Matches in SemOpenAlex for { <https://semopenalex.org/work/W2109071844> ?p ?o ?g. }
Showing items 1 to 58 of
58
with 100 items per page.
- W2109071844 endingPage "435" @default.
- W2109071844 startingPage "433" @default.
- W2109071844 abstract "4 Abstract: An administrator distributes sensitive data to some trusted agents (third parties) and if one or more of them will leak that sensitive data and found in an unauthorized place (e.g. on the web or somebody's laptop),then we can catch & prosecute them as per Law. The question may arise in mind, how to deal with such problem? There is a unique key embedded in each copy of the data by distributor before distributing that data to agents and this key remains within data. In some cases, we can also inject realistic but fake data records to further improve our chances of detecting leakage and identifying the guilty party. We are using List Significant bit (LSB) (1) steganography concept here to embed the key in the data. So when the distributor finds his secret data at unauthorized place, he will simply take that data and check for the unique key. If the key in that data matches with the key present in his database then the system will display the name of that guilty agent and then he can mark it as invalid user (2) ." @default.
- W2109071844 created "2016-06-24" @default.
- W2109071844 creator A5000946367 @default.
- W2109071844 creator A5040210597 @default.
- W2109071844 creator A5047652387 @default.
- W2109071844 creator A5079553819 @default.
- W2109071844 date "2015-03-30" @default.
- W2109071844 modified "2023-09-25" @default.
- W2109071844 title "Data Leakage Detection Using LSB" @default.
- W2109071844 cites W2133277920 @default.
- W2109071844 cites W2146837315 @default.
- W2109071844 cites W2153631546 @default.
- W2109071844 cites W2503107053 @default.
- W2109071844 doi "https://doi.org/10.17148/ijarcce.2015.43104" @default.
- W2109071844 hasPublicationYear "2015" @default.
- W2109071844 type Work @default.
- W2109071844 sameAs 2109071844 @default.
- W2109071844 citedByCount "1" @default.
- W2109071844 countsByYear W21090718442017 @default.
- W2109071844 crossrefType "journal-article" @default.
- W2109071844 hasAuthorship W2109071844A5000946367 @default.
- W2109071844 hasAuthorship W2109071844A5040210597 @default.
- W2109071844 hasAuthorship W2109071844A5047652387 @default.
- W2109071844 hasAuthorship W2109071844A5079553819 @default.
- W2109071844 hasBestOaLocation W21090718441 @default.
- W2109071844 hasConcept C111919701 @default.
- W2109071844 hasConcept C139719470 @default.
- W2109071844 hasConcept C154945302 @default.
- W2109071844 hasConcept C162324750 @default.
- W2109071844 hasConcept C2777042071 @default.
- W2109071844 hasConcept C41008148 @default.
- W2109071844 hasConcept C4305246 @default.
- W2109071844 hasConceptScore W2109071844C111919701 @default.
- W2109071844 hasConceptScore W2109071844C139719470 @default.
- W2109071844 hasConceptScore W2109071844C154945302 @default.
- W2109071844 hasConceptScore W2109071844C162324750 @default.
- W2109071844 hasConceptScore W2109071844C2777042071 @default.
- W2109071844 hasConceptScore W2109071844C41008148 @default.
- W2109071844 hasConceptScore W2109071844C4305246 @default.
- W2109071844 hasLocation W21090718441 @default.
- W2109071844 hasOpenAccess W2109071844 @default.
- W2109071844 hasPrimaryLocation W21090718441 @default.
- W2109071844 hasRelatedWork W2181446147 @default.
- W2109071844 hasRelatedWork W2272563529 @default.
- W2109071844 hasRelatedWork W2318239306 @default.
- W2109071844 hasRelatedWork W2748952813 @default.
- W2109071844 hasRelatedWork W2899084033 @default.
- W2109071844 hasRelatedWork W2902286438 @default.
- W2109071844 hasRelatedWork W2962875264 @default.
- W2109071844 hasRelatedWork W3107474891 @default.
- W2109071844 hasRelatedWork W828573108 @default.
- W2109071844 hasRelatedWork W2343732178 @default.
- W2109071844 isParatext "false" @default.
- W2109071844 isRetracted "false" @default.
- W2109071844 magId "2109071844" @default.
- W2109071844 workType "article" @default.