Open Access   Article Go Back

Data Leakage Detection Using Information Hiding Techniques

A. Tale1 , M. Gunjal2 , B.A. Ahire3

Section:Technical Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 155-158, Mar-2014

Online published on Mar 30, 2014

Copyright © A. Tale, M. Gunjal, B.A. Ahire . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Tale, M. Gunjal, B.A. Ahire, “Data Leakage Detection Using Information Hiding Techniques,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.155-158, 2014.

MLA Style Citation: A. Tale, M. Gunjal, B.A. Ahire "Data Leakage Detection Using Information Hiding Techniques." International Journal of Computer Sciences and Engineering 2.3 (2014): 155-158.

APA Style Citation: A. Tale, M. Gunjal, B.A. Ahire, (2014). Data Leakage Detection Using Information Hiding Techniques. International Journal of Computer Sciences and Engineering, 2(3), 155-158.

BibTex Style Citation:
@article{Tale_2014,
author = {A. Tale, M. Gunjal, B.A. Ahire},
title = {Data Leakage Detection Using Information Hiding Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {155-158},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=88},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=88
TI - Data Leakage Detection Using Information Hiding Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - A. Tale, M. Gunjal, B.A. Ahire
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 155-158
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3669 3447 downloads 3643 downloads
  
  
           

Abstract

This paper is detailed about the proliferation of media sharing through third party vendors and tracking of guilt agent using a key generation and encryption of key in media file using asymmetric key cryptography techniques. Main focus of this paper is on the security provided for proliferation of media which help the admin to track person for leakage. In the process of each key generation is based on timestamp of system, LSB replacement along with encryption of key using RSA algorithm. Stegnalysis is the art of detecting the message�s existence and blockading the covert communication. The Least Significant Bit steganography is a technique in which least significant bit of the image is replaced with data bit.

Key-Words / Index Term

Assymetric Key Cryptograhy,Steganalysis,Least Significant Bit,Watermarking

References

[1] Papadimitriou P and Garcia-Molina, �Data Leakage Detection� Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.
[2] Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, �Comparative evaluation of algorithms for effective data leakage detection�, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759-3,Page No(177-182),April 11-12,2013.
[3] Shailender Gupta, Ankur Goyal and Bharat Bhushan �Information Hiding Using Least Significant Bit Stegnography and Cryptography� Vol: 4, No: 6, Page No (27-34), June 2012.
[4] V. Darmstaedter, J. -F. Delaigle, D. Nicholson and B. Macq, �A block based watermarking technique for MPEG-2 signals: Optimization and validation on real digital TV distribution links�, Proceedings 3rd European Conference on Multimedia Application, Services and Technique, ISBN 978-3-540-64594-8,Page No (190-206),May 1998.
[5] J. Lee and Sung-Hwan Jung, �A survey of watermarking techniques applied to multimedia� IEEE International Symposium on Industrial Electronics, Volume: 1, Page No (272-277), June 2001.
[6] Hamid Shojanazeri, Wan Azizun Wan Adnan and Sharifah Mumtadzah Syed Ahmad, �Video Watremarking Technique for Copyright Protection and Content Authentication�, International Journal of Computer Information Systems and Industrial Management Application, ISSN 2150-7988, Volume: 5,Page No(652-660),2013.
[7] B. G. Mobasseri, �Exploring CDMA for watermarking of digital video� Proceedings of the SPIE, Volume: 3675, Page No (96-102), April 1999.
[8] F. Hartung, J. K. Su, and B. Girod, �Spread spectrum watermarking: malicious attacks and counter-attacks,� from Conference Volume:3657 Proceeding SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, Page No (147�158), Jan. 1999.
[9] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav �Stegnography Using Least Significant Bit Algorithm�, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Volume:2, Issue:3, Page No (338-341),May-Jun 2012.