{"title":"MailLeak: Obfuscation-Robust Character Extraction Using Transfer Learning","authors":"Wei Wang, Emily Sallenback, Zeyu Ning, Hugues Nelson Iradukunda, Wenxing Lu, Qingquan Zhang, Ting Zhu","doi":"10.1145/3453142.3491421","DOIUrl":null,"url":null,"abstract":"The obfuscated images on envelopes are believed to be secure and have been widely used to protect the information contained in a mail. In this paper, we present a new algorithm that can conduct character recognition from obfuscated images. Specifically, by using a transfer learning method, we prove that an attacker can effectively recognize the letter without unfolding the envelope. We believe that the presented method reveals the potential threat to current postal services. To defend against the proposed attack, we introduce a context-related shader to prevent such threats from occurring.","PeriodicalId":6779,"journal":{"name":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"152 6 1","pages":"459-464"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3453142.3491421","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The obfuscated images on envelopes are believed to be secure and have been widely used to protect the information contained in a mail. In this paper, we present a new algorithm that can conduct character recognition from obfuscated images. Specifically, by using a transfer learning method, we prove that an attacker can effectively recognize the letter without unfolding the envelope. We believe that the presented method reveals the potential threat to current postal services. To defend against the proposed attack, we introduce a context-related shader to prevent such threats from occurring.