2019
DOI: 10.3390/computers8040070
|View full text |Cite
|
Sign up to set email alerts
|

Font Design—Shape Processing of Text Information Structures in the Process of Non-Invasive Data Acquisition

Abstract: Computer fonts can be one of solutions supporting a protection of information against electromagnetic penetration. This solution is called "Soft TEMPEST". However, not every font has features which counteract the process of electromagnetic infiltration. The distinctive features of characters of font determine it. This article presents two sets of new computer fonts. These fonts are fully usable in everyday work. Simultaneously they make it impossible to obtain information using the non-invasive method. Names o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…The article presents the results of tests and analyses in the field of using the acoustic signals in the non-invasive acquisition of data [17][18][19] on the shape of objects printed using a 3D printer. The acoustic signals usable for the acoustic infiltration process are generated by the stepper motors that control the printhead and platform movements.…”
Section: Discussionmentioning
confidence: 99%
“…The article presents the results of tests and analyses in the field of using the acoustic signals in the non-invasive acquisition of data [17][18][19] on the shape of objects printed using a 3D printer. The acoustic signals usable for the acoustic infiltration process are generated by the stepper motors that control the printhead and platform movements.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally visual analyses and correlation analyses were carried out for each secure font. The analyses were based on values of character error rate (CER) [20]. The tests were performed with a Fujitsu Siemens laptop, Lifebook C110.…”
Section: Military Communication Institutementioning
confidence: 99%
“…The effectiveness of the electromagnetic infiltration can be limited in several ways: limiting levels of electromagnetic emissions correlated (having distinctive features) with processed information [14][15][16][17], a disturbance of existing revealing emissions [18,19] or appropriate shaping of the emission source to eliminate features that enable identification e.g., of text data characters [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The information infiltration process represents the access to information processed by the equipment through reception and processing techniques of electromagnetic emissions generated by the targeted equipment without having physical access to it. The risks associated with the process of electromagnetic infiltration are very often described and analyzed in relation to computers [5][6][7], monitors [5,[8][9][10][11] or laser printers [12][13][14][15]. Each such device becomes a source of undesirable emissions, which enable non-invasive acquisition of information.…”
Section: Introductionmentioning
confidence: 99%