Protect your images from copying by invisible watermarking.
Invisible Watermarking - Introduction
Can you see the difference between these two images? The left one is an original image and the right one contains an invisible digital signature.
This application (SMI) allows you to sign your images.
The sign is added directly to the image data. It doesn't use EXIF or stream file properties. The sign stays detectable after jpeg compression, scaling and cropping or for example PrintScreen&Paste*
Now you can pair your signature with your webpage. So when anyone tries to detect the signature in your image, your signature and your webpage will be displayed. It is common to let the application display the
detailed information about the author.
Invisible Watermarking - How to use it
Capture the photo
Prepare it for publishing on web (keep the original)
Sign the photo by your signature as the last step
Invisible Watermarking - UseCase #1
You: Took the photo, signed and published it. Thief: Downloaded it from your website. Published it somewhere as his own. You (Or our web crawler): Found the signed photo. You: Have the original photo and the signed photo is on his website - this is a strong proof of property to take a legal action against the thief.
Invisible Watermarking - UseCase #2
You: Created an astonishing set of photos and you sold it to 5 very important customers. You used an unique signature for every customer. Thief: Used the photos by forbidden way, published it in P2P network for example. You: Found any image from the set. You: Now you know who (of the five) leaked the photo and you have a strong evidence of your property and you can take legal action against him.
If you want to find out more about SMI signature properties and signature durability to jpeg compression, cropping and scaling, click here.