This document discusses data leakage detection techniques. It begins with an introduction to data leakage and examples of how it occurs when data is shared with third parties. It then summarizes some of the largest data breaches of the 21st century. Existing data leakage detection techniques like watermarking and steganography are described along with their disadvantages. The document discusses future applications and scope in the area of data leakage detection and concludes that such techniques can help identify sources of data leaks while data is distributed.