{"id":18281,"date":"2025-03-14T13:12:33","date_gmt":"2025-03-14T17:12:33","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=18281"},"modified":"2025-11-12T03:38:05","modified_gmt":"2025-11-12T08:38:05","slug":"finding-and-redacting-signatures-in-darkshield","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/","title":{"rendered":"Finding and Redacting Signatures in DarkShield"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The purpose of IRI data masking tools is to discover and obfuscate Personally Identifiable Information (PII) in various data sources. Depending on the type of data source, we recommend different products in the <\/span><a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\">IRI Data Protector Suite<\/span><\/a><span style=\"font-weight: 400;\">, typically IRI FieldShield or IRI DarkShield.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, the biggest challenge in protecting data is not the masking of the data, but reliably finding the PII in the source(s). This is particularly true for unstructured sources of data \u2013 like free text files, documents, and images \u2013 which <a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a> supports.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Handwritten text (like signatures) can be particularly difficult to work with. Parsing and accurately translating handwriting into digital equivalents requires a sophisticated AI-powered Optical Character Recognition solution. This is because handwriting varies widely in form and quality from person to person.<\/span><\/p>\n<h5><b>Collaboration between IRI and DeepLobe<\/b><\/h5>\n<p><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> 1.6.5 in <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\"> 11.0.1 now supports the discovery and masking of handwritten signatures in files. This new functionality is the result of the latest collaboration between IRI and <\/span><a href=\"https:\/\/deeplobe.ai\/\"><span style=\"font-weight: 400;\">DeepLobe<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The combined solution, announced <\/span><a href=\"https:\/\/www.prnewswire.com\/news-releases\/iri-adds-signature-detection-and-redaction-to-darkshield-302240731.html\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\"> and described in this article, is designed to address the challenge of detecting and masking PII in the form of signatures. When added to DarkShield, the DeepLobe AI model enables you to find and redact one or more signature images in a document (e.g., Word, PDF) or standalone image file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note that the signature detection functionality is not to be confused with another AI task called Handwritten Text Recognition. That is a more substantial challenge and is currently being developed for similar use in the on-premise DarkShield data masking tool.\u00a0<\/span><\/p>\n<h5><b>Signature Solution Installation and Setup<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">To get started, you will need:\u00a0\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IRI DarkShield software, installed on Linux or Windows with Voracity<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A valid IRI license key, created after DarkShield installation and registration<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/docs.google.com\/document\/d\/1eWdEt27c8BJCaC0bKQkHFsjQUiYtkscVw6OGff2eIOY\/edit?usp=sharing\"><span style=\"font-weight: 400;\">The DeepLobe signature model Docker container\u00a0<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A DeepLobe API key, provided by IRI for evaluation or licensing purposes.<\/span><\/li>\n<\/ol>\n<h5><b>IRI Workbench and Signature Detection Feature<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The front-end of the new signature detection option using DarkShield has now been added to IRI Workbench and is configured from the Data Class Library as a Data Matcher. For more information on what Data Matchers are, please read this <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-matchers\/\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18288\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-IRI-Data-Class-and-Rule-Library-with-a-signature-data-class-1-300x160.png\" alt=\"\" width=\"778\" height=\"415\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-IRI-Data-Class-and-Rule-Library-with-a-signature-data-class-1-300x160.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-IRI-Data-Class-and-Rule-Library-with-a-signature-data-class-1-1024x547.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-IRI-Data-Class-and-Rule-Library-with-a-signature-data-class-1-768x410.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-IRI-Data-Class-and-Rule-Library-with-a-signature-data-class-1.png 1078w\" sizes=\"(max-width: 778px) 100vw, 778px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Screenshot of IRI Data Class and Rule Library with a signature data class<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">To create a data matcher, you must open the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">Data Class Library<\/span><\/a><span style=\"font-weight: 400;\"> and either create a new Data Class or access an existing Data Class. Clicking on a Data Class displays information about its Location Matchers and Data Matchers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is in this section where you can then add a Data Matcher:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18286\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Dialog-page-for-creating-signature-matcher-300x293.png\" alt=\"\" width=\"425\" height=\"415\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Dialog-page-for-creating-signature-matcher-300x293.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Dialog-page-for-creating-signature-matcher.png 550w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Dialog page for creating a Signature Matcher<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Select from the dropdown box \u201cSignature Detection\u201d to specify the type of the Data Matcher. A data matcher for signature detection takes three arguments:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The listener URL, for HTTP\/S requests to the on-premise DeepLobe container<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The API key, to authenticate your license to use the DeepLobe signature model\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The confidence threshold, or the minimum percentage (score) of confidence that the signature detection model must meet for each location prediction to not be considered a false positive.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Once a Data Matcher is added to a Data Class, simply include the Data Class during the creation of a DarkShield job.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To create your DarkShield File Search\/Masking Job, launch the wizard from this menu:\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18291\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-DarkShield-Wizards-drop-down-menu-300x90.png\" alt=\"\" width=\"497\" height=\"149\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-DarkShield-Wizards-drop-down-menu-300x90.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-DarkShield-Wizards-drop-down-menu.png 543w\" sizes=\"(max-width: 497px) 100vw, 497px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Screenshot of DarkShield Wizards drop-down menu<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">For more information about creating DarkShield Jobs please read this <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-files-with-the-darkshield-files-wizard\/\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\">. The first step will be to name your DarkShield job; which gets saved as a .dsc (DarkShield configuration) job file after it is built in the wizard (or edited in the GUI).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Proceed through the next steps in the wizard as you normally would, but make sure you include the Data Class assigned with your Signature data matcher when prompted: <\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18292\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-data-class-selection-wizard-page-with-Signature-data-class-selected-300x280.png\" alt=\"\" width=\"440\" height=\"410\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-data-class-selection-wizard-page-with-Signature-data-class-selected-300x280.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-of-data-class-selection-wizard-page-with-Signature-data-class-selected.png 535w\" sizes=\"(max-width: 440px) 100vw, 440px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Screenshot of data class selection wizard page with Signature data class selected<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Once the DarkShield Job (.dsc file) is created, you can review\/modify your data source and targets, and reassign data classes if\/as needed:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18294\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/User-Interface-for-reviewing-and-modifying-.dsc-configuration-file-300x178.png\" alt=\"\" width=\"726\" height=\"431\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/User-Interface-for-reviewing-and-modifying-.dsc-configuration-file-300x178.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/User-Interface-for-reviewing-and-modifying-.dsc-configuration-file-1024x609.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/User-Interface-for-reviewing-and-modifying-.dsc-configuration-file-768x457.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/User-Interface-for-reviewing-and-modifying-.dsc-configuration-file.png 1231w\" sizes=\"(max-width: 726px) 100vw, 726px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">User Interface for reviewing and modifying .dsc configuration file<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">To run the DarkShield job from IRI Workbench, right-click on your .dsc file, then click <\/span><i><span style=\"font-weight: 400;\">Run As &gt; IRI Search and Masking Job<\/span><\/i><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18296\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-showing-how-to-run-a-DarkShield-job-using-.dsc-file-300x70.png\" alt=\"\" width=\"622\" height=\"145\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-showing-how-to-run-a-DarkShield-job-using-.dsc-file-300x70.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-showing-how-to-run-a-DarkShield-job-using-.dsc-file.png 768w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Screenshot showing how to run a DarkShield job using .dsc file<\/span><\/i><\/p>\n<p><b>Warning:<\/b><span style=\"font-weight: 400;\"> prior to running the job make sure the DarkShield API http(s) server is running and listening on the correct port. Furthermore, ensure DeepLobe\u2019s docker image has been spun up and is reachable via http(s).<\/span><\/p>\n<h5><b>Sample File w\/Signature Masked<\/b><\/h5>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18298\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Original-JPG-file-of-a-check-containing-a-handwritten-signature-300x136.png\" alt=\"\" width=\"578\" height=\"262\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Original-JPG-file-of-a-check-containing-a-handwritten-signature-300x136.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Original-JPG-file-of-a-check-containing-a-handwritten-signature.png 593w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">The original JPG file of a check contains a handwritten signature in the bottom right corner.<\/span><\/i><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18299\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/The-signature-discovered-in-the-check-is-redacted-using-masking-300x138.png\" alt=\"\" width=\"559\" height=\"257\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/The-signature-discovered-in-the-check-is-redacted-using-masking-300x138.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/The-signature-discovered-in-the-check-is-redacted-using-masking.png 592w\" sizes=\"(max-width: 559px) 100vw, 559px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">The signature discovered in the check is redacted using masking.<\/span><\/i><\/p>\n<h5><b>What Comes Next<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">IRI is aware of the need and value of supporting the ability to parse handwriting and mask any PII within it. As such, as of 2025, IRI and DeepLobe are working together on the future goal of recognizing and masking PII in handwritten text generally.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With this upcoming feature, DarkShield should, in theory, be able to support the sanitization of PII in various new sources, such as doctor\u2019s notes, customer order forms, etc. If you have any questions or use case requirements to share, please contact us at <\/span><a href=\"mailto:darkshield@iri.com\"><span style=\"font-weight: 400;\">darkshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<section>\n<div class=\"container plain-width\">\n<div class=\"faq-section\">\n<h3>Frequently Asked Questions (FAQs)<\/h3>\n<div class=\"faq-item\">\n<div class=\"faq-question\">1. What is signature detection in IRI DarkShield? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Signature detection in IRI DarkShield is a feature that uses an AI-powered model from DeepLobe to automatically find and redact handwritten signatures in documents (such as PDFs or Word files) and image formats. This helps organizations protect personally identifiable information (PII) in signatures.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">2. How does IRI DarkShield find handwritten signatures? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">DarkShield integrates with DeepLobe\u2019s AI model to scan documents and images for signatures. It uses a confidence threshold setting to determine whether a detected object is likely a signature and should be redacted, minimizing false positives.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">3. What do I need to install before using the signature redaction feature? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">You will need IRI DarkShield software installed on Linux or Windows, a valid IRI license key, the DeepLobe signature model Docker container, and a DeepLobe API key. These components work together to enable signature detection and masking.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">4. How can I configure signature detection in IRI Workbench? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">You configure signature detection by creating a Data Matcher in the IRI Workbench Data Class Library. Select \u201cSignature Detection\u201d as the matcher type, provide the listener URL, API key, and confidence threshold, then include this Data Class in your DarkShield search\/mask job.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">5. Can I review or edit the job before running it? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. After building the DarkShield job, you can review and modify the data sources, targets, and assigned Data Classes in the .dsc configuration file before executing the job in IRI Workbench.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">6. How do I run a signature masking job? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Right-click on the .dsc job file in IRI Workbench and select \u201cRun As &gt; IRI Search and Masking Job.\u201d Ensure that the DarkShield API server and the DeepLobe Docker container are running and reachable before starting the job.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">7. What types of files can have signatures detected and masked? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">DarkShield supports signature detection in standalone image files (like JPG, PNG, TIF) as well as embedded images in documents such as Word and PDF files.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">8. Why is masking signatures important for data security? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Signatures are a form of PII and can be exploited for identity theft or fraud if exposed. Masking them ensures compliance with privacy regulations and protects individuals from unauthorized use of their personal information.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">9. Can DarkShield handle other types of handwriting besides signatures? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Soon. IRI is working with the proven Jetstream AI model for multi-lingual handwriting recognition to identify and mask handwritten PII in sources like doctor\u2019s notes, order forms, and other unstructured documents.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>The purpose of IRI data masking tools is to discover and obfuscate Personally Identifiable Information (PII) in various data sources. Depending on the type of data source, we recommend different products in the IRI Data Protector Suite, typically IRI FieldShield or IRI DarkShield.\u00a0 Ultimately, the biggest challenge in protecting data is not the masking of<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\" title=\"Finding and Redacting Signatures in DarkShield\">Read More<\/a><\/div>\n","protected":false},"author":152,"featured_media":18303,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[2038,14,18,2039,2042,2040,1388,2046,1624,2041,1815,2037,2044,2045,2043],"class_list":["post-18281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-ai-powered-redaction","tag-data-masking","tag-data-privacy","tag-deeplobe-integration","tag-document-security","tag-handwritten-signature-masking","tag-iri-darkshield","tag-masking-signatures","tag-ocr","tag-optical-character-recognition","tag-pii-protection","tag-signature-detection","tag-signature-masking","tag-signature-obfuscation","tag-signature-redaction"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Finding and Redacting Signatures in DarkShield - IRI<\/title>\n<meta name=\"description\" content=\"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finding and Redacting Signatures in DarkShield\" \/>\n<meta property=\"og:description\" content=\"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-14T17:12:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T08:38:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\"},\"author\":{\"name\":\"Adam Lewis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\"},\"headline\":\"Finding and Redacting Signatures in DarkShield\",\"datePublished\":\"2025-03-14T17:12:33+00:00\",\"dateModified\":\"2025-11-12T08:38:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\"},\"wordCount\":1269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png\",\"keywords\":[\"AI-Powered Redaction\",\"data masking\",\"data privacy\",\"DeepLobe Integration\",\"Document Security\",\"Handwritten Signature Masking\",\"IRI DarkShield\",\"masking signatures\",\"OCR\",\"Optical Character Recognition\",\"PII protection\",\"Signature Detection\",\"signature masking\",\"signature obfuscation\",\"signature redaction\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\",\"name\":\"Finding and Redacting Signatures in DarkShield - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png\",\"datePublished\":\"2025-03-14T17:12:33+00:00\",\"dateModified\":\"2025-11-12T08:38:05+00:00\",\"description\":\"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Finding and Redacting Signatures in DarkShield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\",\"name\":\"Adam Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"caption\":\"Adam Lewis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/adaml\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Finding and Redacting Signatures in DarkShield - IRI","description":"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/","og_locale":"en_US","og_type":"article","og_title":"Finding and Redacting Signatures in DarkShield","og_description":"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/","og_site_name":"IRI","article_published_time":"2025-03-14T17:12:33+00:00","article_modified_time":"2025-11-12T08:38:05+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","type":"image\/png"}],"author":"Adam Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Lewis","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/"},"author":{"name":"Adam Lewis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e"},"headline":"Finding and Redacting Signatures in DarkShield","datePublished":"2025-03-14T17:12:33+00:00","dateModified":"2025-11-12T08:38:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/"},"wordCount":1269,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","keywords":["AI-Powered Redaction","data masking","data privacy","DeepLobe Integration","Document Security","Handwritten Signature Masking","IRI DarkShield","masking signatures","OCR","Optical Character Recognition","PII protection","Signature Detection","signature masking","signature obfuscation","signature redaction"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/","name":"Finding and Redacting Signatures in DarkShield - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","datePublished":"2025-03-14T17:12:33+00:00","dateModified":"2025-11-12T08:38:05+00:00","description":"Learn why masking signatures is important but challenging, and how it can be done in IRI DarkShield using its AI signature detection model.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-redacting-signatures-in-darkshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Finding and Redacting Signatures in DarkShield"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e","name":"Adam Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","caption":"Adam Lewis"},"url":"https:\/\/www.iri.com\/blog\/author\/adaml\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/03\/Featured-image-Article-Redacting-Signatures.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18281"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=18281"}],"version-history":[{"count":14,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18281\/revisions"}],"predecessor-version":[{"id":18737,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18281\/revisions\/18737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18303"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=18281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=18281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=18281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}