WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION

Similar documents
Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

EVERYTHING YOU NEED FOR BRANDING ON MULTIPLE CHANNELS

The next level of enterprise digital asset management

Vs Encryption Suites

Loveurope Online Operating Platform (LOOP)

EMC PERSPECTIVE. Understanding Content Management and Digital Asset Management Functionality

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

Optimize Brand Asset Management with Enterprise Content Management

Digital Asset Management 数 字 媒 体 资 源 管 理 任 课 老 师 : 张 宏 鑫

Get on the Fast Track with RSS-Driven Automation.

BUSINESS CORE PRINTING SOLUTIONS

Digital marketing strategy

How many titles are available? What if I can t find the title I m looking for?

Digital Asset Management. An Oracle White Paper Updated April 2007

Kony Mobile Application Management (MAM)

MovieLabs Specification for Enhanced Content Protection Version 1.0

TERMS OF USE AGREEMENT

ZOOMIN.TV PRIVACY POLICY Last updated: 5 August 2014

HOW TO TURN A. Single E-Book Into a 101+ Piece Content Marketing Machine

CA Service Desk Manager - Mobile Enabler 2.0

Middleware- Driven Mobile Applications

AGREEMENT FOR WEB DESIGN & DEVELOPMENT

The Key Elements of Digital Asset Management

White Paper Using Webinars for Online Marketing

Benefits of using Marketing Automation Software as part of your content marketing strategy

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

Managing Brands for Maximum Profit: A Guide to Brand Asset Management Solutions

Warranty Claims Management System (WCMS)

Digital Rights Management - The Difference Between DPM and CM

DEVELOPING A COMPREHENSIVE E-MARKETING STRATEGY USING 3 POPULAR ONLINE CHANNELS

Product Brochure.

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

SAMSUNG PRINTING SOLUTIONS Business Core Printing Solutions. FOR YOUR BUSINESS Easy-to-use serverless solutions that work as efficiently as you do

Enterprise Social Media Marketing Software. Evaluation and Selection Guide

Virtual Data Room. From Deal Making to Due Diligence

Software Features & Capabilities

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Skynax. Mobility Management System. System Manual

Digital Asset Management

Adobe Summit 2015 Lab 718: Managing Mobile Apps: A PhoneGap Enterprise Introduction for Marketers

Statement of Work. DLC Management Website redesign for Randhurst Mall. Director of Marketing DLC Management Corp

Magento Features List

Create and Distribute Rich Media for Optimized, Omnichannel Customer Engagement

Online Marketing Channels

Digital Asset Management

Implementing a Successful Digital First Strategy

Business Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Current Page Location. Tips for Authors and Creators of Digital Content: Using your Institution's Repository: Using Version Control Software:

How To Write A Blog Post On Globus

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Digital Asset Management. Content Control for Valuable Media Assets

TERMS OF USE & GENERAL PRIVACY POLICY

Enhancing Web Publishing with Digital Asset Management - Using Open Text Artesia DAM to enhance your Open Text WCMS (Red Dot) web sites

Web Protection for Your Business, Customers and Data

How To Get A License From A Business To A Computer (For A Business)

Covered California. Terms and Conditions of Use

Kaltura s Digital Rights Management (DRM) Service with Widevine Setup and Workflow Guide. Version: Gemini

Privacy Patterns in Public Clouds

Social Media Platform Agreements and Brand Risk

Pella Hosting and Website Development solutions@pellahosting.com 809 West 8 th Street Pella, IA Website Planning Worksheet

Social Media Marketing Strategies

Planning a Responsive Website

The creative recruiting solution for hiring creative people.

Teradata Marketing Operations. Reduce Costs and Increase Marketing Efficiency

EQUELLA. One Central Repository for a Diverse Range of Content.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop Presented by An In seok

How big is the mobile app market?

WIND RIVER SECURE ANDROID CAPABILITY

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 Youtube.com/ViralJadhav viral@experttraining.

Maximizing Remote Employee Collaboration with Video

Working Together for a Better NightOut, Ron Boeringa President, Optimal Media Group, LLC

Inspection of Encrypted HTTPS Traffic

MEDIA & CABLE. April Taras Bugir. Broadcast Reference Architecture. WW Managing Director, Media and Cable

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

WEB DESIGN & SEO PLANNING WORKSHEET

AGREEMENT FOR WEBSITE MAINTENANCE AND MODIFICATIONS

Website Development Proposal. Prepared for Prospective Client By Valley Source ValleySource: CODING

Marketing Optimization Suite

eztechdirect Backup Service Features

EntraPass v4.0 Access Control Software

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

Lightroom And It s Application In Dentistry

Adobe Digital Publishing Suite, Analytics Service

oit Manage Digital Images with Picasa March 2010

Kaspersky Security for Mobile Administrator's Guide

OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Transcription:

www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital imagery in today s world coffee shops now doubling as computer lounges, the camera phones we carry with us 24/7, widespread Internet access nearly everywhere you go these are just a few examples of what is driving the proliferation of digital images. In this cyber-culture, digital images are an effective means of communication and expression. And, with the growing ease of capturing, uploading, and editing digital images, consumers are rapidly becoming prosumers producing their own content as well as consuming others. The combination of access and tools enables digital images to travel far and fast, and appear in many versions, and in numerous contexts. From iphone through Photoshop to Flickr and Facebook and on to Google Images, a single digital photo may be uploaded, dispersed, viewed, downloaded, modified, and repurposed with breathtaking speed. And, new services, such as Posterous, have emerged allowing users to send images via email while simultaneously posting on multiple web and social networking sites.

The same is true in the corporate world images are traveling widely, rapidly, and in multiple manifestations through email and across the Internet. But unlike consumer-generated imagery, businesses continually attempt to control the distribution of their image assets, usually ending up in failure. For the most part, image owners have little visibility into exactly where, when, and how their assets are being used. Even within their own domains, corporate communications professionals face significant challenges in managing digital assets throughout very complex sales and marketing channels. Images used in new product releases, for example, are distributed to multiple remote offices, agencies, distributors, dealers, and so on. An image may be customized for different venues, such as a corporate web site, product catalogs and dealer advertisements, and its use is critically dependent on timing. Ensuring that the right image appears at the right time in the right place is a major concern. Finally, the inability to control the use of digital images can be costly. The premature release of launch materials can be devastating consider the secrecy surrounding the introduction of a new car, for example. Conversely, continuing to publish outdated product images can also lead to lost revenue. An image used without authorization or attribution is often a lost revenue opportunity. In addition to violation of copyright, the unauthorized use of images in the wild leaves potential buyers with no way to obtain more information on an eye-catching image or locate the owner to purchase it. DIGITAL WATERMARKING Digital watermarking is the process of embedding a persistent digital identity into images to provide the means for effective management and tracking of digital assets on the web. A digital watermark contains imperceptible digital information, also called its payload, which can include anything the owner chooses. Digital watermarks persist as the image travels and is transformed, and can be read at any point to determine the image s unique identity. Watermarks also survive many manipulations that images are subject to: cropping, resizing, compression, encryption and decryption, and conversions of file types.

Persistent watermarks ensure that images remain connected to their metadata information about the image. Metadata can be anything, but it typically includes ownership, copyright, and contact information. So a digitally watermarked image essentially remains attached to its copyright information and other metadata everywhere it travels. COPYRIGHT COMMUNICATION Digital watermarking technology is sufficiently reliable and robust that it can provide the legal basis for proving ownership of an image. A watermarked image found outside its expected channels can be identified and copyrights can be legally asserted. The experience of Corbis, a leading stock photography agency, is that claims of ownership based on watermarking consistently stand up in court. In addition to Corbis, Microsoft, Time/LIFE, Paramount, and many others protect their image assets with digital watermarking. However, watermarking has value beyond simply issuing takedown notices for unauthorized use of images. Asserting ownership may be just the first step in negotiating image uses that benefit owner and consumer alike. For example, discovery of a watermarked image could easily trigger an automated, online licensing application that permits the user to view the usage rights and immediately license it.

The watermarking of images can also serve as a deterrent to piracy and unauthorized use. A survey recently completed on behalf of the Digital Watermarking Alliance strongly suggests that users who illegally download or share digital audio or video content online would be significantly less likely to acquire or share content illegally if they knew the content contained a digital serial number that is, a watermark. While the survey polled users of audio and video content, it is likely that users of still images share those attitudes. IMAGE IDENTIFICATION To identify watermarked images online requires a combination of digital watermark readers and image crawlers. Readers can be deployed at critical points in an organization s own workflow and are available in the form of a browser plug-in, application plug-in or other software application. An image-crawler is a program that continually traverses the Internet searching for watermarked images and reporting on its finds. In some situations, very sensitive images may appear when or where they shouldn t before a new product release, for example, or in public rather than strictly private channels. In such cases, watermarks provide forensic value. Since watermarks can be used to distinguish individual copies of an image, it can determine, with certainty, which original copy of an image was leaked before release or into public view. This capability has value for both indemnification and deterrence.

Readers deployed within an organization can monitor sales and marketing distribution channels, identify specific instances of images, and report on images found outside of authorized use. Judiciously placed readers play a significant role in an internal image-tracking service that helps ensure that the right image appears in the right place, at the right time. Readers can also be deployed on the Internet in agreement with image aggregators, including social networks and photo sharing sites. In this case, readers can identify watermarked images and take some predetermined action including blocking or filtering based on their usage rights or restrictions. For instance, a person copies an image found on a popular media site say The New York Times and tries to upload it to his/her Flickr account. The watermark could block the upload and communicate that the image is copyrighted. Other actions include less restrictive approaches such as pairing targeted advertising with the display of an image or providing links to additional images by the same image creator. Simply tracking digital assets on the web can be beneficial even without acting on unauthorized uses. Valuable marketing information to brand managers and alike is gained by knowing where imagery is being viewed in the wild, outside authorized or tracked channels of distribution. CONCLUSION Digital images are increasingly valuable for communication, expression, and branding in an environment of widespread Internet use. But the ease of uploading, downloading, and modifying images has made controlling digital assets more and more challenging, and loss of control of these assets can be very costly. Not knowing where, when, how, and by whom digital assets are being used can mean direct and indirect revenue losses for image and brand owners. Digital watermarking is a proven, readily available, and cost-effective solution to the problems of better management of digital image assets and better tracking of unauthorized uses of images on the web. Watermarks do not interfere with the enjoyment of an image by its intended audience. They support a variety of flexible options for communicating copyright and asserting ownership, including automated take-down notices, immediate image licensing, and more indirect methods of monetization such as associating ads or link-backs with copyrighted images. Digital watermarks can also be used within an organization to implement an effective image management system. In the context of complex sales and marketing channels, multiple offices, agencies, and dealers, ensuring the appropriate use of images is challenging. But it is critically important to use the right image in the right place at the right time with the right authorization an image released too early in a product launch could negatively impact a brand, neutralize a competitive advantage, and adversely affect revenue. Digital watermarking can easily be integrated with a Content Management or Digital Asset Management system to help ensure the timely and proper use of important digital assets.

Image identification and copyright communication is just one of many applications enabled by digital watermarking. Among the others are linking print media to the web, authenticating content, broadcast monitoring, forensic tracking, and piracy deterrence. For more information on the many uses of digital watermarking, visit the Digital Watermarking Alliance web site at www.digitalwatermarkingalliance.org.