Abstract
Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digital watermarking techniques are used to provide tracking abilities for forwarded copies of the protected data. This paper briefly describes approaches to improve security for both the owner of protected data and its recipients.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, Y.T., Wu, J.L.: Traceable multimedia fingerprinting based on the multilevel user grouping. In: Proceedings of Multimedia and Expo., pp. 345–348 (2008), doi:10.1109/ICME.2008.4607442
Liu, K.J., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia fingerprinting forensics for traitor tracing. In: EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Corporation (2005) ISBN 977-5945-18-6
Matyas, M., Peyravian, M., Roginsky, A., Zunic, N.: Reversible data mixing procedure for efficient public-key encryption. Computers & Security 17(3), 265–272 (1998)
Jakobsson, M., Stern, J.P., Yung, M.: Scramble All, Encrypt Small. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 95–111. Springer, Heidelberg (1999)
Chae, J.J., Manjunath, B.S.: A robust embedded data from Wavelet coefficients. In: Proceedings of Storage and Retrieval for Image and Video Databases (SPIE), pp. 308–319 (1998)
Wang, Y., Doherty, J.F., van Dyck, R.E.: A watermarking algorithm for fingerprinting intelligence images. In: Proceedings of Conference on Information Sciences and Systems, pp. 21–24 (2001)
Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)
Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory, 852–865 (2003)
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Dittmann, J., Behr, A., Stabenau, M., Schmitt, P., Schwenk, J., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. In: JEI, pp. 456–467 (2000)
Scheidemann, V.: Endpoint Security: Data Loss Prevention. Security Advisor ePublication (2008)
Kohl, J.T.: The Use of Encryption in Kerberos for Network Authentication. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 35–43. Springer, Heidelberg (1990)
Schick, R., Ruland, C.: Document Tracking – One the Way to a New Security Service. In: Proc. Conf. on Network Architectures and Information Systems Security (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schick, R., Ruland, C. (2011). Data Leakage Tracking – Non-Repudiation of Forwarding. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)