A comparative analysis of Arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

[PDF][PDF] Accurate loan approval prediction based on machine learning approach

J Tejaswini, TM Kavya, RDN Ramya… - Journal of …, 2020 - jespublication.com
Loan approval is a very important process for banking organizations. Banking Industry
always needs a more accurate predictive modeling system for many issues. Predicting credit …

Evaluating and mitigating gender bias in machine learning based resume filtering

Gagandeep, J Kaur, S Mathur, S Kaur, A Nayyar… - Multimedia Tools and …, 2024 - Springer
Shortlisting resumes for the companies are being automated using artificial intelligence
however, training systems to do that incorporate high social biases in the models …

Secure and covert communication using steganography by Wavelet Transform

NS Lingamallu, V Veeramani - Optik, 2021 - Elsevier
This paper presents a hybrid image steganography along with cryptography algorithm
based on LS (Logical & Statistical) encryption scheme and lift wavelet domain of digital …

A forward email based high capacity text steganography technique using a randomized and indexed word dictionary

G Maji, S Mandal - Multimedia Tools and Applications, 2020 - Springer
Text steganography is inherently difficult due to minimal redundant information space to hide
secret payload. The same fact limits the hiding capacity and security too. In this study, a …

[PDF][PDF] Text hiding in text using invisible character

NAA Mustafa - International Journal of Electrical and Computer …, 2020 - academia.edu
Steganography can be defined as the art and science of hiding information in the data that
could be read by computer. This science cannot recognize stego-cover and the original one …

Crime Hotspot Identification using SVM in Machine Learning

K Vinothkumar, KS Ranjith, RR Vikram… - … Computing and Data …, 2023 - ieeexplore.ieee.org
This study is to identify and predict the criminal hotspot in crime data. Crime is one of the
society's most pressing issues and preventing it is critical. This necessitates keeping track of …

[PDF][PDF] Flipkart product recommendation system

T Keerthana, T Bhavani, NS Priya, VS Prathyusha… - …, 2021 - jespublication.com
With the increase in the demand for the e-commerce websites, large amounts of information
is available due to which the users face difficulty in finding the relevant information matching …

[PDF][PDF] Credit card fraud detection using logistic regression

K Gowthami, K Praneetha, G Vinitha… - … Sciences (JES) Vol, 2020 - jespublication.com
Use of online transactions in day to day life has been increasing since last decade due to
advancements in technology and network connectivity. Due to ease, simplicity and user …

Cryptograhy and Pk-Anonymization Methods for Secure Data Storage in Cloud

NS Shaik, G Ketepalli, VN Reddy… - … conference on I …, 2019 - ieeexplore.ieee.org
Cloud computing empowers the clients to get outsourced information from cloud storage
with no equipment and programming administrations. For compelling the usage of secret …