What is Machine Learning…Even Kids will get to know post reading this post
07:11
Amoeba Technologies
0
Comments
07:11 Amoeba Technologies 0 Comments
info@amoebatechno.com | 24 x 7 Support: +91-8886516000
Difference between SMP and MPP, get to know here...
05:04
Amoeba Technologies
0
Comments
05:04 Amoeba Technologies 0 Comments
info@amoebatechno.com | 24 x 7 Support: +91-8886516000
Analytics with K Nearest Neighbor Classification
23:46
Amoeba Technologies
0
Comments
23:46 Amoeba Technologies 0 Comments
1. A positive integer k is specified, along with a new sample
2. We select the k entries in our database which are closest to the new sample
3. We find the most common classification of these entries
4. This is the classification we give to the new sample.
Example:
Let us Consider the following data
concerning credit default. Age and Loan are two numerical variables
(predictors) and Default is the target.
|
D
= Sqrt[(48-33)^2 + (142000-150000)^2] = 8000.01 >> Default=Y
|
With
K=3, there are two Default=Y and one Default=N out of three closest
neighbors. The prediction for the unknown case is again Default=Y.
|
www.amoebatechno.com | 24 x 7 Support No: +91-8886516000
Facebook: https://www.facebook.com/AmoebaTechnologies
Have you heard about R Programming. Here we clarify....
03:51
Amoeba Technologies
1
Comments
03:51 Amoeba Technologies 1 Comments
What’s so special about it?
www.amoebatechno.com | 24 x 7 Support No: +91-8886516000
Facebook: https://www.facebook.com/AmoebaTechnologies
Know what Predictive Analysis is all about
03:47
Amoeba Technologies
0
Comments
03:47 Amoeba Technologies 0 Comments
“Stock prices to rise or fall”
Amoeba Technologies Core Team | info@amoebatechno.com
www.amoebatechno.com | 24 x 7 Support No: +91-8886516000
Facebook: https://www.facebook.com/AmoebaTechnologies
Do you know what is Data Analytics and its purpose
03:44
Amoeba Technologies
0
Comments
03:44 Amoeba Technologies 0 Comments
This article is just to bring awareness about the jargon of Data Analytics and we will take it up to the next of details and understanding in the coming set of articles. Happy Reading friends!!!
www.amoebatechno.com | 24 x 7 Support No: +91-8886516000
Facebook: https://www.facebook.com/AmoebaTechnologies
Steganography - The Technique
12:58
Amoeba Technologies
0
Comments
12:58 Amoeba Technologies 0 Comments
The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphei meaning "writing”, means covered or secret writing, and is a long-practiced form of hiding information. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood.
More precisely,
Steganography includes a vast array of techniques for hiding messages in a variety of media. Among These methods are invisible inks, microdots, digital signatures, covert channels and spread-spectrum communications. Today, thanks to modern technology, steganography is used on text, images, sound, signals, and more.
KERCKOFF PRINCIPLE
In cryptography: This principle states that “the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system”. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key.
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
BASIC MODEL
We give some definitions common to the steganography field:
Cover medium: This is the medium in which we want to hide data, it can be an innocent looking piece of information for steganography, or some important medium that must be protected for copyright or integrity reasons.
Embedded message: This is the hidden message we want to put in the cover. It can be some data for steganography and some copyright informations or added content for digital watermarking.
Stegokey: This is represented by some secret information, which is needed in order to extract the embedded message from the stegomedium Stego-medium: This is the final piece of information that the casual observer can see.
We can define this simple formula:
Cover-medium + embedded-message = stego-message
Message is the data that the sender wishes to remain it confidential. It can be plain text, cipher text, the image, or anything that can be embedded in a bit stream such as a copyright mark, a covert communication, or a serial number. Password is known as stego-key, which ensures that only recipient who know the corresponding decoding key will be able to extract the message from a cover-object. The cover-object with the secretly embedded message is then called the Stego-object. Recovering message from a stego-object requires the cover-object itself and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message.
USES
Legitimate Use
Steganographic techniques have obvious uses, some legitimate, some less so, and some are likely illegal. The business case for protection of property, real and intellectual is strong. The watermarking of digital media is constantly improving, primarily in an attempt to provide hardened watermarks or proof of ownership. Individuals or organizations may decide to place personal/private/sensitive information in steganographic carriers. Admittedly, there are usually better ways to manage this task. One can liken these applications to the use of a deadbolt lock on a door.
Illegal Use
possible, a search on the internet for confirmation of this claim was unsuccessful.
An annual report on High Technology crime (48) lists nine common types of computer crime:
· Hacking
· Electronic payments
· Gambling and pornography
· Harassment
· Intellectual property offenses
· Viruses
· Pedophilia
www.amoebatechno.com | 24 x 7 Support No: +91-8886516000
Facebook: https://www.facebook.com/AmoebaTechnologies
Popular Posts
- Know the difference between different type of cloud services, SaaS, PaaS and IaaS...
- Have you heard about R Programming. Here we clarify....
- Difference between SMP and MPP, get to know here...
- Analytics with K Nearest Neighbor Classification
- Triple bottom line and its significance
- Top 10 Qualities of a Good Engineer
- Steganography - The Technique
- Know what Predictive Analysis is all about
- What is Machine Learning…Even Kids will get to know post reading this post
- Do you know what is Data Analytics and its purpose
0 comments :