It has been recently demonstrated, in dramatic fashion, that sensitive information thought to be obliterated through the process of redaction can be successfully recovered via a combination of manual effort, document image analysis, and natural language processing techniques. In this paper, we examine what might be revealed through redaction, exploring how known methods might be employed to detect vestigial artifacts of the pre-redacted text. We discuss the process of redaction and circumstances under which sensitive information might leak, present an outline for experimental analyses of various approaches that could be used to recover redacted material, and describe a series of increasingly stringent countermeasures to address, and in some...
Contributing our own creativity (in the form of text, image, audio, and video) to the pool of online...
Although computer forensics is frequently related to the investigation of computer crimes, it can al...
Many approaches have been used or proposed for providing security for information dissemination over...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
In the past decade, there have been many well-publicized cases of source code leaking from different...
Each copy of a text document can be made different in a nearly invisible way by repositioning or mod...
Microsoft’s Compound File Binary Format can contain information that is hidden but recoverable, as a...
Abstracf- Modern computer networks make it possible to distribute documents quickly and economically...
In this work recovery of text documents is addressed. Text documents are watermarked using pixel fli...
Empirical thesis.Bibliography: pages 51-571. Introduction -- 2. Background -- 3. Formal definitions ...
An automated interactive redaction assistant prototype was developed. Based on the Web 1T 5-gram cor...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
It is very common that some useful contents of documents are lost or hidden intentionally or acciden...
Abstract: Document forgery is an increasing problem for both private companies and public administra...
There has been a persistent requirement for safeguarding documents and the data they contain, either...
Contributing our own creativity (in the form of text, image, audio, and video) to the pool of online...
Although computer forensics is frequently related to the investigation of computer crimes, it can al...
Many approaches have been used or proposed for providing security for information dissemination over...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
In the past decade, there have been many well-publicized cases of source code leaking from different...
Each copy of a text document can be made different in a nearly invisible way by repositioning or mod...
Microsoft’s Compound File Binary Format can contain information that is hidden but recoverable, as a...
Abstracf- Modern computer networks make it possible to distribute documents quickly and economically...
In this work recovery of text documents is addressed. Text documents are watermarked using pixel fli...
Empirical thesis.Bibliography: pages 51-571. Introduction -- 2. Background -- 3. Formal definitions ...
An automated interactive redaction assistant prototype was developed. Based on the Web 1T 5-gram cor...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
It is very common that some useful contents of documents are lost or hidden intentionally or acciden...
Abstract: Document forgery is an increasing problem for both private companies and public administra...
There has been a persistent requirement for safeguarding documents and the data they contain, either...
Contributing our own creativity (in the form of text, image, audio, and video) to the pool of online...
Although computer forensics is frequently related to the investigation of computer crimes, it can al...
Many approaches have been used or proposed for providing security for information dissemination over...