首页> 外文会议>International Conference on Cyber Conflict >Screen watermarking for data theft investigation and attribution
【24h】

Screen watermarking for data theft investigation and attribution

机译:用于数据盗窃调查和归因的屏幕水印

获取原文

摘要

Organizations not only need to defend their IT systems against external cyber attackers, but also from malicious insiders, that is, agents who have infiltrated an organization or malicious members stealing information for their own profit. In particular, malicious insiders can leak a document by simply opening it and taking pictures of the document displayed on the computer screen with a digital camera. Using a digital camera allows a perpetrator to easily avoid a log trail that results from using traditional communication channels, such as sending the document via email. This makes it difficult to identify and prove the identity of the perpetrator. Even a policy prohibiting the use of any device containing a camera cannot eliminate this threat since tiny cameras can be hidden almost everywhere. To address this leakage vector, we propose a novel screen watermarking technique that embeds hidden information on computer screens displaying text documents. The watermark is imperceptible during regular use, but can be extracted from pictures of documents shown on the screen, which allows an organization to reconstruct the place and time of the data leak from recovered leaked pictures. Our approach takes advantage of the fact that the human eye is less sensitive to small luminance changes than digital cameras. We devise a symbol shape that is invisible to the human eye, but still robust to the image artifacts introduced when taking pictures. We complement this symbol shape with an error correction coding scheme that can handle very high bit error rates and retrieve watermarks from cropped and compressed pictures. We show in an experimental user study that our screen watermarks are not perceivable by humans and analyze the robustness of our watermarks against image modifications.
机译:组织不仅需要对外部网络攻击者捍卫其IT系统,而且来自恶意内部人,即渗透组织或恶意成员窃取信息的代理商。特别是,恶意内部人士可以通过简单地打开它并使用数码相机拍摄计算机屏幕上显示的文档照片来泄露文档。使用数码相机允许肇事者轻松避免使用传统通信通道的日志路径,例如通过电子邮件发送文档。这使得难以识别和证明肇事者的身份。即使是禁止使用包含相机的任何设备的策略也不能消除这种威胁,因为微小的摄像机几乎可以隐藏到处都是隐藏的。为了解决这一泄漏向量,我们提出了一种新颖的屏幕水印技术,将隐藏信息嵌入显示文本文档的计算机屏幕上。在定期使用期间,水印是不可察觉的,但可以从屏幕上所示的文档图片中提取,这允许组织重建数据泄漏的数据泄漏的地点和时间。我们的方法利用了人眼对比数码相机的小亮度变化敏感的事实。我们设计了一种对人眼看不见的符号形状,但仍然对拍照时引入的图像伪影仍然稳健。我们补充了这种符号形状,具有纠错编码方案,可以处理非常高的误码率和从裁剪和压缩的图片检索水印。我们在一个实验的用户研究中展示了我们的屏幕水印不可能被人类察觉,并分析我们的水印对图像修改的鲁棒性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号