%0 Conference Proceedings %T Detecting Data Leakage from Hard Copy Documents %+ National Institute of Technology Rourkela %+ Maharishi Dayanand University [Rohtak] %+ Indraprastha Institute of Information Technology [New Delhi] (IIIT-Delhi) %+ Ministry of Information Technology [New Delhi] %+ National Institute of Technology [Kurukshetra] %A Nayak, Jijnasa %A Singh, Shweta %A Chhabra, Saheb %A Gupta, Gaurav %A Gupta, Monika %A Gupta, Garima %Z Part 2: Forensic Techniques %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th IFIP International Conference on Digital Forensics (DigitalForensics) %C New Delhi, India %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer International Publishing %3 Advances in Digital Forensics XIV %V AICT-532 %P 111-124 %8 2018-01-03 %D 2018 %R 10.1007/978-3-319-99277-8_7 %K Document fraud %K data leakage detection %K font pixel manipulation %Z Computer Science [cs]Conference papers %X Document fraud has evolved to become a significant threat to individuals and organizations. Data leakage from hard copy documents is a common type of fraud. This chapter proposes a methodology for analyzing printed and photocopied versions of confidential documents to identify the source of a leak. The methodology incorporates a novel font pixel manipulation algorithm that embeds data in the pixels of certain characters of confidential documents in a manner that is imperceptible to the human eye. The embedded data is extracted from a leaked printed or photocopied document to identify the specific document that served as the source. The embedded data is robust in that it can withstand errors introduced by printing, scanning and photocopying documents. Experimental results demonstrate the efficiency, robustness and security of the methodology. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01988849/document %2 https://inria.hal.science/hal-01988849/file/472401_1_En_7_Chapter.pdf %L hal-01988849 %U https://inria.hal.science/hal-01988849 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-532