CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Data Leakage Detection using Image and Audio Files

by P.p.dandavate, S.s.dhotre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 8
Year of Publication: 2015
Authors: P.p.dandavate, S.s.dhotre
10.5120/20168-2306

P.p.dandavate, S.s.dhotre . Data Leakage Detection using Image and Audio Files. International Journal of Computer Applications. 115, 8 ( April 2015), 1-4. DOI=10.5120/20168-2306

@article{ 10.5120/20168-2306,
author = { P.p.dandavate, S.s.dhotre },
title = { Data Leakage Detection using Image and Audio Files },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 8 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number8/20168-2306/ },
doi = { 10.5120/20168-2306 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:13.142598+05:30
%A P.p.dandavate
%A S.s.dhotre
%T Data Leakage Detection using Image and Audio Files
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 8
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Accidental or intentional distribution of data to unauthorized entity is the data leakage . In business process, it is necessary to send sensitive data to trusted parties. But this data is found at unauthorized place such as website or somebody's laptop. It is very challenging and important to detect leakage when sensitive data is deliberately leaked to others. Traditionally leakage detection is handled by watermarking technique. But it involves modification of data. In this paper for accessing "guilt" of agent a model is developed. Algorithms are presented to distribute objects in such a way that increase the chances of detecting leaker. Finally fake object is included in distributed set using steganography LSB algorithm which do not modify individual members. For the entire set fake object is acting as type of watermark . Major contribution to this system is to develop guilt model using steganography LSB algorithm.

References
  1. A. E. Mustafa A. M. F. ElGamal M. E. ElAlmi Ahmed. BD" A Proposed Algorithm For SteganographyIn Digital Image Based on Least Significant Bit"
  2. F. Hartung and B. Girod, "Watermarking of Uncompressed and Compressed Video," Signal Processing, vol. 66, no. 3, pp. 283-301, 1998
  3. J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland, "Watermarking Digital Images for Copyright Protection," IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
  4. L. Sweeney, "Achieving K-Anonymity Privacy Protection Using Generalization and Suppression,"http://en. Scientificcommons. org/43196131, 2002.
  5. P. Buneman, S. Khanna, and W. C. Tan, "Why and Where: A Characterization of Data Provenance," Proc. Eighth Int'l Conf. Database Theory (ICDT '01), J. V. den Bussche and V. Vianu, eds. ,pp. 316-330, Jan. 2001.
  6. Papadimitriou and H. Garcia-Molina "Data leakage detection "IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23, January 2011.
  7. S. Czerwinski, R. Fromm, and T. Hodes, "Digital Music Distribution and Audio Watermarking, "http://www. scientificcommons. org/43025658, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Data leakage fake objects Guilt Model