|
This article is cited in 1 scientific paper (total in 1 paper)
Document marking system for leak investigations
D. O. Obydenkova, A. Yu. Yakusheva, Yu. V. Markina, A. E. Frolova, S. A. Fomina, S. V. Kozlovb, D. D. Gromeyb, A. V. Kozachokb, B. V. Kondrat’evc a Ivannikov Institute for System Programming of the RAS
b Academy of Federal Guard Service
c Ministry of Defence of the Russian Federation
Abstract:
This paper presents a confidential text documents leakage investigation system, focused on leak channels by documents printing and screen photographing. Internal intruders may print confidential document, take paper copy out of protected perimeter, make document image by scanner and perform anonymous leak. Also, intruders may take a photo of printed confidential document or displayed on workstation screen using personal mobile phone. Described leakage channels are weakly covered by traditional DLP systems that are usually used by enterprises for confidential information leak protection. Digital watermark (DWM) embedding is chosen as a document protection mechanism by implying changing of document image visual representation. In case of confidential document anonymous leak embedded DWM would enable the employee to determine what leak intentionally or by security protocol violation. System architecture consists of different type components. Employees' workstation components provide DWM embedding into documents, which are sent for printing or displayed on screen. Information about watermark embedding is sent to a remote server that aggregates marking facts and provides it to security officer during investigation. Text document marking algorithms are developed, which embed DWM into printed and displayed on screen documents. Screen watermark is embedded into interline space interval, information is encoded by sequence of lightened and darkened spaces. DWM embedding into printed documents is implemented by three algorithms: horizontal and vertical shift based, font fragments brightness changing based. Algorithms testing methodology is developed in view of the production environment, that helped to evaluate the application area of algorithms. Besides, intruder model was formulated, system security was evaluated and determined possible attack vectors.
Keywords:
data leakage prevention, blind watermarking methods, print-scan, print-cam, screen-cam watermarking, image processing.
Citation:
D. O. Obydenkov, A. Yu. Yakushev, Yu. V. Markin, A. E. Frolov, S. A. Fomin, S. V. Kozlov, D. D. Gromey, A. V. Kozachok, B. V. Kondrat'ev, “Document marking system for leak investigations”, Proceedings of ISP RAS, 33:6 (2021), 161–174
Linking options:
https://www.mathnet.ru/eng/tisp652 https://www.mathnet.ru/eng/tisp/v33/i6/p161
|
Statistics & downloads: |
Abstract page: | 28 | Full-text PDF : | 16 |
|