation
SRS - Recruitment Presentation
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015
 

Similar to Detecting Word Substitution in Text Using Algorithms

QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGEQUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGEijaia
 
NLP and its applications
NLP and its applicationsNLP and its applications
NLP and its applicationsUtphala P
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
 
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...Cemal Ardil
 
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White PaperContent Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White PaperJohn Felahi
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesIJASRD Journal
 
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...TELKOMNIKA JOURNAL
 
Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Dhabal Sethi
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibEl Habib NFAOUI
 
Implementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain OntologyImplementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain OntologyIOSR Journals
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxBoston Institute of Analytics
 
Open domain Question Answering System - Research project in NLP
Open domain  Question Answering System - Research project in NLPOpen domain  Question Answering System - Research project in NLP
Open domain Question Answering System - Research project in NLPGVS Chaitanya
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUEJournal For Research
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsijcsa
 
Tovek Presentation by Livio Costantini
Tovek Presentation by Livio CostantiniTovek Presentation by Livio Costantini
Tovek Presentation by Livio Costantinimaxfalc
 
Natural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overviewNatural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overviewBenjaminlapid1
 

Similar to Detecting Word Substitution in Text Using Algorithms (20)

QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGEQUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
 
NLP and its applications
NLP and its applicationsNLP and its applications
NLP and its applications
 
Top 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data ScientistsTop 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data Scientists
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
 
N01741100102
N01741100102N01741100102
N01741100102
 
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White PaperContent Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
 
In3415791583
In3415791583In3415791583
In3415791583
 
Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_Habib
 
Implementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain OntologyImplementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain Ontology
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
Open domain Question Answering System - Research project in NLP
Open domain  Question Answering System - Research project in NLPOpen domain  Question Answering System - Research project in NLP
Open domain Question Answering System - Research project in NLP
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Tovek Presentation by Livio Costantini
Tovek Presentation by Livio CostantiniTovek Presentation by Livio Costantini
Tovek Presentation by Livio Costantini
 
Natural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overviewNatural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overview
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Detecting Word Substitution in Text Using Algorithms

  • 1. Submitted by- Abhishek Bansal 9911103404(F5) Jaypee Institute of Information Technology, Noida
  • 2. Introduction Current Open Problem Problem Statement Background Study Requirement Specification Algorithms Used Use Case Diagram Limitations Conclusion Future Work
  • 3.  Text substitution or textual obfuscation is the art of substituting one word in place of some another word. It helps in hiding the actual meaning of the text. Text substitution means replacing the words which attract attention like threat or danger by words which are normal and do not attract attention. Substitution replaces words that are, or may be, on the watch list by more innocuous words, making the message seem more “ordinary” and so likely to be not selected for further analysis.
  • 4. In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are-  Suspicious mails cannot be detected.  Offensive users cannot be identified.
  • 5. To counter terrorism and to identify such acts and prevent them from happening I studied “Detecting word substitution in text” through which the actual hidden meaning of the message can be known.
  • 6. List of all Sources  Wikipedia  IEEE Xplore Digital Library  Acm digital library  Springer Journals  International Journal od Advanced Research in Computer Science and Software Engineering etc
  • 7. Hardware requirements Processor : Pentium 2.4 GHz or above Memory : 256 MB RAM or above Cache Memory: 128 KB or above Hard Disk : 3 GB or above [at least 3mb of free space required] Software requirements Operating System : Windows 7 and above
  • 8. Fuzzy String Matching Sentence Oddity Cosine Similarity
  • 9.
  • 10. Data base of suspicious words needs to be updated regularly Words are matched only for the ones present in database. Words are not checked in what context they are written. A target word is selected in a sentence to check whether it has been substituted in text or not.
  • 11.  I was able to implement a system which blocks emails that contains words which are not safe and are harmful in nature by matching with the words already present in the database and detecting words which might have been replaced by some other words to make the sentence normal. This can be helpful in preventing activities which can affect the society in a bad way. By analyzing the emails which contain such words the information of the person can also be obtained and illegal acts can be prevented from happening.
  • 12.  This application is capable of producing the desired output. It currently uses words already selected for checking whether it has been substituted or not. And the current system could also be made more accurate by adding more words and updating the data base regularly. Also some other features like feature extraction can also be implemented which will further help to classify the emails. Using information science can further improve the accuracy of the results.