2018
DOI: 10.1007/978-3-319-99277-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Data Leakage from Hard Copy Documents

Abstract: Document fraud has evolved to become a significant threat to individuals and organizations. Data leakage from hard copy documents is a common type of fraud. This chapter proposes a methodology for analyzing printed and photocopied versions of confidential documents to identify the source of a leak. The methodology incorporates a novel font pixel manipulation algorithm that embeds data in the pixels of certain characters of confidential documents in a manner that is imperceptible to the human eye. The embedded … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
(12 reference statements)
0
0
0
Order By: Relevance
“…Nayak et al [8] have developed a font pixel manipulation approach for detecting the sources of leaks of hardcopy documents. A quick response code that encodes information in the font pixels of a unique document identifier is created and embedded in the document.…”
Section: Matched Not Matchedmentioning
confidence: 99%
“…Nayak et al [8] have developed a font pixel manipulation approach for detecting the sources of leaks of hardcopy documents. A quick response code that encodes information in the font pixels of a unique document identifier is created and embedded in the document.…”
Section: Matched Not Matchedmentioning
confidence: 99%