Skip to main content

A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes

  • Conference paper
Information Hiding (IH 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5284))

Included in the following conference series:

Abstract

The security problem of screen image leakage on a cathode-ray tube (CRT) through electromagnetic radiation from several meters away, “transient electro-magnetic pulse emission surveillance technology” (TEMPEST), has attracted wide interest by security researchers since Van Eck wrote about this problem. On the industry side, the problem is considered a serious risk, especially for computers used in operations related to such areas as critical business and information management at banks. To solve the problem, techniques for reducing the S/N ratio of emanating information by signal reduction and noise generation have been investigated as countermeasures. We have developed a technique that introduces noise to displayed images. With this technique there is less of a quality penalty on the visible images. This is a result of using a human visual characteristic known as additive color mixing, which occurs when an eye is continuously exposed to quickly changing colors. Although we used hardware to implement this technique, using software for low-cost systems is possible. We tested and confirmed the effectiveness of the technique using both analog and digital systems: a computer connected with a CRT or LCD by an analog RGB cable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. van Eck, W.: Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? Computer & Security 4, 269–286 (1985)

    Article  Google Scholar 

  2. Kuhn, M.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: 4th Workshop on Privacy Enhancing Technologies, pp. 1–20 (2004)

    Google Scholar 

  3. Kuhn, M.: Compromising emanations: eavesdropping risks of computer displays. University of Cambridge Technical Report Number 577 (December 2003)

    Google Scholar 

  4. Kuhn, M., Anderson, R.: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 124–142. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Tanaka, H., Takizawa, O., Yamamura, A.: Evaluation and Improvement of TEMPEST fonts. In: Lim, C.H., Yung, M. (eds.) WISA 2004, vol. 3325, pp. 457–469. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Shiwei, D., Jiadong, X., Chenjiang, G.: Bit error rate of a digital radio eavesdropper on computer CRT monitors. In: IEEE International Symposium on Communications and Information Technology (ISCIT), vol. 2, pp. 1093–1099 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Watanabe, T., Nagayoshi, H., Sako, H. (2008). A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88961-8_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88960-1

  • Online ISBN: 978-3-540-88961-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics