Data Leakage Detection Using Information Hiding Techniques
Keywords:
Assymetric Key Cryptograhy, Steganalysis, Least Significant Bit, WatermarkingAbstract
This paper is detailed about the proliferation of media sharing through third party vendors and tracking of guilt agent using a key generation and encryption of key in media file using asymmetric key cryptography techniques. Main focus of this paper is on the security provided for proliferation of media which help the admin to track person for leakage. In the process of each key generation is based on timestamp of system, LSB replacement along with encryption of key using RSA algorithm. Stegnalysis is the art of detecting the message�s existence and blockading the covert communication. The Least Significant Bit steganography is a technique in which least significant bit of the image is replaced with data bit.
References
Papadimitriou P and Garcia-Molina, “Data Leakage Detection” Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.
Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, “Comparative evaluation of algorithms for effective data leakage detection”, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759-3,Page No(177-182),April 11-12,2013.
Shailender Gupta, Ankur Goyal and Bharat Bhushan “Information Hiding Using Least Significant Bit Stegnography and Cryptography” Vol: 4, No: 6, Page No (27-34), June 2012.
V. Darmstaedter, J. -F. Delaigle, D. Nicholson and B. Macq, “A block based watermarking technique for MPEG-2 signals: Optimization and validation on real digital TV distribution links”, Proceedings 3rd European Conference on Multimedia Application, Services and Technique, ISBN 978-3-540-64594-8,Page No (190-206),May 1998.
J. Lee and Sung-Hwan Jung, “A survey of watermarking techniques applied to multimedia” IEEE International Symposium on Industrial Electronics, Volume: 1, Page No (272-277), June 2001.
Hamid Shojanazeri, Wan Azizun Wan Adnan and Sharifah Mumtadzah Syed Ahmad, “Video Watremarking Technique for Copyright Protection and Content Authentication”, International Journal of Computer Information Systems and Industrial Management Application, ISSN 2150-7988, Volume: 5,Page No(652-660),2013.
B. G. Mobasseri, “Exploring CDMA for watermarking of digital video” Proceedings of the SPIE, Volume: 3675, Page No (96-102), April 1999.
F. Hartung, J. K. Su, and B. Girod, “Spread spectrum watermarking: malicious attacks and counter-attacks,” from Conference Volume:3657 Proceeding SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, Page No (147–158), Jan. 1999.
Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav “Stegnography Using Least Significant Bit Algorithm”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Volume:2, Issue:3, Page No (338-341),May-Jun 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
