Skip to main content

Identifying the Leak Sources of Hard Copy Documents

  • Conference paper
  • First Online:
Advances in Digital Forensics XVIII (DigitalForensics 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 653))

Included in the following conference series:

  • 308 Accesses

Abstract

Technological advancements have made it possible to use relatively inexpensive hardware and software to replicate and leak sensitive documents. This chapter proposes a novel canary trap method for determining the source of a leaked hard copy document. The method generates self-identifying documents that secretly encode unique information about the individuals who receive them by modifying the inter-word spacing in the original reference document. The encoded information is robust to changes introduced during printing, scanning and copying, rendering the method useful for hard copy as well as digital documents. Due to the lack of publicly-available datasets, a custom hard copy document leakage dataset comprising 100 scanned self-identifying documents encoded at four levels of robustness was created. The hard copy document leakage dataset was subsequently employed to evaluate the performance of the canary trap leak detection method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Kaneda, H. Kitazawa, K. Iwamura and I. Echizen, A study of equipment dependence of a single-dot-pattern method for information hiding by applying an error-correcting code, Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 497–501, 2014.

    Google Scholar 

  2. K. Kaneda, F. Nagai, K. Iwamura and S. Hangai, A study of information hiding performance using a simple dot pattern with different tile sizes, Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 323–326, 2008.

    Google Scholar 

  3. A. Kozachok, S. Kopylov, A. Shelupanov and O. Evsutin, Text marking approach for data leakage prevention, Journal of Computer Virology and Hacking Techniques, vol. 15(3), pp. 219–232, 2019.

    Google Scholar 

  4. V. Kuraki and V. Nakagata, Watermarking technologies for security-enhanced printed documents, Fujitsu Science and Technical Journal, vol. 43(2), pp. 197–203, 2007.

    Google Scholar 

  5. C. Loc, J. Burie and J. Ogier, Stable regions and object-fill-based approach for document image watermarking, Proceedings of the Thirteenth IAPR International Workshop on Document Analysis Systems, pp. 181–186, 2018.

    Google Scholar 

  6. S. Low, N. Maxemchuk, J. Brassil and L. O’Gorman, Document marking and identification using both line and word shifting, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 853–860, 1995.

    Google Scholar 

  7. J. Nayak, S. Singh, S. Chhabra, G. Gupta and M. Gupta, Detecting data leakage from hard copy documents, in Advances in Digital Forensics XIV, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 111–124, 2018.

    Google Scholar 

  8. I. Safonov, I. Kurilin, M. Rychagov and E. Tolstaya, Embedding digital hidden data into hardcopy, in Document Image Processing for Scanning and Printing, I. Safonov, I. Kurilin, M. Rychagov and E. Tolstaya (Eds.), Springer, Cham, Switzerland, pp. 219–250, 2019.

    Google Scholar 

  9. L. Tan, X. Sun and G. Sun, Print-scan resilient text image watermarking based on stroke direction modulation for Chinese document authentication, Radioengineering, vol. 21(1), pp. 170–181, 2012.

    Google Scholar 

  10. R. Theis, tess-two version 9.1.0, GitHub (github.com/rmtheis/tess-two), 2015.

    Google Scholar 

  11. J. van Beusekom, F. Shafait and T. Breuel, Automatic authentication of color laser print-outs using machine identification codes, Pattern Analysis and Applications, vol. 16(4), pp. 663–678, 2013.

    Google Scholar 

  12. A. Varna, S. Rane and A. Vetro, Data hiding in hard-copy text documents robust to print, scan and photocopy operations, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1397–1400, 2009.

    Google Scholar 

  13. D. Zou and Y. Shi, Formatted text document data hiding robust to printing, copying and scanning, Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4971–4974, 2005.

    Google Scholar 

  14. ZXing Project Contributors, ZXing 3.4.1, GitHub (github.com/zxing/zxing), 2020.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pulkit Garg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Garg, P., Gupta, G., Kumar, R., Sanadhya, S., Gupta, G. (2022). Identifying the Leak Sources of Hard Copy Documents. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVIII. DigitalForensics 2022. IFIP Advances in Information and Communication Technology, vol 653. Springer, Cham. https://doi.org/10.1007/978-3-031-10078-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-10078-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-10077-2

  • Online ISBN: 978-3-031-10078-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics