April 26, 2023, 1:10 a.m. | Aleksey Yakushev, Yury Markin, Dmitry Obydenkov, Alexander Frolov, Stas Fomin, Manuk Akopyan, Alexander Kozachok, Arthur Gaynov

cs.CR updates on arXiv.org arxiv.org

This paper focuses on investigation of confidential documents leaks in the
form of screen photographs. Proposed approach does not try to prevent leak in
the first place but rather aims to determine source of the leak. Method works
by applying on the screen a unique identifying watermark as semi-transparent
image that is almost imperceptible for human eyes. Watermark image is static
and stays on the screen all the time thus watermark present on every captured
photograph of the screen. The …

cam confidential document documents human investigation key leak leaks networks neural networks photographs screen the key watermarking

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium