this post was submitted on 26 Dec 2025
62 points (98.4% liked)

Privacy

44059 readers
347 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

I think it is possible to embed invisible information into videos and images. This way peopple could track where you got an image from, the source from which you copied it, and people who copy your image to share it again. https://github.com/ShieldMnt/invisible-watermark

Services like youtube or twitter could embed such watermarks into content they serve to specific users without them knowing; Smartphone-cameras could mark images in secret.

I guess blurring, rotating or dithering the image could destroy watermarks. Or maybe just sharing a screenshot of an image instead of the original image. Format conversions may help too.

Keywords: digital-watermarking. tracking.

top 20 comments
sorted by: hot top controversial new old
[–] sobchak@programming.dev 1 points 1 day ago

It's definitely possible. I've heard the film industry does do this with theatrical releases so they can determine what theater a copy came from (and determine the seat it was recorded from by the angle). I don't really share images/video anonymously though, so don't think about it much. When I rarely do, I try to check for and strip metadata.

[–] utopiah@lemmy.ml 2 points 2 days ago

It sure is possible to embed invisible information into videos and images, it's called metadata. Now you might think of other techniques, e.g. https://en.wikipedia.org/wiki/Steganography but most if not all are, AFAIK (and I won't pretend I know the state of the art in the domain) if they are within the data itself (thus become data, not meta-data), e.g. a visible stamp in an image, are made to remain visible. Compression codecs are specifically targeting the visible or audible spectrum. One of the most basic way to "compress" lossy information (as opposed to lossless) is precisely to remove the ends of the spectrum that is not perceived by the average human audience.

So... AFAICT it's either visible and thus can be spotted (and thus can be removed, even if by adding a black mark over) or not visible but then most likely will be removed by basic compression codecs even without trying to do so.

TL;DR: no and I wouldn't be until I see this in the wild (not a research paper claimed it's technically possible).

[–] adespoton@lemmy.ca 4 points 2 days ago (2 children)

If I’m sharing images, I’m generally sharing links to images, or images I’ve created myself and scrubbed of metadata, plus touched up, usually with a noise mask, among other things.

[–] sobchak@programming.dev 1 points 1 day ago

Gotta watch out for tracking identifiers in the URLs too.

[–] greenbelt@lemy.lol 1 points 1 day ago (1 children)

What software do you use to do this? gimp?

[–] adespoton@lemmy.ca 1 points 1 day ago

I have a script I wrote that uses imagemagick on the back end.

[–] rossman@lemmy.zip 3 points 2 days ago (1 children)

I didn't think of this. Can they embed dynamic info that logs ip and identifying info?

[–] utopiah@lemmy.ml 1 points 2 days ago

Yes but encoding isn't cheap.

[–] brownmustardminion@lemmy.ml 26 points 4 days ago (1 children)

Most people don't know your photos can be cross profiled and identified by the unique noise signature of your camera.

I've never heard of it being used in practice though. There's a github repo somewhere if you're interested in trying it yourself.

[–] greenbelt@lemy.lol 10 points 4 days ago (2 children)

maybe blur + compression + dithering + contrast effects may fix this? idk ...

I would be interested in the name of the github repository you mentioned.

[–] brownmustardminion@lemmy.ml 5 points 3 days ago* (last edited 3 days ago)

I believe this is the original whitepaper: https://ws.binghamton.edu/fridrich/Research/double.pdf

And here's an implemention I found on github: https://github.com/andrewlewis/camera-id

With that repo you should be able to test ways to obfuscate the noise signal.

[–] Neptr@lemmy.blahaj.zone 2 points 4 days ago

Then that could be used to fingerprint too.

[–] Inui@hexbear.net 1 points 2 days ago (1 children)

Pretty concerned. I have access to copyrighted content that I want to share elsewhere, but because it requires a log in, I always wonder if there are invisible trackers hidden in the files that would out me. I think it should be standard that all sites strip things like exif data automatically upon upload. Hexbear does this.

[–] greenbelt@lemy.lol 1 points 1 day ago

exif metadata is a good keyword on the topic, I think.

[–] PowerCrazy@lemmy.ml 8 points 4 days ago

It's something to be aware of if you are trying to record/send images in secret. But it's not a problem if you are passing on an image you found somewhere else. You leave no trace if you are just passing the image, so the image itself is of no concern privacy-wise.

[–] slazer2au@lemmy.world 6 points 4 days ago (1 children)

Wouldn't recoding or using other compression methods break that?

[–] greenbelt@lemy.lol 6 points 4 days ago* (last edited 4 days ago) (1 children)

Not necessarily, a qr-code can still work even if you compress it, due to digital error-correction mechanisms in the code.

[–] slazer2au@lemmy.world 11 points 4 days ago (1 children)

That is built for purposes vs trying to hide something.

[–] XTL@sopuli.xyz 5 points 4 days ago (1 children)

One might think that watermarks are designed to resist corruption as well. But I have no idea.

[–] MoonMelon@lemmy.ml 8 points 4 days ago

They are, if you scroll to the bottom of the github repo that OP posted there are some examples of what works and doesn't work to break it.

Watermark data like this is stored in the least significant bits of the pixels themselves, or in the case of OPs example, they do a frequency decomposition on the image then store the watermark data in the coefficients. Basically you have to trash the pixel data at least a little bit to defeat it. So cropping or flipping the image won't do it, but resizing or rotating with some kind of filtering will.

I have no idea how the machine-learning technique listed there is working, and their documentation link is broken :(