Tcl and the Tk toolkit
Font and function word identification in document recognition
Computer Vision and Image Understanding
Progress in Document Reconstruction
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
Residual Information of Redacted Images Hidden in the Compression Artifacts
Information Hiding
An information theoretic framework for web inference detection
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Hi-index | 0.00 |
In this paper, we examine ways in which sensitive information might leak through the process of redaction. Such attacks apply known methods from document image analysis and natural language processing to recover text thought to have been obliterated for the purposes of public release. Systematically identifying and testing these weaknesses is a first step towards designing effective countermeasures. We describe our development of a prototype semi-automated system intended to accept as input a redacted document and provide feedback to the user as to whether the document might suffer from such leaks.