panhandlefamily.com

Harnessing Hidden Copyright Data in AI-Generated Art

Written on

The rise of AI-generated artworks has highlighted numerous copyright challenges. In a previous piece, I discussed the process of securing copyright for your AI-created works through the USPTO.

Confusion in Image Ownership

Many AI-generated pieces tend to share a similar aesthetic. For instance, a frequently depicted face in Midjourney has earned the nickname “Miss Journey.” When artworks begin to look alike, questions regarding authorship can surface. A viable method to differentiate your creations is through watermarking. While visible watermarks can be easily removed or cropped, invisible watermarks withstand light edits and cropping, establishing your ownership. If you discover your watermarked image used without consent, you can rightfully request its removal or demand credit, licensing fees, or a combination of both.

Watermarking serves as an economical solution to validate your authorship and rights over your art. The method I'll present here is not a robust encryption system and is not immune to tampering. For highly secure data encryption software, you would need to explore more expensive alternatives.

Concealed Data

Several text-to-art AIs embed data within their generated images. Based on my informal experiments, about half of these AIs incorporate hidden data.

I accessed the above image from Novel.ai using a simple text editor. Below is a screenshot of my findings.

The hidden data comprises the prompt used to generate the artwork, the AI utilized, the steps followed, settings applied, seed number, and weights. As demonstrated, a substantial amount of concealed data is encoded within the file.

Future of AI Image Generation Platforms

Upcoming AI art generation platforms may integrate encrypted data within the rendered images to assign unique user ID numbers, linking back to the artwork's owner. Nevertheless, until such systems are in place, we must take this initiative ourselves.

A variety of software options exist that can help apply watermarks to your artwork.

Watermark Pro 2

I have no financial stake or benefit from endorsing Watermark Pro 2.

iWatermark Pro for Windows - The Original Watermarking App | Plum Amazing

iWatermark Pro for Windows serves as a dedicated watermarking application, designed to protect your images.

I reviewed several software options and selected Watermark Pro 2 due to its capability to embed various types of watermarks, including visible and two hidden ones.

For hidden watermarks, one method incorporates data into the IPTC file, while the other employs a stegomark technique.

The IPTC method embeds data within the image's Metadata, structured by the International Press Communications Council (IPTC). Unfortunately, many social media platforms like Facebook and Flickr often strip images of their Metadata upon uploading.

The alternative hidden method utilizes steganography to conceal data within the artwork.

Standard Text Watermark

To begin, open the program. Navigate to File -> Set Folders, and designate an output folder for your watermarked images.

You can also select an input folder if you wish to batch process multiple images. I opted to drag and drop my chosen images into the “Image Well” at the bottom.

The software includes demo settings for various watermark options, displayed in the left panel. Choose “Demo 05 — Text Watermark” from the control panel. The file will be locked; click on the blue padlock to unlock it. Now, erase the existing text in the textbox and input your desired watermark text. For instance, I used a watermark of copyright C followed by my name, J. Iovine. Rename the file as desired, such as “John — Text For Lines,” and save it. This saved file will appear in the left panel.

Adjust the text size, color, and positioning within the artwork using the controls provided. Once satisfied, remember to save the file again; otherwise, your changes will not be applied.

To apply the watermark, click on “Process Selection” or “Process Batch” if you wish to watermark all images in the “Image Well.” A pop-up window will appear.

Select the image in the “Image Well” you want to process; it will appear in the pop-up window. Processing takes a few seconds.

Once done, close the pop-up window. Your watermarked image will be saved in a subdirectory of the output folder you designated. It’s that straightforward. Before proceeding to the next section, remember to click the padlock to lock the text watermark.

IPTC Data

The same procedure applies for writing IPTC data.

First, access the IPTC settings in Watermark Pro by navigating to Settings -> IPTC:

This will display the IPTC data screen.

You can fill in as much information as you wish. I included "Midjourney" as the rendering AI, the creation date, and my name as the author. After entering your data, close the window.

Next, open “Demo 11 — Tag Metadata,” erase the existing data, and input your desired information. Change the file name and save it.

Utilize the same procedure for writing IPTC data to the image file as you did for watermarking.

To view the IPTC data you entered, go to the top menu bar, select Windows -> Photo Information, and scroll down to see the data you wrote.

I adhere to the principle of “Trust but verify.” For independent verification, I use a free online tool to examine EXIF, IPTC, XMP, and additional data. You can find it here:

https://www.imgonline.com.ua/eng/exif-info.php

Below is a screenshot from this online program displaying the IPTC data I wrote to the file.

Stegomark Tags

The stegomark is embedded in the image file and is resistant to cropping and resizing. Thus, even if the image undergoes alterations, you may still identify it as your creation.

It is advisable to keep your Stegomark text to 25 characters or fewer. Note that the stegomark is only compatible with JPG images.

Before proceeding, ensure all open watermarks are locked. Open “Demo 4 — Stegomark Watermark” and unlock the padlock to update the data.

I modified the text to “Copyright j.iovine 2022” and opted against a password. Including a password means that access to the stegomark requires it; without it, anyone with the appropriate software can view the mark. I renamed the file to “Stegomark Watermark” and saved it.

I then selected my image and processed the watermark as previously described.

Viewing The Stegomark

To view the Stegomark, go to the Windows tab and select “Stegomark Viewer.” This will open a pop-up window. Click the "Select" button to load the image created with the Stegomark Watermark.

After the image loads, click the “Apply” button to view the data.

Conclusion

Watermarking presents a cost-effective way to identify your images and affirm your authorship.

Watermark Pro has a detailed online manual available for those interested in this software:

https://plumamazing.com/iwatermark-pro-2-win-manual/#Stegomark-Watermark

A Final Note

If you scroll to the bottom of the article, it will be marked as read. You can applaud an article up to 50 times. The more applause an article garners, the wider its distribution.

Thank you.

Share the page:

Twitter Facebook Reddit LinkIn

-----------------------

Recent Post:

# Discover the Ultimate Tech Tip for a Balanced Life

Explore the best tech tip that encourages taking a break from screens and enjoying real-life experiences.

The Potential Consequences of Doubling Earth's Oxygen Levels

Exploring the implications of increased oxygen levels on life and the environment.

Mastering Missing Data: Four Effective Imputation Techniques

Explore four elegant methods for addressing missing data in your datasets using Python.

# The Importance of Addressing Men's Depression: A Call to Action

Explore the critical need for addressing men's depression and its profound impact on health and wellbeing.

Rediscovering the Self: Embracing the Second Half of Life

A personal journey of rediscovery and healing in the second half of life, inspired by Richard Rohr's insights.

Reflections on Overcoming the Know-It-All Complex

A personal journey of growth from being a know-it-all to embracing humility and self-discovery.

Why Books Remain Essential Research Tools in the Digital Era

Explore why books, in all formats, are vital for research and writing in today's digital landscape.

Understanding the Language of Narcissism: Key Insights

Explore the manipulative tactics of narcissists and learn how to identify and protect yourself from their behaviors.