By personalizing content with multiple types of invisible marks, EchoMark helps foster a sense of responsibility among recipients of private information. Integrate EchoMark with your Exchange and Google Workspace accounts, ensuring uninterrupted content sharing without any user intervention.
When information that has been protected by EchoMark leaks outside of its intended audience, EchoMark gives you the tools to quickly find the source of a leak. Our tool provides a detailed report when you upload a leaked document or even a photo or snapshot of a leaked message. Connect with us to see how EchoMark can protect your private information.
After running a leak investigation in EchoMark, you'll be presented with a leak report. The leak report gives high-level match result as well as detailing the results of each detector that was run against the leaked artifact. Each leak report is a little different based on the form the leak came in, so your leak reports might look different. Keep reading for a complete breakdown of the leak report.
The outcome of the leak analysis is summarized hereas a quick reference.
Our technology finds the formatting marks that EchoMark embedded in the content using either text detection or computer vision for images. The invisible watermark detector compares the marks it finds to the marks in each marked version of the content to find the best match.
The matching marks are shown in a bar graph to the right of the chance of error and possibility of impersonation.
The chance of error is a measure of detector reliability for the artifact type submitted based on experimental tests. If the chance of error is listed at 0%, it means that there is less than one in a trillion chance of error.
Depending on the image quality, EchoMark's computer vision may not be able to detect all embedded marks - if there are too few found, EchoMark returns a "no match" or "inconclusive."Our team can still often help you refine the investigation in these cases.
If AI rephrasing was used in your marked copy, EchoMark will analyze the phrases to determine which marked copy contains the specific combination of phrasings contained in the leak. If few phrases are marked, it's possible that this detector will return multiple, high-confidence results that all contain the phrases used in the leak. In these cases, the Invisible watermark detector can help further identify the leak source.
Information about the leaked file used for the investigation is displayed here at the end of the report. This information can help with debugging inconclusive matches.
This indicates the user-selected original file that was compared against for the leak investigation.
Your results will vary depending on the quality and type of artifact that you used to run a leak investigation. At a high level there are only three types of Leak Report Outcomes.
Exact matches are found if the leaked artifact is a marked file with the Digital Stamp intact. In the case of an exact match, EchoMark is 100% confident that the leaked file matches a particular marked copy because it means that the detector was able to find our unguessable forensic key.
High confidence matches occur when an artifact is uploaded for the leak investigation and our detection system finds that it matches a marked copy with a very high level of precision and accuracy.
Sometimes our computer vision detection system is not confident in determining a clear match. This might be due to a low quality image or one that is too skewed or distorted. In those cases, you can reach out to our support team and we'll help you narrow down the hunt.