Paper
17 January 2005 Information leakage through document redaction: attacks and countermeasures
Daniel P. Lopresti, A. Lawrence Spitz
Author Affiliations +
Proceedings Volume 5676, Document Recognition and Retrieval XII; (2005) https://doi.org/10.1117/12.589552
Event: Electronic Imaging 2005, 2005, San Jose, California, United States
Abstract
It has been recently demonstrated, in dramatic fashion, that sensitive information thought to be obliterated through the process of redaction can be successfully recovered via a combination of manual effort, document image analysis, and natural language processing techniques. In this paper, we examine what might be revealed through redaction, exploring how known methods might be employed to detect vestigial artifacts of the pre-redacted text. We discuss the process of redaction and circumstances under which sensitive information might leak, present an outline for experimental analyses of various approaches that could be used to recover redacted material, and describe a series of increasingly stringent countermeasures to address, and in some cases eliminate, the perceived threat.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Daniel P. Lopresti and A. Lawrence Spitz "Information leakage through document redaction: attacks and countermeasures", Proc. SPIE 5676, Document Recognition and Retrieval XII, (17 January 2005); https://doi.org/10.1117/12.589552
Lens.org Logo
CITATIONS
Cited by 9 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image processing

Document image analysis

Analytical research

Information security

Computer security

Pattern recognition

Computer engineering

RELATED CONTENT

Authentication of travel and breeder documents
Proceedings of SPIE (September 12 2021)
Biometric template revocation
Proceedings of SPIE (August 25 2004)
Research on computer virus database management system
Proceedings of SPIE (January 12 2012)

Back to Top