Araştırma Makalesi
BibTex RIS Kaynak Göster

Screen Watermark: A Novel Approach in Detecting Digital Criminals

Yıl 2023, Cilt: 9 Sayı: 3, 612 - 621, 01.01.2024

Öz

Organizations need to safeguard their information systems not only against external cyber attackers but also against malicious individuals within their ranks who may exploit their access to steal sensitive information for personal gain. Particularly, these malevolent insiders can covertly monitor and capture documents displayed on computer screens using digital cameras. By opting for digital cameras over more traditional communication methods like email, perpetrators can evade digital traces, making it harder to detect and establish their identity. Even if institutions were to enforce a policy banning the use of camera-equipped devices, the ubiquity of small cameras allows this threat to persist. In response to this menace, a novel technique has been proposed to counter it- embedding hidden watermarks containing confidential information onto the screen, irrespective of the application in use. These invisible watermarks, imperceptible during regular usage, can be extracted from captured images, aiding in pinpointing the location and time of data leaks.

Kaynakça

  • [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
  • [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
  • [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
  • [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
  • [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
  • [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
  • [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
  • [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
  • [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
  • [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
  • [11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia.,” IEEE Trans. image Process. a Publ. IEEE Signal Process. Soc., vol. 6, no. 12, pp. 1673–1687, 1997, doi:10.1109/83.650120.
  • [12] A. M. Alattar and O. M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” 2004.
  • [13] M. Embar, L. F. McHugh, and W. R. Wesselman, “Printer watermark obfuscation,” in Proceedings of the 3rd annual conference on Research in information technology, Oct. 2014, pp. 15–20. doi:10.1145/2656434.2656437.
  • [14] D. Gugelmann, D. Sommer, V. Lenders, M. Happe, and L. Vanbever, “Screen watermarking for data theft investigation and attribution,” Int. Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 391–408, 2018, doi:10.23919/CYCON.2018.8405027.
  • [15] M. Piec and A. Rauber, “Real-time screen watermarking using overlaying layer,” Proc. - 9th Int. Conf. Availability, Reliab. Secur. ARES 2014, pp. 561–570, 2014, doi:10.1109/ARES.2014.83.
  • [16] R. Bai, L. Li, S. Zhang, J. Lu, and C. C. Chang, “SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain,” Appl. Sci., vol. 12, no. 19, 2022, doi:10.3390/app12199780.

Ekran Filigranı: Dijital Suçluların Tespitinde Yeni Bir Yaklaşım

Yıl 2023, Cilt: 9 Sayı: 3, 612 - 621, 01.01.2024

Öz

Kuruluşların bilgi sistemlerini yalnızca harici siber saldırganlara karşı değil, aynı zamanda kişisel çıkar sağlamak amacıyla hassas bilgileri çalmak için erişimlerini istismar edebilecek kendi bünyelerindeki kötü niyetli kişilere karşı da korumaları gerekir. Özellikle içerideki bu kötü niyetli kişiler, dijital kameralar kullanarak bilgisayar ekranlarında görüntülenen belgeleri gizlice izleyebilir ve yakalayabilir. Failler, e-posta gibi daha geleneksel iletişim yöntemleri yerine dijital kameraları tercih ederek dijital izlerden kaçabilir ve böylece kimliklerinin tespit edilmesini ve belirlenmesini zorlaştırabilirler. Kurumlar kamera donanımlı cihazların kullanımını yasaklayan bir politika uygulasa bile, küçük kameraların her yerde bulunması bu tehdidin devam etmesine olanak tanır. Bu tehdide karşı, kullanılan uygulamadan bağımsız olarak ekrana gizli bilgiler içeren gizli filigranlar yerleştiren yeni bir teknik önerilmiştir. Normal kullanım sırasında fark edilemeyen bu görünmez filigranlar, yakalanan görüntülerden çıkarılabilir ve veri sızıntılarının yerini ve zamanını belirlemeye yardımcı olur.

Kaynakça

  • [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
  • [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
  • [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
  • [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
  • [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
  • [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
  • [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
  • [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
  • [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
  • [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
  • [11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia.,” IEEE Trans. image Process. a Publ. IEEE Signal Process. Soc., vol. 6, no. 12, pp. 1673–1687, 1997, doi:10.1109/83.650120.
  • [12] A. M. Alattar and O. M. Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” 2004.
  • [13] M. Embar, L. F. McHugh, and W. R. Wesselman, “Printer watermark obfuscation,” in Proceedings of the 3rd annual conference on Research in information technology, Oct. 2014, pp. 15–20. doi:10.1145/2656434.2656437.
  • [14] D. Gugelmann, D. Sommer, V. Lenders, M. Happe, and L. Vanbever, “Screen watermarking for data theft investigation and attribution,” Int. Conf. Cyber Conflict, CYCON, vol. 2018-May, pp. 391–408, 2018, doi:10.23919/CYCON.2018.8405027.
  • [15] M. Piec and A. Rauber, “Real-time screen watermarking using overlaying layer,” Proc. - 9th Int. Conf. Availability, Reliab. Secur. ARES 2014, pp. 561–570, 2014, doi:10.1109/ARES.2014.83.
  • [16] R. Bai, L. Li, S. Zhang, J. Lu, and C. C. Chang, “SSDeN: Framework for Screen-Shooting Resilient Watermarking via Deep Networks in the Frequency Domain,” Appl. Sci., vol. 12, no. 19, 2022, doi:10.3390/app12199780.
Toplam 16 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Aybike Şimşek 0000-0002-1033-1597

Ömer Faruk Kerman 0009-0005-2871-3867

Yayımlanma Tarihi 1 Ocak 2024
Gönderilme Tarihi 18 Eylül 2023
Kabul Tarihi 23 Aralık 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 9 Sayı: 3

Kaynak Göster

IEEE A. Şimşek ve Ö. F. Kerman, “Screen Watermark: A Novel Approach in Detecting Digital Criminals”, GMBD, c. 9, sy. 3, ss. 612–621, 2024.

Gazi Journal of Engineering Sciences (GJES) publishes open access articles under a Creative Commons Attribution 4.0 International License (CC BY) 1366_2000-copia-2.jpg