z-logo
open-access-imgOpen Access
Data Leakage Detection using Image and Audio Files
Author(s) -
Prajkta P. Dandavate,
Sunita Dhotre
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/20168-2306
Subject(s) - computer science , leakage (economics) , image (mathematics) , artificial intelligence , multimedia , computer vision , economics , macroeconomics
or intentional distribution of data to unauthorized entity is the data leakage .In business process, it is necessary to send sensitive data to trusted parties. But this data is found at unauthorized place such as website or somebody's laptop. It is very challenging and important to detect leakage when sensitive data is deliberately leaked to others. Traditionally leakage detection is handled by watermarking technique. But it involves modification of data. In this paper for accessing "guilt" of agent a model is developed. Algorithms are presented to distribute objects in such a way that increase the chances of detecting leaker. Finally fake object is included in distributed set using steganography LSB algorithm which do not modify individual members. For the entire set fake object is acting as type of watermark . Major contribution to this system is to develop guilt model using steganography LSB algorithm.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom