References
[1]. Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75-80.
[2]. Backes, M., Grimm, N., & Kate, A. (2016). Data Lineage in Malicious Environments. IEEE Transactions on Dependable and Secure Computing, 13(2), 178-191.
[3]. Bhattacharjya, A. K., & Ancin, H. (1999). Data embedding in text for a copier system. In Image Processing,1999.ICIP99.Proceedings.1999 International Conference on (Vol. 2, pp. 245-249). IEEE.
[4]. Bonatti, P., De Capitani di Vimercati, S., & Samarati, P. (2002). An algebra for composing access control policies. ACM Transactions on Information and System Security (TISSEC), 5(1), 1-35.
[5]. Cui, Y., & Widom, J. (2003). Lineage tracing for general data warehouse transformations. The VLDB Journal-The International Journal on Very Large Data Bases, 12(1), 41-58.
[6]. Jalil, Z., & Mirza, A. M. (2009). A review of digital watermarking techniques for text documents. In Information and Multimedia Technology, 2009. ICIMT'09. International Conference on (pp. 230-234). IEEE.
[7]. Jiansheng, M., Sukang, L., & Xiaomei, T. (2009). A digital watermarking algorithm based on DCT and DWT. In International Symposium on Web Information Systems and Applications (pp. 104-107).
[8]. Kim, Y. W., Moon, K. A., & Oh, I. S. (2003). A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In ICDAR (pp. 775-779).
[9]. Mascher-Kampfer, A., Stögner, H., & Uhl, A. (2006). Multiple re-watermarking scenarios. In Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006) (pp. 53-56). Budapest, Hungary.
[10]. Mstafa, R. J. (2017). Efficient and Robust Video Steganography Algorithms for Secure Data Communication (Doctoral dissertation, University of Bridgeport).
[11]. Nevase. J., Chougale, P., Shewale, S., & Bhosale, D,M. (2017). A Study on Determining Data Leakage Detection. In Imperial Journal of Interdisciplinary Research (IJIR), 2(12), 1303-1307.
[12]. Papadimitriou, P., & Garcia-Molina, H. (2011). Data leakage detection. IEEE Transactions on Knowledge and Data Engineering, 23(1), 51-63.
[13]. Su, J. K., Hartung, F., & Girod, B. (1999). Digital Watermarking of Text Image and Video Document. Telecommunications Laboratory, University of Erlangen- Nuremberg.