A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X

Glossary

Digital watermarking can provide a range of solutions for identifying, securing, managing and tracking digital images, audio, video, and printed materials. Digital watermarking technology supports the applications and uses defined below.

Asset/Content Management
Links to DAM/ECM backend system to access metadata/information.

Authentication/Integrity
Verifies that content is genuine, from an authorized source and has not been altered.

Benefits of Digital Watermarking
Create a persistent identity to enable content to be managed more effectively and help enable new business models, greater security and broader consumer choice. Readable by computers/devices supporting numerous applications while remaining imperceptible to humans. Enables content identification or rights enforcement in digital or analog content distribution. Communicates copyright information and associated rights.

Content Processing Techniques
A/D and D/A conversion, cropping, scaling, compression, encryption/decryption, printing and scanning, etc.

Content Types
Photos and images, secure documents, advertisements, TV programming, movies, music, etc. Offers copyright stakeholders persistent content identification and authentication.

Copyright Communication
Identifies content owner and rights.

Copy Protection
Controls recording and playback of content.

Digital Watermarks
Digital watermarks are data embedded directly within content which are imperceptible to humans but readable by computers. Digital watermarks are currently deployed in billions of audio, video, image and print objects and hundreds of millions of watermarked enabled applications. These can be recognized by enabled software or hardware to provide copyright information, authenticate, track, monitor, enhance security and enable access to additional data, information and e-commerce opportunities across devices and networks.

Filtering/Classification
Classifies content so it is used appropriately; filters inappropriate content.

Forensic Tracking
Identifies where content left authorized environment.

Linking/E-Commerce
Enables access to information and purchase of related content.

Monitoring
Monitor broadcast and Internet usage.

Product Serialization & Tracking
Identifies content and where it left authorized environment.

Remote Triggering
Causes automatic action during distribution.

Rights Management
Links to DRM system to re-associate rights or promote content commerce.