Updated on 2022-12-29 GMT+08:00

Overview

You can use DSC to inject custom watermarks into your documents smaller than 50 MB, claiming the ownership.

Table 1 Files which watermarks can be injected into or extracted from

Type

Format

Document

PDF, PPT, Word, and Excel

Image

*.jpg, *.jpeg, *.jpe, *.png, *.bmp, *.dib, *.rle, *.tiff, *.tif, *.ppm, *.webp, *.tga, *.tpic, and *.gif

JSON data

The value can be an integer, floating-point number, or string.

Application Scenarios

Data watermarking is widely used in government departments, healthcare agencies, finance institutions, academic institutes, and other organizations. It is generally used for copyright protection and source tracing.

  • Data copyright protection: In scenarios where digital works are downloaded or copied for use and database services (data mining and analysis) provide data to third parties, digital watermarks can be used to identify the copyright when disputes occur,
  • Source tracing: Data provided for internal employees or third parties can be injected with watermarks to identify the ownership and remind them of keeping the data secure. When the data leaked, the watermarks can be used to trace the source of data leak and identify the root cause.

Advantages and Highlights

  • Visible and invisible watermarks: You can inject visible or invisible watermarks into the data as needed to efficiently cope with data theft through image process tools, picture taking, or screenshots.
  • Detectable and tamper-proofing: Watermarks injected into the data can be detected and will not be lost, fabricated, and tampered with.
  • High robustness: Watermarks are not easily removed during transmission or use. Even if the data carrier is tampered with or damaged, there is a high probability that watermarks are extracted.

Constraints

The DSC console supports embedding and extracting watermarks only for PDF, PPT, Word, and Excel documents.

Procedure

Figure 1 Data watermarking process