Protecting Confidential Documents: The Power of Hidden Anti-Leak Marks

We had a conversation with Sergey Voynov, CEO of G-71, regarding his perspective on additional means of document protection.

It is crucial to bear in mind the recurring cyber incidents that underscore the risks involved in safeguarding sensitive data. Experts are well aware that leaks, deletions, and distortions can originate from external hackers or even trusted insiders like employees, contractors, or compromised systems. Sergey emphasized the necessity of prioritizing effective measures to secure information. From his perspective, the process of ensuring document confidentiality can be segmented into three fundamental parts.

Access Control

The first part is Access Control, which focuses on preventing unauthorized individuals from accessing sensitive information. Information systems typically include Access Control tools that employ flexible rules and policies to grant or deny access based on various models. Additionally, organizations can utilize Data Classification Solutions in conjunction with Access Control systems. These solutions enable effective data protection by assigning appropriate access controls, ensuring regulatory compliance, and reducing the risk of data breaches.


A “trust but verify” approach is most suitable when working with sensitive information. Even with formal non-disclosure agreements and user training on document handling protocols, organizations still face leaks. The distressing reality highlighted in the 2023 Insider Threat Report is that insiders account for 75% of all data breaches.

Organizations employ user activity monitoring tools to track and record user actions, enhancing security measures. Data Loss Prevention (DLP) solutions assist in identifying suspicious behavior and reducing the risk of internal threats by detecting potential data leakage attempts. However, these measures alone have proven inadequate in preventing unauthorized disclosure of confidential documents. Despite implementing Access Control and Monitoring tools, past cases have revealed that users with legal access to sensitive documents can still leak them without detection. This highlights the need for an additional crucial aspect to ensure data confidentiality.


The importance of an effective investigation system cannot be overstated. While skeptics argue that these systems merely investigate leaks rather than prevent them, the experience of justice reveals that the cornerstone of crime reduction lies in the inevitability of solving crimes. If the possibility of an anonymous leak is eliminated and each leak can be traced back to its source, such incidents would be extremely rare, as the consequences for the perpetrator would be severe—at least equivalent to political or career suicide.

Detective solutions encompass various approaches, including traffic and system log analysis, as well as event correlation performed by Security Information and Event Management (SIEM) solutions. However, these solutions, although helpful in investigating incidents, often prove inadequate in preventing leaks. Malicious users are aware that their actions can be logged and raise suspicion, leading them to employ alternative methods to exfiltrate documents safely. For instance, they may resort to taking a photograph of a confidential document using their smartphone. Unfortunately, such photographs strip away classification labels and metadata hidden within the file. Additionally, a photograph serves as compelling evidence of the document’s authenticity, making it a prized possession for attackers and a severe leakage threat for organizations.

Fortunately, rapid technological advancements have given rise to modern methods of protecting confidential documents. These advancements enable the safe sharing of confidential documents with authorized users without the fear of leaks. Imagine a seemingly ordinary PDF file that authorized users can interact with just like any other document. However, this file contains a comprehensive set of user identification that allows to swiftly pinpoint the user responsible for a document leak, even if only a small fragment. This identification is achieved through hidden anti-leak marks, referred to as steganography.

While steganography alone cannot prevent a malicious user with legal access from, for example, photographing an open document on their computer screen, hidden anti-leak marks are designed to reveal the name of such a malicious user directly from the compromised document. This acts as a significant deterrent for potential violators.

Recently, hidden anti-leak marks technology has been designed to protect confidential documents. Unlike the metadata embedded in file properties, these marks are directly embedded into the visible content of the document. Although imperceptible to the human eye, the system’s algorithm can read them from any part of the document. These marks are resistant to distortion and poor photo quality, ensuring their persistence even after printing, copying, and even when the document is sent via fax (if someone still does so).


According to Sergey, unfortunately, there is currently no comprehensive system available that can address all the cybersecurity tasks faced by organizations. As a result, organizations are compelled to implement separate solutions to tackle individual tasks. This often leads to complications for users, as they are required to take additional actions in the name of cybersecurity. However, the hidden anti-leak marks technology offers a pleasant exception to this scenario. It seamlessly integrates into any information system of the organization, transforming ordinary data warehouses or email systems into secure platforms. This integration does not impose the burden of learning new systems on users. Instead, it enables organizations to effectively deter leaks of confidential documents and promptly solve such occurrences.

You may also find this interesting

LeaksID Awarded High Performer in G2’s Spring 2023 Report

G-71’s LeaksID is a patented ITM solution recognized by G2 as a High Performer in Cloud File Security. The G2 recognition confirms LeaksID’s credibility, reliability, and efficiency, making it an indispensable tool for businesses dealing with sensitive information.

How to Protect Healthcare Data from Breaches and Leaks

The article discusses the importance of safeguarding sensitive patient information in the healthcare industry. It highlights the potential risks, and offers practical tips and strategies for securing healthcare data.

Data and Document Leak Investigation

If you suspect that your company has suffered a data leak, it’s important to investigate the situation immediately so that you can take action and mitigate any potential damage.

How Classified Information Walks Out the Door

The article examines various scenarios that can lead to this situation, including unintentional or deliberate actions by employees, as well as cyber threats and vulnerabilities.


What is an Insider Threat?

How can companies counter insider threat? What types of insider leaks exist? How to reduce insider risk with invisible labeling?

Confidential Data Leaks: Who Steals and Why?

The motives for hacking, especially virtual hacking through penetration into the secret infrastructure of a company, are very diverse, as are the methods used for such purposes. Here are some examples of the most common reasons for theft.