GB2411330A - A means for document security tracking - Google Patents
A means for document security tracking Download PDFInfo
- Publication number
- GB2411330A GB2411330A GB0403454A GB0403454A GB2411330A GB 2411330 A GB2411330 A GB 2411330A GB 0403454 A GB0403454 A GB 0403454A GB 0403454 A GB0403454 A GB 0403454A GB 2411330 A GB2411330 A GB 2411330A
- Authority
- GB
- United Kingdom
- Prior art keywords
- document
- documents
- copy
- uniquely
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
- H04N1/32219—Spatial or amplitude domain methods involving changing the position of selected pixels, e.g. word shifting, or involving modulating the size of image components, e.g. of characters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3205—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3212—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
- H04N2201/3215—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a time or duration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3226—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image
- H04N2201/323—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image for tracing or tracking, e.g. forensic tracing of unauthorized copies
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Character Discrimination (AREA)
Abstract
The invention described here consists of a document coding system that will give a single person, company or organisation the ability to tack leaked or copied confidential documents, issued to different departments or associates within an organisation, back to the department or person of the non approved document copy. It will give each printed copy of a document a unique fingerprint. The invention described herein may achieve this by encoding information in a word processed document using subtle changes in font, spacing and page layout, for example, to reflect the time, user and printer information. This will provide a way of tracking a document to the time and place of creation. The invention includes means for either automatically decoding information in documents by using optical character recognition (OCR) or document image analysis, for example, or to provide a visual means to assist manual document decoding.
Description
2411 330 A means for document security tracking
Introduction
The invention described here consists of a document coding system that will give a single person, company or organization the ability to track leaked or copied confidential documents, issued to different departments or associates within an organization, back to the department or person of the non approved document copy. It will give each printed copy of a document a unique fingerprint.
The invention described herein may achieve this by encoding information in a word processed document using subtle changes in font, spacing and page layout, for example, to reflect the time, user and printer information. This will provide a way of tracking a document to the time and place of creation.
The application of this idea will primarily be in areas where the leaking of confidential documents is a concern, such as governments.
The invention includes means for either automatically decoding information in documents by using optical character recognition (OCR) or document image analysis, for example, or to provide a visual means to assist manual document decoding.
Typically the original document is typed, or otherwise compiled, on a modified word processor system (such as MS WORD for example) and an overlay device is used in conjunction with the word processor system to control the security process.
An encoding system will reside within the overlay device to control document history, copy protection, a list of hard copy recipients and other functions.
This overlay device will typically have a print and True Type Font (TTF) controller interface for document printing anu the encoded word processor document file will typically be given a name extension of *.TFD The document will then only be editable on the original machine (for example a Personal Computer) with the correct security.
A typical encryption and coding process A document may be encoded in the following manner. The soft copy of the document will be encoded in a unique manner. All document history i.e. Author, Originator, hard copy history and hard copy approval security data will be encoded along with the document text. The main coding of the hard copy of each document copy will be done in the printing of each individual document by software manipulation of the TTF in which the document is being printed.
For each copy of the document the TTF will be manipulated in a different pattern within the body of the text and hence every time the document is printed it will contain a different fingerprint. Typically, letters and punctuation will be slightly changed or the distance between space characters altered for example. Each change in every document copy that is printed will be recorded within the original file along with the identity of who produced the copy and when.
Document illegal copy tracing The overlay device in conjunction with the word processor will be able to produce an on screen crib display showing all the TTF print modifications within each document printed copy. By analysing the crib display the originator or security department can determine who and where a photocopy, or scanned copy of the original document came from.
Examples of on page encoding Some examples of how an encoded document may be implemented are as follows. In Example I the size and spacing of the characters are altered to give a unique identification to each document. At the same time the information content is not altered and the two documents will appear, to all intents and proposes to be the same.
Example 1
TO 1.1 "Confidential Information" means; all information I. :L 'Confidential Information" means all information Example 2 shows typically how the characters themselves may be modified very slightly to enable a unique identification to be assigned to the printed document. Again this modification will not be readily apparent to a human reader but can be determined from a closer inspection.
Example 2
Before After
_ _
Before After f f Before After e e Identification of documents may be carried out in a variety of ways including automatic methods such as OCR (or other forms of scanning) or may be carried out manually with the aid of a crib sheet that is generated from the original document.
Preferred Embodiments The following are descriptions of some preferred embodiments of the invention. Two specific examples are given although many other embodiments of the invention are possible for example a third party application.
Both embodiments require plug-in applications to a word processor / authoring package used to create and edit documents. The plug-in is to allow access to the underlying text of the document and to carry out transformation of the fonts and spaces in the document.
XML is increasingly used as an authoring language and as a base format of many word processor documents. Tools and technologies available for manipulation of XML, such as XSLT would facilitate the encoding process. XSL Transformation of the XM:L would produce a visible representation of the coded characters to provide a route for document tracking.
Client - Server Version The authoring application has a plug-in (see Figure 1), which intercepts or over-rides the print command and directs the document to the server. The server application saves mete data about the document, its requester etc. It adds this document to the repository. It also encodes the document with a "key", which is linked with the entry in the meta-data store.
This encoded document is sent to be printed and is saved to the document repository.
The document viewer decodes the document using the mete data and knowledge of the encoding algorithm and highlights the changes. This allows a viewer to visibly check the physical document against all printed versions.
Standalone Conf Duration This is method is one in which mete data (time, printer, user etc) is encoded directly into the document on the client machine. This happens prior to printing using a plug-in similar to the client server configuration. s
Decoding of the document can then be performed by application software and OCR to check the documents font changes and translate those into the date, user etc.
Claims (7)
- Claims 1. A means for encoding documents such that it is possible touniquely identify the document and its source from its printed appearance wherein the documents are unique by virtue of being coded with small differences in their printed appearance.
- 2. A means as described in claim 1 wherein the documents are stored on an electronic retrieval system such as a word processor, computer or similar device.
- 3. A means as described in claim 1 wherein the documents are uniquely coded with small differences in the font used to print them out.
- 4. A means as described in claim l wherein the documents are uniquely coded by the spacing applied between the words, letters, lines and/or paragraphs constituting the document.
- 5. A means as described in claim I wherein the document is uniquely coded by the relative spacing between the words, letters, lines and/or paragraphs constituting the document.
- 6. A means as described in claim 1 wherein the documents can be uniquely identified automatically using optical character recognition or other suitable scanning techniques.
- 7. A means as described in claim I wherein the documents can be uniquely identified manually with the aid of a suitable visual reproduction of the original document illustrating the coding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0403454A GB2411330A (en) | 2004-02-17 | 2004-02-17 | A means for document security tracking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0403454A GB2411330A (en) | 2004-02-17 | 2004-02-17 | A means for document security tracking |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0403454D0 GB0403454D0 (en) | 2004-03-24 |
GB2411330A true GB2411330A (en) | 2005-08-24 |
Family
ID=32039846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0403454A Withdrawn GB2411330A (en) | 2004-02-17 | 2004-02-17 | A means for document security tracking |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2411330A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008154381A1 (en) * | 2007-06-09 | 2008-12-18 | Bank Of America Corporation | Encoded data security mechanism |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US8446607B2 (en) | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8713468B2 (en) | 2008-08-06 | 2014-04-29 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US10198587B2 (en) | 2007-09-05 | 2019-02-05 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0660275A2 (en) * | 1993-12-20 | 1995-06-28 | AT&T Corp. | Document copying deterrent method |
US5467447A (en) * | 1990-07-24 | 1995-11-14 | Vogel; Peter S. | Document marking system employing context-sensitive embedded marking codes |
WO2003065226A1 (en) * | 2002-01-25 | 2003-08-07 | Storage Zip, Inc. | Document authentication and verification |
-
2004
- 2004-02-17 GB GB0403454A patent/GB2411330A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5467447A (en) * | 1990-07-24 | 1995-11-14 | Vogel; Peter S. | Document marking system employing context-sensitive embedded marking codes |
EP0660275A2 (en) * | 1993-12-20 | 1995-06-28 | AT&T Corp. | Document copying deterrent method |
US5629770A (en) * | 1993-12-20 | 1997-05-13 | Lucent Technologies Inc. | Document copying deterrent method using line and word shift techniques |
WO2003065226A1 (en) * | 2002-01-25 | 2003-08-07 | Storage Zip, Inc. | Document authentication and verification |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8590002B1 (en) | 2006-11-29 | 2013-11-19 | Mcafee Inc. | System, method and computer program product for maintaining a confidentiality of data on a network |
US8621008B2 (en) | 2007-04-26 | 2013-12-31 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
US8943158B2 (en) | 2007-04-26 | 2015-01-27 | Mcafee, Inc. | System, method and computer program product for performing an action based on an aspect of an electronic mail message thread |
WO2008154381A1 (en) * | 2007-06-09 | 2008-12-18 | Bank Of America Corporation | Encoded data security mechanism |
US9215197B2 (en) | 2007-08-17 | 2015-12-15 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US8199965B1 (en) | 2007-08-17 | 2012-06-12 | Mcafee, Inc. | System, method, and computer program product for preventing image-related data loss |
US10489606B2 (en) | 2007-08-17 | 2019-11-26 | Mcafee, Llc | System, method, and computer program product for preventing image-related data loss |
US10198587B2 (en) | 2007-09-05 | 2019-02-05 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US11645404B2 (en) | 2007-09-05 | 2023-05-09 | Mcafee, Llc | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session |
US8446607B2 (en) | 2007-10-01 | 2013-05-21 | Mcafee, Inc. | Method and system for policy based monitoring and blocking of printing activities on local and network printers |
US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US9843564B2 (en) | 2008-03-14 | 2017-12-12 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
US8713468B2 (en) | 2008-08-06 | 2014-04-29 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US9077684B1 (en) | 2008-08-06 | 2015-07-07 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
US9531656B2 (en) | 2008-08-06 | 2016-12-27 | Mcafee, Inc. | System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy |
Also Published As
Publication number | Publication date |
---|---|
GB0403454D0 (en) | 2004-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5544045A (en) | Unified scanner computer printer | |
US7447329B2 (en) | Apparatus and method for producing a document verifiable for its forgery or alteration, and apparatus and method for authenticating the document | |
JP4767750B2 (en) | System and method for controlling duplication of documents containing confidential information | |
US7865042B2 (en) | Document management method using barcode to store access history information | |
Khadam et al. | Digital watermarking technique for text document protection using data mining analysis | |
US5974548A (en) | Media-independent document security method and apparatus | |
EP1961205B1 (en) | Methods and apparatus for securely displaying digital images | |
US5765176A (en) | Performing document image management tasks using an iconic image having embedded encoded information | |
Hecht | Embedded data glyph technology for hardcopy digital documents | |
US20090279143A1 (en) | Securing printed output | |
US20240012913A1 (en) | Systems and methods for creating enhanced documents for perfect automated parsing | |
WO1989007819A1 (en) | Document marking system | |
Heather | Turnitoff: Identifying and fixing a hole in current plagiarism detection software | |
Alkawaz et al. | Concise analysis of current text automation and watermarking approaches | |
Memon et al. | EVALUATION OF STEGANOGRAPHY FOR URDU/ARABIC TEXT. | |
JP3275766B2 (en) | Concealed image processing system | |
GB2411330A (en) | A means for document security tracking | |
WO2015140562A1 (en) | Steganographic document alteration | |
US7987494B1 (en) | Method and apparatus providing end to end protection for a document | |
Khadam et al. | Data aggregation and privacy preserving using computational intelligence | |
Jensen | Fingerprinting text in logical markup languages | |
TAKIZAWA et al. | 3-8 Information Hiding on Digital Docu-ments by Adjustment of New-line Posi-tions | |
Aru et al. | Detailed Examination of Information Hiding Techniques for Copyright Protection of Text Documents | |
Lavagnino | The analytical bibliography of electronic texts | |
JPH10124490A (en) | Device for recognizing mark of digital document and method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |