SlideShare a Scribd company logo
Submitted by-
Abhishek Bansal
9911103404(F5)
Jaypee Institute of Information Technology, Noida
Introduction
Current Open Problem
Problem Statement
Background Study
Requirement Specification
Algorithms Used
Use Case Diagram
Limitations
Conclusion
Future Work
 Text substitution or textual obfuscation is the
art of substituting one word in place of some
another word. It helps in hiding the actual
meaning of the text. Text substitution means
replacing the words which attract attention
like threat or danger by words which are
normal and do not attract attention.
Substitution replaces words that are, or may
be, on the watch list by more innocuous
words, making the message seem more
“ordinary” and so likely to be not selected for
further analysis.
In the existing system, the mails are sent
to the authenticated users who are
intended to be received.
Some defects in existing system are-
 Suspicious mails cannot be detected.
 Offensive users cannot be identified.
To counter terrorism and to identify such
acts and prevent them from happening I
studied “Detecting word substitution in
text” through which the actual hidden
meaning of the message can be known.
List of all Sources
 Wikipedia
 IEEE Xplore Digital Library
 Acm digital library
 Springer Journals
 International Journal od Advanced
Research in Computer Science and
Software Engineering etc
Hardware requirements
Processor : Pentium 2.4 GHz or above
Memory : 256 MB RAM or above
Cache Memory: 128 KB or above
Hard Disk : 3 GB or above [at least 3mb of
free space required]
Software requirements
Operating System : Windows 7 and above
Fuzzy String Matching
Sentence Oddity
Cosine Similarity
Data base of suspicious words needs to be
updated regularly
Words are matched only for the ones
present in database.
Words are not checked in what context
they are written.
A target word is selected in a sentence to
check whether it has been substituted in
text or not.
 I was able to implement a system which blocks
emails that contains words which are not safe and
are harmful in nature by matching with the words
already present in the database and detecting
words which might have been replaced by some
other words to make the sentence normal. This
can be helpful in preventing activities which can
affect the society in a bad way. By analyzing the
emails which contain such words the information of
the person can also be obtained and illegal acts
can be prevented from happening.
 This application is capable of producing the
desired output. It currently uses words
already selected for checking whether it has
been substituted or not. And the current
system could also be made more accurate by
adding more words and updating the data
base regularly. Also some other features like
feature extraction can also be implemented
which will further help to classify the emails.
Using information science can further improve
the accuracy of the results.
THANK YOU

More Related Content

What's hot

Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - Experiments
Gaurav Marwaha
 
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
CSCJournals
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014
Fan Liang
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
cscpconf
 
Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341
Editor IJARCET
 
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET Journal
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
IRJET Journal
 
Interpret gene expression results 2013
Interpret gene expression results 2013Interpret gene expression results 2013
Interpret gene expression results 2013
Elsa von Licy
 
What is a spam ?
What is a spam ?What is a spam ?
What is a spam ?
Ahmad Mashhood
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web search
eSAT Journals
 
Entity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutionsEntity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutions
Pvrtechnologies Nellore
 
TARANVEER_SINGH_CV
TARANVEER_SINGH_CVTARANVEER_SINGH_CV
TARANVEER_SINGH_CV
Taranveer Singh
 
STTP_POSTER
STTP_POSTERSTTP_POSTER
STTP_POSTER
Dustin Roberts
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam Mail
AM Publications
 
A017640107
A017640107A017640107
A017640107
IOSR Journals
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Wright State University, Dayton, OH, USA
 
Naming Disambiguation in Authors Database
Naming Disambiguation in Authors DatabaseNaming Disambiguation in Authors Database
Naming Disambiguation in Authors Database
Mohammed Alsayyari
 
Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...
Ecway Technologies
 
An overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support SystemAn overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support System
Gan Keng Hoon
 

What's hot (19)

Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - Experiments
 
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
Automatic Generation of Multiple Choice Questions using Surface-based Semanti...
 
Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014Rec Letter by Kun Hua 2014
Rec Letter by Kun Hua 2014
 
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
WEB SEARCH ENGINE BASED SEMANTIC SIMILARITY MEASURE BETWEEN WORDS USING PATTE...
 
Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341Ijarcet vol-2-issue-4-1339-1341
Ijarcet vol-2-issue-4-1339-1341
 
IRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & AutocorrectionIRJET- Vernacular Language Spell Checker & Autocorrection
IRJET- Vernacular Language Spell Checker & Autocorrection
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
Interpret gene expression results 2013
Interpret gene expression results 2013Interpret gene expression results 2013
Interpret gene expression results 2013
 
What is a spam ?
What is a spam ?What is a spam ?
What is a spam ?
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web search
 
Entity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutionsEntity linking with a knowledge base issues techniques and solutions
Entity linking with a knowledge base issues techniques and solutions
 
TARANVEER_SINGH_CV
TARANVEER_SINGH_CVTARANVEER_SINGH_CV
TARANVEER_SINGH_CV
 
STTP_POSTER
STTP_POSTERSTTP_POSTER
STTP_POSTER
 
An analysis on Filter for Spam Mail
An analysis on Filter for Spam MailAn analysis on Filter for Spam Mail
An analysis on Filter for Spam Mail
 
A017640107
A017640107A017640107
A017640107
 
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
 
Naming Disambiguation in Authors Database
Naming Disambiguation in Authors DatabaseNaming Disambiguation in Authors Database
Naming Disambiguation in Authors Database
 
Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...Nonadaptive mastermind algorithms for string and vector databases, with case ...
Nonadaptive mastermind algorithms for string and vector databases, with case ...
 
An overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support SystemAn overview of text mining and sentiment analysis for Decision Support System
An overview of text mining and sentiment analysis for Decision Support System
 

Viewers also liked

Doc1
Doc1Doc1
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
EstelaMartaNuria
 
School of social work faith based community collaborative visual
School of social work faith based community collaborative visualSchool of social work faith based community collaborative visual
School of social work faith based community collaborative visual
juanbtoribio
 
ProVIDE Newsletter 4
ProVIDE Newsletter 4 ProVIDE Newsletter 4
ProVIDE Newsletter 4
Khan Safayet Hossin
 
Trustmarksolutions.com
Trustmarksolutions.comTrustmarksolutions.com
Trustmarksolutions.com
Trustmarksolutions
 
Resume - David Steele 14.05.15
Resume - David Steele 14.05.15Resume - David Steele 14.05.15
Resume - David Steele 14.05.15
David Steele
 
Distribution part of scm ( supply chain management )
Distribution  part of scm ( supply chain management )Distribution  part of scm ( supply chain management )
Distribution part of scm ( supply chain management )
Ariif Budiman
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMoore
Benjamin Moore
 
Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15
juanbtoribio
 
My Presentation
My PresentationMy Presentation
My Presentation
Erol Komaç
 
ForeStartFinish
ForeStartFinishForeStartFinish
ForeStartFinish
Steven Schain
 
Gps03
Gps03Gps03
ACTHIV 2016 ~ Recap
ACTHIV 2016 ~ RecapACTHIV 2016 ~ Recap
ACTHIV 2016 ~ Recap
Roosevelt Bell MSP, BSP/IOP
 
Presentation1
Presentation1Presentation1
Presentation1
nicolelieumai
 
Patrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedinPatrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedin
Patrick Romine
 
Pramod K Shukla Resume
Pramod K Shukla ResumePramod K Shukla Resume
Pramod K Shukla Resume
Pramod Shukla
 
ePollbook.Capstone.2015
ePollbook.Capstone.2015ePollbook.Capstone.2015
ePollbook.Capstone.2015
Letian Zheng
 
SRS - Recruitment Presentation
SRS - Recruitment PresentationSRS - Recruitment Presentation
SRS - Recruitment Presentation
Steven Fudge-Adams
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
Charles Taft
 
Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015
juanbtoribio
 

Viewers also liked (20)

Doc1
Doc1Doc1
Doc1
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
School of social work faith based community collaborative visual
School of social work faith based community collaborative visualSchool of social work faith based community collaborative visual
School of social work faith based community collaborative visual
 
ProVIDE Newsletter 4
ProVIDE Newsletter 4 ProVIDE Newsletter 4
ProVIDE Newsletter 4
 
Trustmarksolutions.com
Trustmarksolutions.comTrustmarksolutions.com
Trustmarksolutions.com
 
Resume - David Steele 14.05.15
Resume - David Steele 14.05.15Resume - David Steele 14.05.15
Resume - David Steele 14.05.15
 
Distribution part of scm ( supply chain management )
Distribution  part of scm ( supply chain management )Distribution  part of scm ( supply chain management )
Distribution part of scm ( supply chain management )
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMoore
 
Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15Faith-Based Community Collaborative Visual Narrative 5-15
Faith-Based Community Collaborative Visual Narrative 5-15
 
My Presentation
My PresentationMy Presentation
My Presentation
 
ForeStartFinish
ForeStartFinishForeStartFinish
ForeStartFinish
 
Gps03
Gps03Gps03
Gps03
 
ACTHIV 2016 ~ Recap
ACTHIV 2016 ~ RecapACTHIV 2016 ~ Recap
ACTHIV 2016 ~ Recap
 
Presentation1
Presentation1Presentation1
Presentation1
 
Patrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedinPatrick Romine Resume-7 linkedin
Patrick Romine Resume-7 linkedin
 
Pramod K Shukla Resume
Pramod K Shukla ResumePramod K Shukla Resume
Pramod K Shukla Resume
 
ePollbook.Capstone.2015
ePollbook.Capstone.2015ePollbook.Capstone.2015
ePollbook.Capstone.2015
 
SRS - Recruitment Presentation
SRS - Recruitment PresentationSRS - Recruitment Presentation
SRS - Recruitment Presentation
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015Faith-Based Community Collaborative Meeting September 2015
Faith-Based Community Collaborative Meeting September 2015
 

Similar to Detecting word substitution in text

QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGEQUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
ijaia
 
NLP and its applications
NLP and its applicationsNLP and its applications
NLP and its applications
Utphala P
 
Top 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data ScientistsTop 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data Scientists
Xavor Corporation - Redefining Health Technology
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
Kumar Goud
 
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
Cemal Ardil
 
N01741100102
N01741100102N01741100102
N01741100102
IOSR Journals
 
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White PaperContent Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
John Felahi
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
IJASRD Journal
 
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
TELKOMNIKA JOURNAL
 
In3415791583
In3415791583In3415791583
In3415791583
IJERA Editor
 
Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11
Dhabal Sethi
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_Habib
El Habib NFAOUI
 
Implementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain OntologyImplementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain Ontology
IOSR Journals
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
Boston Institute of Analytics
 
Open domain Question Answering System - Research project in NLP
Open domain  Question Answering System - Research project in NLPOpen domain  Question Answering System - Research project in NLP
Open domain Question Answering System - Research project in NLP
GVS Chaitanya
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
Journal For Research
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
ijcsa
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
Jennifer D. Davis, Ph.D.
 
Tovek Presentation by Livio Costantini
Tovek Presentation by Livio CostantiniTovek Presentation by Livio Costantini
Tovek Presentation by Livio Costantini
maxfalc
 
Natural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overviewNatural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overview
Benjaminlapid1
 

Similar to Detecting word substitution in text (20)

QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGEQUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
QUESTION ANSWERING SYSTEM USING ONTOLOGY IN MARATHI LANGUAGE
 
NLP and its applications
NLP and its applicationsNLP and its applications
NLP and its applications
 
Top 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data ScientistsTop 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data Scientists
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
A black-box-approach-for-response-quality-evaluation-of-conversational-agent-...
 
N01741100102
N01741100102N01741100102
N01741100102
 
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White PaperContent Analyst - Conceptualizing LSI Based Text Analytics White Paper
Content Analyst - Conceptualizing LSI Based Text Analytics White Paper
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
Improving Sentiment Analysis of Short Informal Indonesian Product Reviews usi...
 
In3415791583
In3415791583In3415791583
In3415791583
 
Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_Habib
 
Implementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain OntologyImplementation of Semantic Analysis Using Domain Ontology
Implementation of Semantic Analysis Using Domain Ontology
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
Open domain Question Answering System - Research project in NLP
Open domain  Question Answering System - Research project in NLPOpen domain  Question Answering System - Research project in NLP
Open domain Question Answering System - Research project in NLP
 
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUECOMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUE
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Tovek Presentation by Livio Costantini
Tovek Presentation by Livio CostantiniTovek Presentation by Livio Costantini
Tovek Presentation by Livio Costantini
 
Natural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overviewNatural Language Processing: A comprehensive overview
Natural Language Processing: A comprehensive overview
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 

Detecting word substitution in text

  • 1. Submitted by- Abhishek Bansal 9911103404(F5) Jaypee Institute of Information Technology, Noida
  • 2. Introduction Current Open Problem Problem Statement Background Study Requirement Specification Algorithms Used Use Case Diagram Limitations Conclusion Future Work
  • 3.  Text substitution or textual obfuscation is the art of substituting one word in place of some another word. It helps in hiding the actual meaning of the text. Text substitution means replacing the words which attract attention like threat or danger by words which are normal and do not attract attention. Substitution replaces words that are, or may be, on the watch list by more innocuous words, making the message seem more “ordinary” and so likely to be not selected for further analysis.
  • 4. In the existing system, the mails are sent to the authenticated users who are intended to be received. Some defects in existing system are-  Suspicious mails cannot be detected.  Offensive users cannot be identified.
  • 5. To counter terrorism and to identify such acts and prevent them from happening I studied “Detecting word substitution in text” through which the actual hidden meaning of the message can be known.
  • 6. List of all Sources  Wikipedia  IEEE Xplore Digital Library  Acm digital library  Springer Journals  International Journal od Advanced Research in Computer Science and Software Engineering etc
  • 7. Hardware requirements Processor : Pentium 2.4 GHz or above Memory : 256 MB RAM or above Cache Memory: 128 KB or above Hard Disk : 3 GB or above [at least 3mb of free space required] Software requirements Operating System : Windows 7 and above
  • 8. Fuzzy String Matching Sentence Oddity Cosine Similarity
  • 9.
  • 10. Data base of suspicious words needs to be updated regularly Words are matched only for the ones present in database. Words are not checked in what context they are written. A target word is selected in a sentence to check whether it has been substituted in text or not.
  • 11.  I was able to implement a system which blocks emails that contains words which are not safe and are harmful in nature by matching with the words already present in the database and detecting words which might have been replaced by some other words to make the sentence normal. This can be helpful in preventing activities which can affect the society in a bad way. By analyzing the emails which contain such words the information of the person can also be obtained and illegal acts can be prevented from happening.
  • 12.  This application is capable of producing the desired output. It currently uses words already selected for checking whether it has been substituted or not. And the current system could also be made more accurate by adding more words and updating the data base regularly. Also some other features like feature extraction can also be implemented which will further help to classify the emails. Using information science can further improve the accuracy of the results.