Review: A review on blind detection for image steganography
Signal Processing
New Technology Prevents Data Leakage
Computer
e-Forensics steganography system for secret information retrieval
Advanced Engineering Informatics
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Analyzing group communication for preventing data leakage via email
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
IH'05 Proceedings of the 7th international conference on Information Hiding
A new framework of LSB steganalysis of digital media
IEEE Transactions on Signal Processing - Part II
Hi-index | 0.00 |
Regardless of the established security controls that organizations have put in place to protect their digital assets, a rise in insider threats has been observed and particularly in incidents of data leakage. The importance of data as corporate assets is leading to a growing need for detection, prevention and mitigation of such violations by the organisations. In this paper we are investigating the different types of insider threats and their implications to the corporate environment, with specific emphasis to the special case of data leakage. Organisations should evaluate the risk they are facing due to insider threats and establish proactive measures towards this direction. In response to the challenging problem of identifying insider threats, we design a forensic readiness model, which is able to identify, prevent and log email messages, which attempt to leak information from an organisation with the aid of steganography.