International Journal for Development of Computer Science & Technology (IJDCST)
Data leakage is a silent type of threat. For example, an employee can intentionally or accidentally leak certain sensitive information. Sensitive information may be any data which an organization considers to be privileged and confidential. Hence which sensitive data that has already been leaked from the enterprise and is publicly available, for example, on the Internet should be detected. This strategy is post-facto leakage detection. Traditionally, this leakage detection is handled by watermarking, in which a unique code is embedded in each distributed copy.