International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Most companies and government agencies have a dire need for protecting sensitive information. Encryption, access restriction and locking documents behind firewalls are some common techniques for protecting sensitive information. Encryption is an effective way for preventing an unauthorized person from viewing the content of a sensitive document. Nonetheless, once the document is decrypted for viewing using the secret key, an ill-intentioned authorized person can save, copy, print or transmit the unencrypted document anywhere the user wants without any major difficulty.