Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 236))

Abstract

Current communication systems are very efficient and being used conveniently for secure exchange of vital information. These communication systems may be misused by adversaries and antisocial elements by capturing our vital information. Mostly, the information is being transmitted in the form of plain English text apart from securing it by encryption. To avoid losses due to leakage of vital information, one should not transmit his vital information in plain form. For monitoring of huge traffic, we require an efficient plain English text identifier. The identification of short messages in which words are written in short by ignoring some letters as in mobile messages is also required to monitor. We propose an efficient plain English text identifier based on Fuzzy measures utilizing percentage frequencies of most frequent letters and least frequent letters as features and triangular Fuzzy membership function. Presented method identifies plain English text correctly even, the given text is decimated/discontinuous and its length is very short, and seems very useful.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stephen, G.W.: Digital Modulation and Coding. Prentice Hall, New Jersey (1996)

    MATH  Google Scholar 

  2. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London (2000)

    Google Scholar 

  3. Ratan, R., Madhavan, V.C.E.: Steganography Based Information Security. IETE Tech. Rev. 19(4), 213–219 (2002)

    Google Scholar 

  4. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, USA (1996)

    Book  Google Scholar 

  5. Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2011)

    Google Scholar 

  6. Han, J., Kamber, M.L.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2006)

    Google Scholar 

  7. Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1–47 (2002)

    Article  Google Scholar 

  8. Wong, A.K.S., Lee, J.W.T., Yeung, D.S.: Using complex linguistic features in context - sensitive text classification techniques. Proceedings of the 4th IEEE International Conference on Machine Learning and Cybernetics 5, 3183–3188 (2005)

    Google Scholar 

  9. Simanjuntak, D.A., Ipung, H.P., Lim, C., Nugroho, A.S.: Text classification techniques used to facilitate cyber terrorism investigation. Proceedings of the 2nd IEEE International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), 198–200 (2010).

    Google Scholar 

  10. Upasana, Chakrabarty, S.: A survey of text classification techniques for e-mail filtering. Proceedings of the 2nd IEEE International Conference on Machine Learning and Computing (ICMLC), 32–36 (2010).

    Google Scholar 

  11. Cavnar, W.B., Trenkle, J.M.: N-Gram based text categorization, pp. 161–175. Proceedings of the Symposium on Document Analysis and Information Retrieval. Las Vegas, NV pp (1994)

    Google Scholar 

  12. Grefenstette, G.: Comparing two language identification schemes. Proceedings of the International Conference on Statistical Analysis of Textual Data JADT-95 (1995).

    Google Scholar 

  13. Kullback, S.: Statistical Methods in Cryptanalysis. Aegean Park, CA (1976)

    Google Scholar 

  14. Friedman, W.F.: Elements of Cryptanalysis. Aegean Park, CA (1976)

    Google Scholar 

  15. Anderson, A., Rosenfield, E.: Neuro Computing. MIT Press, MA (1988)

    Google Scholar 

  16. Dubois, D., Prade, H.: Fuzzy Sets and Systems: Theory and Applications. Academic Press, New York (1980)

    MATH  Google Scholar 

  17. Bezdek, J.C., Pal, S.K.: Fuzzy Models for Pattern Recognition. IEEE Press, New York (1992)

    Google Scholar 

  18. Puri, S., Kaushik, S.: A technical study and analysis on fuzzy similarity based models for text classification. Int. J. Data Min. Knowl. Manag. Process 2(2), 1–15 (2012).

    Google Scholar 

  19. Ratan, R., Saxena, P.K.: Algorithm for the restoration of distorted text documents. Proceedings of the International Conference on Computational Linguistics, Speech and Document Processing (ICCLSDP) (1998)

    Google Scholar 

  20. Yang, H.H., Moody, J.: Feature selection based on joint mutual information. J. Comput. Intell. Met. Appl. Int. Comput. Sci. Conv. 13, 1–8 (1999)

    Google Scholar 

  21. Saxena, P.K., Yadav, P., Mishra, G.: Index of garbledness for automatic recognition of plain english texts. Defence Sci. J 60(4), 415–419 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Ratan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Renu, Ravi, Ratan, R. (2014). Live Traffic English Text Monitoring Using Fuzzy Approach. In: Babu, B., et al. Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1602-5_97

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1602-5_97

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1601-8

  • Online ISBN: 978-81-322-1602-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics