Research Article

Screen Watermark: A Novel Approach in Detecting Digital Criminals

Volume: 9 Number: 3 January 1, 2024
TR EN

Screen Watermark: A Novel Approach in Detecting Digital Criminals

Abstract

Organizations need to safeguard their information systems not only against external cyber attackers but also against malicious individuals within their ranks who may exploit their access to steal sensitive information for personal gain. Particularly, these malevolent insiders can covertly monitor and capture documents displayed on computer screens using digital cameras. By opting for digital cameras over more traditional communication methods like email, perpetrators can evade digital traces, making it harder to detect and establish their identity. Even if institutions were to enforce a policy banning the use of camera-equipped devices, the ubiquity of small cameras allows this threat to persist. In response to this menace, a novel technique has been proposed to counter it- embedding hidden watermarks containing confidential information onto the screen, irrespective of the application in use. These invisible watermarks, imperceptible during regular usage, can be extracted from captured images, aiding in pinpointing the location and time of data leaks.

Keywords

Screen Watermarking , Steganography , Data Theft , Malicious Insiders

References

  1. [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
  2. [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
  3. [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
  4. [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
  5. [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
  6. [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
  7. [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
  8. [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
  9. [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
  10. [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
IEEE
[1]A. Şimşek and Ö. F. Kerman, “Screen Watermark: A Novel Approach in Detecting Digital Criminals”, GJES, vol. 9, no. 3, pp. 612–621, Jan. 2024, [Online]. Available: https://izlik.org/JA79MM86DT