On the Possibilities of Reconstructing Images of Textual Documents Obtained by Detecting Compromised Emanation from Computer Monitors
Borko Đaković 1
, Nenad Stojanović2
,
Milena Grdović3
and Jasmina Kovačević 4
1 University of Belgrade, School of Electrical Engineering and Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia
2 University of Defence, Military Academy and Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia
3 Center for Applied Mathematics and Electronics, Belgrade, Republic of Serbia
4 University of Defence, Military Academy, Belgrade, Republic of Serbia
borko.djakovic@vs.rs
nivzvk@hotmail.com
milena.grdovic@gmail.com
dzesmin_89@hotmail.com
DOI: 10.46793/BISEC25.230DJ
ABSTRACT: The paper shows the feasibility of reconstructing signals from a computer monitor by intercepting its compromising electromagnetic radiation. For the detection and reconstruction process, the pixel clock frequency of the HDMI interface was utilized. Based on this pixel frequency, its integer multiples were calculated, and the corresponding center frequencies were used to detect the unintended emissions. Reconstructed images are presented across six different frequency bands, representing the spectral harmonics of the pixel clock frequency. Furthermore, the paper discusses protective measures to prevent the leakage of sensitive information via compromising electromagnetic emanations.
KEYWORDS: Compromised Emanation, HDMI, Monitors, TEMPEST
ACKNOWLEDGMENT: This research has been a part of the project No. CPME/2/21-25 supported by the Ministry of Defence, Republic of Serbia.
REFERENCES:
- Jovanović, B., Tot I., Ilić, S.: Contemporary cryptography: Recent achievement and research perspectives. In: 11th International Scientific Conference on Defensive Technologies (OTEH), pp. 376-380, Tara, Serbia, October 09-11 (2024), doi: 10.5937/OTEH24067J
- Antić, V., Protić, D., Stanković, M., Prodanović, R., Manić, M., Ostojić, G., Stankovski, S., Kučević, D.: Protecting data at risk of unintentional electromagnetic emanation: TEMPEST profiling. Applied Sciences, 14, 4830 (2024), doi: 10.3390/app14114830
- Hayashi, Y.: State-of-the-art research on electromagnetic information security. Radio Sci-ence, 51(7), 1213-1219 (2016), doi: 10.1002/2016RS006034
- Meulemeester, P. De., Scheers, B., Vandenbosch, G. A.: Reconstructing video images in color exploiting compromising video emanations. In: International Symposium on Electro-magnetic Compatibility-EMC EUROPE, pp. 1-6, Rome, Italy, September 23-25 (2020), doi: 10.1109/EMCEUROPE48519.2020.9245775
- Ulas, C., Sahin, S., Memisoglu, E., Asık, U., Karadeniz, C., Kılıc, B., Sarac, U.: Automatic tempest test and analysis system design. Internatinal Journal on Cryptography and Infor-mation Security (IJCIS), 4(3), 1-12 (2014), doi: 10.5121/ijcis.2014.4301
- Van Eck, W.: Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security, 4(4), 269-286 (1985), doi: 10.1016/0167-4048(85)90046-X
- Grdović, M., Protić, D., Antić, V., Jovanović, B.: Screen reading: electromagnetic infor-mation leakage from the computer monitor. Vojnotehnički glasnik/Military Technical Couri-er, 70(4), 836-855 (2022), doi: 10.5937/vojtehg70-38930
- Vizitiu, A. M., Sandu, M. A., Dobrescu, L., Focsa, A., Molder, C. C.,: Comparative ap-proach to de-noising TEMPEST video frames. Sensors, 24, 6292 (2024), doi: 10.3390/s24196292
- Fernández, S., Martínez, E., Varela, J., Musé, P., Larroca, F.: Deep-TEMPEST: Using deep learning to eavesdrop on HDMI from its unintended electromagnetic emanations. In: 13th Latin-American Symposium on Dependable and Secure Computing, pp. 91-100, Recife, Brazil, November 26-29 (2024), doi: 10.1145/3697090.3697094
- Jovanović, S., Protić, D., Antić, V., Grdović, M., Bajić, D.: Security of wireless keyboards: Threats, vulnerabilities and countermeasures. Vojnotehnički glasnik/Military Technical Cou-rier, 71(2), 296-315 (2023), doi: 10.5937/vojtehg71-43239
- Peng, Y., Zhang, J., Mao, J., Cui, M.: A signal-denoising method for electromagnetic leak-age from USB keyboards. Electronics, 12, 3647 (2023), doi: 10.3390/electronics12173647
- Trip, B., Butnariu, V., Vizitiu, M., Boitan, A., Halunga, S.: Analysis of compromising video disturbances through power line. Sensors, 22(1), 267 (2021), doi: 10.3390/s22010267
- Kubiak, I., Przybysz, A., Musial, S.: Possibilities of electromagnetic penetration of displays of multifunction devices. Computers, 9(3), 62, 2020, doi: 10.3390/computers9030062
- Long, Y., Jiang, Q., Yan, C., Alam, T., Ji, X., Xu, W., Fu, K.: EM eye: Characterizing elec-tromagnetic side-channel eavesdropping on embedded cameras. In: ACM the Network and Distributed System Security (NDSS), San Diego, CA, USA, February 26-March 01 (2024), doi: 10.14722/ndss.2024.24552
- Boitan, A., Halunga, S., Bindar, V., Fratu, O.: Compromising electromagnetic emanations of usb mass storage devices. Wireless Personal Communications, 126(1), 97-122 (2022), doi: 10.1007/s11277-020-07329-8
- Boitan, A., Kubiak, I., Halunga, S., Prybysz, A., Stańczak, A.: Method of colors and secure fonts used for source shaping of valuable emissions from projector in electromagnetic eavesdropping process. Symmetry, 12, 1908 (2020), doi: 10.3390/sym12111908
- Kubiak, I.: Laser printer as a source of sensitive emissions. Turkish Journal of Electrical En-gineering and Computer Sciences, 26(3), 1354-1366 (2018), doi: 10.3906/elk-1704-9
- Đaković, B., Stojanović, N., Grdović, M., Vujatović, B.: Analysis of restoration of images captured by detecting unintentional computer monitor emanation using simple tools. (In Ser-bian), In: LXIX Conference on Electrical, Electronic and Computing Engineering, ETRAN, pp. 108-113, Čačak, Serbia, June 9-12 (2025), doi: 10.69994/69E25020
- Sun, X., Zheng, Y., Xi, W., Chen, Z., Chen, Z., Hao, H., Jiang, Z., Zhong, S.: TEMPEST-LoRa: Cross-technology covert communication. arXiv preprint arXiv:2506.21069, June (2025), doi: 10.48550/arXiv.2506.21069
- Choi, D. H., Lee, E., Yook, J. G.: Reconstruction of video information through leaked elec-tromagnetic waves from two VDUs using a narrow band-pass filter. IEEE Access, 10, 40307-40315 (2022), doi: 10.1109/ACCESS.2022.3162686
- Liu, T., Li, Y.: Electromagnetic information leakage and countermeasure technique. Translat-ed by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao. Springer (2019), doi: 10.1007/978-981-10-4352-9
- Durakovskiy, A. P., Kessarinskiy, L. N., Simakhin, E. A.: Detection of compromising radia-tion from modern data transfer interfaces using the example of high definition multimedia in-terface. In: IOP Conference Series: Materials Science and Engineering, 1069(1), 012026 (2021), doi: 10.1088/1757-899X/1069/1/012026
- Mittal, A., Soundararajan, R. Bovik, A. C.: Making a “completely blind” image quality analyzer. IEEE Signal Processing Letters, 20(3), 209-212 (2013), doi: 10.1109/LSP.2012.2227726
- Kubiak, I., Boitan, A. Halunga, S.: Assessing the security of TEMPEST fonts against elec-tromagnetic eavesdropping by using different specialized receivers. Applied Sciences, 10(8), 2828 (2020), doi: 10.3390/app10082828
- Suzuki, Y., Masugi, M., Tajima, K., Yamane, H.: Countermeasures to prevent eavesdrop-ping on unintentional emanations from personal computers. NTT Technical Review, 6(10), 6-12 (2008), doi: 10.53829/ntr200810sf2
- Martin, M., Sunmola, F., Lauder, D.: Unintentional compromising electromagnetic emana-tions from IT equipment: A concept map of domain knowledge. Procedia Computer Science, 200, 1432-1441 (2022), doi: 10.1016/j.procs.2022.01.344
- ITU Recommendation ITU-T K.115, Mitigation methods against electromagnetic sequrity threats, Series K: Protection against interference, ITU-T Telecommunication Standardization Sector of ITU: Geneva, Switzerland (2015).
IZVOR: Proceedings of the 16th International Conference on Business Information Security BISEC’2025