Data Leakage Tracking – Non-Repudiation of Forwarding

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 251)


Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digital watermarking techniques are used to provide tracking abilities for forwarded copies of the protected data. This paper briefly describes approaches to improve security for both the owner of protected data and its recipients.


information security security services data hiding digital forensic digital watermark fingerprinting 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lin, Y.T., Wu, J.L.: Traceable multimedia fingerprinting based on the multilevel user grouping. In: Proceedings of Multimedia and Expo., pp. 345–348 (2008), doi:10.1109/ICME.2008.4607442Google Scholar
  2. 2.
    Liu, K.J., Trappe, W., Wang, Z.J., Wu, M., Zhao, H.: Multimedia fingerprinting forensics for traitor tracing. In: EURASIP Book Series on Signal Processing and Communications. Hindawi Publishing Corporation (2005) ISBN 977-5945-18-6Google Scholar
  3. 3.
    Matyas, M., Peyravian, M., Roginsky, A., Zunic, N.: Reversible data mixing procedure for efficient public-key encryption. Computers & Security 17(3), 265–272 (1998)CrossRefGoogle Scholar
  4. 4.
    Jakobsson, M., Stern, J.P., Yung, M.: Scramble All, Encrypt Small. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 95–111. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Chae, J.J., Manjunath, B.S.: A robust embedded data from Wavelet coefficients. In: Proceedings of Storage and Retrieval for Image and Video Databases (SPIE), pp. 308–319 (1998)Google Scholar
  6. 6.
    Wang, Y., Doherty, J.F., van Dyck, R.E.: A watermarking algorithm for fingerprinting intelligence images. In: Proceedings of Conference on Information Sciences and Systems, pp. 21–24 (2001)Google Scholar
  7. 7.
    Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)CrossRefGoogle Scholar
  8. 8.
    Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory, 852–865 (2003)Google Scholar
  9. 9.
    Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)Google Scholar
  10. 10.
    Dittmann, J., Behr, A., Stabenau, M., Schmitt, P., Schwenk, J., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. In: JEI, pp. 456–467 (2000)Google Scholar
  11. 11.
    Scheidemann, V.: Endpoint Security: Data Loss Prevention. Security Advisor ePublication (2008)Google Scholar
  12. 12.
    Kohl, J.T.: The Use of Encryption in Kerberos for Network Authentication. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 35–43. Springer, Heidelberg (1990)Google Scholar
  13. 13.
    Schick, R., Ruland, C.: Document Tracking – One the Way to a New Security Service. In: Proc. Conf. on Network Architectures and Information Systems Security (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  1. 1.Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations