期刊名称:International Journal of Electronics, Communication and Soft Computing Science and Engineering
印刷版ISSN:2277-9477
出版年度:2015
卷号:4
期号:Special 3
出版社:IJECSCSE
摘要:A distributor when pass their data to the client by agent. In a way some of these data is leaked and found in an authorized place. (eg: on the assess the probably cover that the leaked data came from one or more agents as web, or somebody laptop ) The distributor must likely hood that the leaked data came from one or more agents as opposed to ha v ing been independently gathered by other means. conventionall y, for the protection of data presented model used 'Watermarking' techniques but this techni que doesn't provide complete se curity against the data leakage. So, for properly detection the leakage o f setoff objects or record. Model used a 'unobtrusive' technique . In this presented model, different cases is been consider for finding the importanc e of Data Leakage Detection term