Main Reference PaperFast Detection of Transformed Data Leaks, IEEE Transactions on Information Forensics and Security, March 2016 [Java].
  • An investigation method is proposed that inspects and detects the leak of sensitive information in the content of files by finding similarity score between sensitive data and content through sampling and alignment algorithm that is deterministic and subsequence-preserving.

+ Description
  • An investigation method is proposed that inspects and detects the leak of sensitive information in the content of files by finding similarity score between sensitive data and content through sampling and alignment algorithm that is deterministic and subsequence-preserving.

  • To detect sensitive information leak from the content of files.

  • To detect complex data leak pattern.

+ Aim & Objectives
  • To detect sensitive information leak from the content of files.

  • To detect complex data leak pattern.

  • A method is contributed that tracks the data movement to prevent data leak.

+ Contribution
  • A method is contributed that tracks the data movement to prevent data leak.

  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, J2SE.

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40.

  • Netbeans 8.0.1, J2SE.

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.