Lopresti, D., Spitz, A.L.: Quantifying information leakage in document redaction. Kelly, D., Foster, B.: A process for electronic document redaction. Adobe Acrobat User community Newsletter (2006), Johnson, D.: Redacting pdf files: A survey of tools. Journal of Computer and System Sciences 28, 270–299 (1984) Goldwasser, S., Micali, S.: Probabilistic encryption. In: SPIE Multimedia Systems and Applications, pp. IEEE Transaction of Image Processing 12, 230–235 (2003)įridrich, J., Goljan, M., Du, R.: Steganalysis based on jpeg compatibility. SIAM, Philadelphia (1992)įan, Z., de Queiroz, R.: Identification of bitmap compression history: Jpeg detection and quantizer estimation. Nature 429, 116 (2004)ĭaubechies, I.: Ten Lecture Notes on Wavelets. 139–148 (2005)īutler, D.: US intelligence exposed as student decodes Iraq memo. In: IEEE International Conference on Pervasive Computing and Communications, pp. US Patent (5581682) (1996)īerger, S., Kjeldsen, R., Pinhanez, C., Podlaseck, M., Narayanaswami, C., Raghunath, M.: Using symbiotic displays to view sensitive information in public. This process is experimental and the keywords may be updated as the learning algorithm improves.Īnderson, G.B., Gross, B.P., Marlin, J.W., Tucker, V.D.: Method for storing and retrieving annotations and redactions in final form documents. These keywords were added by machine and not by the authors. Hence, our findings highlight a subtle attack that must be considered when declassifying images. Although the requirements are stringent, it will not be surprising that redacted images matching the requirements can be found in the public domain. We found that, if a redacted image is compressed in higher bit rate compared to the compression of the original image, then the correct template can be identified with noticeable certainty. We give two approaches and investigate their effectiveness when the image is compressed using JPEG or wavelet-based compression scheme. We consider a scenario where the goal of the adversary is to identify the original among a few templates. Although such residual information is insufficient to reconstruct the original, it can be exploited when the content has low entropy. Hence, information of the original pixels might not be completely purged by replacing pixels in the compressed image. Since digital images are usually lossily compressed via quantization in the frequency domain, each pixel in the spatial domain will be “spread” to its surroundings, similar to the Gibbs-effect, before it is redacted. Our goal is to study the effectiveness of this simple method in purging information. A common way to remove the sensitive information replaces the pixels in the sensitive region with black or white values. Many digital images need to be redacted before they can be disseminated.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |