Detecting data leakage from hard copy documents

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Document fraud has evolved to become a significant threat to individuals and organizations. Data leakage from hard copy documents is a common type of fraud. This chapter proposes a methodology for analyzing printed and photocopied versions of confidential documents to identify the source of a leak. The methodology incorporates a novel font pixel manipulation algorithm that embeds data in the pixels of certain characters of confidential documents in a manner that is imperceptible to the human eye. The embedded data is extracted from a leaked printed or photocopied document to identify the specific document that served as the source. The embedded data is robust in that it can withstand errors introduced by printing, scanning and photocopying documents. Experimental results demonstrate the efficiency, robustness and security of the methodology.

Cite

CITATION STYLE

APA

Nayak, J., Singh, S., Chhabra, S., Gupta, G., Gupta, M., & Gupta, G. (2018). Detecting data leakage from hard copy documents. In IFIP Advances in Information and Communication Technology (Vol. 532, pp. 111–124). Springer New York LLC. https://doi.org/10.1007/978-3-319-99277-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free