IMATAG protects images with digital watermarking. What is this?
Our white paper gives a description of the technologies involved. Here are some new facts.
(updated may 2019)
Quick read:

  1. The great confusion: Visible and invisible watermarking
  2. Invisible digital watermarking is NOT NEW, and it is everywhere
  3. TODAY, invisible digital watermarking can also be helpful for your business
  4. Some tips to chose your digital watermark solution

 

The great confusion: Visible and invisible watermarking

 

The term “Digital watermarking” was coined by the research labs, which invented this new technology.
Yet, in digital photography, this wording brings a lot of confusion since photographers have been using “watermarking” for a long time. These two “watermarking” are not the same.

 


A digital watermark is invisible

Digital watermarking provided by IMATAG adds an invisible watermark to the picture. The pixel values are changed in order to convey a secret message, but these modifications are subtle and perceptually shaped. The human eye cannot see the difference between the watermarked and the original image.
This is a major difference with visible watermark which is an overlay superposed on top of the picture and meant to be seen. To avoid the confusion, we should speak about invisible digital watermarking.

 


A digital watermark embeds a code

Digital watermarking embeds a secret message within the image (the technical term is steganography). This message is binary and can be decoded by a computer.
This is the second major difference with visible watermarks which are meant for human readers. This code can be unique (content ID) to help identify different copies of a single image.

 


A digital watermark is more robust

In some languages (in French for instance), this technology is also called “digital tattoo”. This conveys the idea of robustness. Even if the image has been edited (JPEG compression, cropping, scaling, color editing …), the computer can find back the embedded message. This message sticks to the image as a tattoo on the skin. You can play with our demo tool to challenge IMATAG’s watermark robustness, or read test reports from PetaPixel or DPReview.

On the contrary, visible watermark, though its visibility is meant to deter people from stealing photos, is easily removed. The simplest way is to crop the image when the watermark is placed as a signature. Regarding watermarks spread all over the image, they can be deleted by Artificial Intelligence, as detailed in our article about the algorithm used by Google. Most photographers are aware of this weakness, this explains why visible watermark is the third tip they use to protect their images, and not the first one (read Professionals’ tips on how to protect your images from online theft).

 

Invisible digital watermarking is NOT NEW, and it is everywhere

 

The first research works date back to 25 years ago. This technology is now well spread because it can be applied to many types of content (still images, video, audio, source code, maps, 3D model, DNA sequence, chemical compound, …) and its use cases are legions. You probably have already seen or heard watermarked content without knowing it. This is just the point: digital watermarking is invisible, or inaudible, imperceptible…

Some applications of this technology are the following:

1-Audience monitoring:

In Europe and in the USA, the audio of TV channels is watermarked. The embedded message encodes the name of the channel.
Panelists have at home a device capturing the sound in their TV room. It decodes the message and sends it to the monitoring companies via Internet. They can measure the audience and market share live.

2-Content integrity:

In Africa, the TV ads are typically long spots. They are broadcasted through many local channels which sometimes shorten the ads to increase their number and whence the revenues. The embedded message is the identifier of the TV spot followed by a time-code. Some companies have platform listening to all TV channels 24hours a day and check that any single second of a TV spot is duly broadcasted.

3-Content protection:

The audio of movies are watermarked in theaters and on Blu-Ray discs. The decoder is embedded in a Blu Ray disc player.
If it detects a watermark while playing a content in the clear, it concludes that this content is indeed a pirated copy (either a camcord of a theater projection or a ripped Blu Ray) and it stops the playback.

4-Forensics:

Videos in movie theaters are also watermarked. The embedded message is the date of the projection and also the ID of the beamer. That way, “Hollywood” knows in which theater a pirate has camcorded a movie and puts the pressure on the owner of the theater.

5-User tracing:

Websites selling multimedia content on demand (movies, songs, cartoons, e-books) send the client a personalised copy of the content. The ID of the client is embedded so that dishonest people illegally sharing their versions (like on P2P networks) are identified and black-listed (or sued).

6-Packaging identification:

Some companies use digital watermarking as a replacement of the bar code on packaging.

 

TODAY, invisible digital watermarking can also be helpful for your business

 

In short: digital watermarking is invisible, not new and already used in many applications. But here are new applications. Whether you sell images or your business relies on them, reasons for checking what they become once you released them are many.

Audience monitoring (Brands, PRs, Corporate, E-Commerce):

copy detected even after cropping and mirroringEven if you are not a broadcaster, you probably use images for your own business, for communication, for marketing. Monitoring just your own website’s audience or following your performance on social networks is not exhaustive, considering that your visual content can be reused outside these walled gardens.

Search engines limitations: An easy way to find your images online is to use online reverse search engines like Google Image or Tineye. But as their technology is based on similarity and not digital watermarking, it has at least 2 drawbacks: Trade-off between false positive / false negative and Multiple sources (for more details please download our white paper).

Text (metadata) limitations: You can also use text search to find images containing your credit or copyright in their metadata. But here again, some drawbacks will make it difficult:

Digital watermark advantage: monitoring your images online with digital watermarking is the only way to certify that images found online were initially sourced by you, and thus the only reliable way to script automated process like invoicing, claiming or sending a DMCA, building statistics and reports…

Content integrity:

You can check your images integrity to ensure that your brand chart or your reputation is respected, to detect counterfeit or grey market. See more details in our article 5 Reasons Why Brands Should Monitor Their Images.

Forensics, User tracing:

A premature release of an image to the public can have devastating consequences to some brands. In other cases where exclusivity or scarcity makes the value of an image, the photographer or its agency can decide to end a contract with a client who has published a photo without authorisation.

 

Some tips to chose your digital watermark solution 

If imperceptibility is key, if your images are to be compressed, if you need to identify different copies of a unique image, if your content (even samples) cannot be stored outside your own servers, if interoperability with your DAM is not an option, if you need to integrate the watermarking process into your existing workflow, make sure to check taht all these features are available and test them.

Here are some of IMATAG’s differences with our competitors :
 Robustness to compression
The jpeg compression, systematically used on all press sites and others, easily removes the watermarks (see “Are my images protected on Facebook and other social media sites?“), contrary to the IMATAG watermark which resists to extreme compression rates (test on “https://imatag.com/demo/watermarking/).

 Perception
After zooming, some watermarks become noticeable under the form of a green “noise” crippling. IMATAG’s noise is hidden in the grey levels close to high contrasts areas, a much more inconspicuous solution.

Traceability
IMATAG is able to add a different watermark to each copy of a single image. The watermark acts as a tracer, it can link each copy to data such as the channel used for its distribution, or date and name of the DAM user who downloaded it… Other digital watermarks will only apply the same pattern to all your images, or mark each copy of an image with the same watermark.

 Performance
Unlike Imatag, competitors encryption is slow for voluminous images. Carefully evaluate the amount of images that will need to be daily processed to make sure your solution will be able to scale.

Integration
Our API is open to all customers from the cheapest plan to the highest. A plugin for LightRoom users is also available, allowing them to save on their own disk the watermarked photos at their original size and automatically trigger their monitoring online.

 Sensible Data Storage
IMATAG uses first a low definition copy of the original photograph to match it with the query image before identifying its code.
This also allows to track unmarked images as Google Reverse Image Search and Tineye do for example. If monitoring of your images is not required, but only authentication (for traitor tracing for example), IMATAG does not need to store your content. Please contact our sales team for details.

Download our Free Ebook : a Guide to Select your Digital Watermark solution

The Benchmark Guide to Select Your Digital Watermarking and Image Monitoring Solution

Answers you will find in this guide:

  • How not to lose sight of your images ?
  • How to add watermarking and monitoring features to your workflow
  • What are the selection criteria for integrating an external solution?
  • An evaluation grid to assign your project to specialists

 

Download Free Ebook