Security

Fraud Detection in Information Leakage

Free registration required

Executive Summary

In the field of business, the owner having some crucial data may need to share it with third-parties. These trusted third-parties may use this data for their own benefit causing reputational and monetary damage to the owner's company. If some of the shared data is discovered at some illegal place, it is quite possible that one or more third party agent is responsible for such information leakage. The owner must identify the leakage at the earliest and possibly the source of leakage. This paper presents two methods to handle such information leakage namely watermarking and Identifying Guilty agent using probability.

  • Format: PDF
  • Size: 990.6 KB