Research Article
BibTex RIS Cite

Screen Watermark: A Novel Approach in Detecting Digital Criminals

Year 2023, Volume: 9 Issue: 3, 612 - 621, 01.01.2024

Abstract

Organizations need to safeguard their information systems not only against external cyber attackers but also against malicious individuals within their ranks who may exploit their access to steal sensitive information for personal gain. Particularly, these malevolent insiders can covertly monitor and capture documents displayed on computer screens using digital cameras. By opting for digital cameras over more traditional communication methods like email, perpetrators can evade digital traces, making it harder to detect and establish their identity. Even if institutions were to enforce a policy banning the use of camera-equipped devices, the ubiquity of small cameras allows this threat to persist. In response to this menace, a novel technique has been proposed to counter it- embedding hidden watermarks containing confidential information onto the screen, irrespective of the application in use. These invisible watermarks, imperceptible during regular usage, can be extracted from captured images, aiding in pinpointing the location and time of data leaks.

References

  • [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
  • [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
  • [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
  • [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
  • [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
  • [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
  • [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
  • [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
  • [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
  • [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
  • [11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia.,” IEEE Trans. image Process. a Publ. IEEE Signal Process. Soc., vol. 6, no. 12, pp. 1673–1687, 1997, doi:10.1109/83.650120.
  • [12] A. M. Alattar and O. M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” 2004.
  • [13] M. Embar, L. F. McHugh, and W. R. Wesselman, “Printer watermark obfuscation,” in Proceedings of the 3rd annual conference on Research in information technology, Oct. 2014, pp. 15–20. doi:10.1145/2656434.2656437.
  • [14] D. Gugelmann, D. Sommer, V. Lenders, M. Happe, and L. Vanbever, “Screen watermarking for data theft investigation and attribution,” Int. Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 391–408, 2018, doi:10.23919/CYCON.2018.8405027.
  • [15] M. Piec and A. Rauber, “Real-time screen watermarking using overlaying layer,” Proc. - 9th Int. Conf. Availability, Reliab. Secur. ARES 2014, pp. 561–570, 2014, doi:10.1109/ARES.2014.83.
  • [16] R. Bai, L. Li, S. Zhang, J. Lu, and C. C. Chang, “SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain,” Appl. Sci., vol. 12, no. 19, 2022, doi:10.3390/app12199780.

Ekran Filigranı: Dijital Suçluların Tespitinde Yeni Bir Yaklaşım

Year 2023, Volume: 9 Issue: 3, 612 - 621, 01.01.2024

Abstract

Kuruluşların bilgi sistemlerini yalnızca harici siber saldırganlara karşı değil, aynı zamanda kişisel çıkar sağlamak amacıyla hassas bilgileri çalmak için erişimlerini istismar edebilecek kendi bünyelerindeki kötü niyetli kişilere karşı da korumaları gerekir. Özellikle içerideki bu kötü niyetli kişiler, dijital kameralar kullanarak bilgisayar ekranlarında görüntülenen belgeleri gizlice izleyebilir ve yakalayabilir. Failler, e-posta gibi daha geleneksel iletişim yöntemleri yerine dijital kameraları tercih ederek dijital izlerden kaçabilir ve böylece kimliklerinin tespit edilmesini ve belirlenmesini zorlaştırabilirler. Kurumlar kamera donanımlı cihazların kullanımını yasaklayan bir politika uygulasa bile, küçük kameraların her yerde bulunması bu tehdidin devam etmesine olanak tanır. Bu tehdide karşı, kullanılan uygulamadan bağımsız olarak ekrana gizli bilgiler içeren gizli filigranlar yerleştiren yeni bir teknik önerilmiştir. Normal kullanım sırasında fark edilemeyen bu görünmez filigranlar, yakalanan görüntülerden çıkarılabilir ve veri sızıntılarının yerini ve zamanını belirlemeye yardımcı olur.

References

  • [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
  • [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
  • [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
  • [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
  • [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
  • [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
  • [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
  • [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
  • [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
  • [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
  • [11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia.,” IEEE Trans. image Process. a Publ. IEEE Signal Process. Soc., vol. 6, no. 12, pp. 1673–1687, 1997, doi:10.1109/83.650120.
  • [12] A. M. Alattar and O. M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” 2004.
  • [13] M. Embar, L. F. McHugh, and W. R. Wesselman, “Printer watermark obfuscation,” in Proceedings of the 3rd annual conference on Research in information technology, Oct. 2014, pp. 15–20. doi:10.1145/2656434.2656437.
  • [14] D. Gugelmann, D. Sommer, V. Lenders, M. Happe, and L. Vanbever, “Screen watermarking for data theft investigation and attribution,” Int. Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 391–408, 2018, doi:10.23919/CYCON.2018.8405027.
  • [15] M. Piec and A. Rauber, “Real-time screen watermarking using overlaying layer,” Proc. - 9th Int. Conf. Availability, Reliab. Secur. ARES 2014, pp. 561–570, 2014, doi:10.1109/ARES.2014.83.
  • [16] R. Bai, L. Li, S. Zhang, J. Lu, and C. C. Chang, “SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain,” Appl. Sci., vol. 12, no. 19, 2022, doi:10.3390/app12199780.
There are 16 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Articles
Authors

Aybike Şimşek 0000-0002-1033-1597

Ömer Faruk Kerman 0009-0005-2871-3867

Publication Date January 1, 2024
Submission Date September 18, 2023
Acceptance Date December 23, 2023
Published in Issue Year 2023 Volume: 9 Issue: 3

Cite

IEEE A. Şimşek and Ö. F. Kerman, “Screen Watermark: A Novel Approach in Detecting Digital Criminals”, GJES, vol. 9, no. 3, pp. 612–621, 2024.

Gazi Journal of Engineering Sciences (GJES) publishes open access articles under a Creative Commons Attribution 4.0 International License (CC BY). 1366_2000-copia-2.jpg