A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Our system includes a data distributor who sends some important information to some third parties, called agents in our system. Some data gets leaked and found in an unauthorized place (e.g., on the internet or somebody's PC). The distributor must be able to detect that the data got leaked and came from one or more agents. Our system detects the guilty agent, who has leaked the data to untrusted agents. For identification of leaked data in existing system uses watermarking technique. However,doi:10.14419/ijet.v7i3.12.16108 fatcat:fdwwtp6cr5fc5l6s3c3o46jwae