Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Machine Learning with ML.NET

You're reading from   Hands-On Machine Learning with ML.NET Getting started with Microsoft ML.NET to implement popular machine learning algorithms in C#

Arrow left icon
Product type Paperback
Published in Mar 2020
Publisher Packt
ISBN-13 9781789801781
Length 296 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Jarred Capellman Jarred Capellman
Author Profile Icon Jarred Capellman
Jarred Capellman
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Section 1: Fundamentals of Machine Learning and ML.NET
2. Getting Started with Machine Learning and ML.NET FREE CHAPTER 3. Setting Up the ML.NET Environment 4. Section 2: ML.NET Models
5. Regression Model 6. Classification Model 7. Clustering Model 8. Anomaly Detection Model 9. Matrix Factorization Model 10. Section 3: Real-World Integrations with ML.NET
11. Using ML.NET with .NET Core and Forecasting 12. Using ML.NET with ASP.NET Core 13. Using ML.NET with UWP 14. Section 4: Extending ML.NET
15. Training and Building Production Models 16. Using TensorFlow with ML.NET 17. Using ONNX with ML.NET 18. Other Books You May Enjoy

Investigating feature engineering

As we have discussed in previous chapters, features are one of the most important components—and objectively the most important component—in the model building process. When approaching a new problem, the main question that arises is: how are you going to solve this problem? For example, a common exploit in the cyber-security world is the use of steganography. Steganography, which dates back to 440 BCE is the practice of hiding data within a container. This container has ranged from drawings, crosswords, music, and pictures, to name a few. In the cyber-security world, steganography is used to hide malicious payloads in files that would otherwise be ignored, such as images, and audio and video files.

Take the following image of a basket of food. This image—created using an online steganography tool—has an embedded message in it; have a look at whether you can spot any unusual patterns in the following image:

Most tools today...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime