Solved

encrypting photos

Posted on 2011-02-24
4
455 Views
Last Modified: 2012-05-11
Is it possible to encrypt jpegs so they cant be reproduced?
0
Comment
Question by:rodobash
  • 2
4 Comments
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 34975451
That would mean they can't be viewed either.
0
 

Author Comment

by:rodobash
ID: 34979642
What i'm getting at is a "watermarking" process that is not so disturbing to the image. Is there a way i can keep propriety of images without putting my "brand" on the image?
0
 
LVL 3

Accepted Solution

by:
mmoore82 earned 500 total points
ID: 34980671
Any image can be copied if someone wants it..  all they simply have to do is take a screen shot and cut out your image, then place it into any photo editing program.  

Put a copyright notice on the image, and use watermarks on thumbnail and preview images.  You can also try adding your trademark to the metadata of the JPEG, but unfortunately any image can be copied.. just have to be vigilant and crack down on those who use them without permission if you make a living from these images.  

Hope these comments could be of assistance, best of luck.  :-)
0
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 34982231
I believe Photoshop has a watermarking procedure.  Most of the photographers I deal with do put their 'brand' on the pic somewhere so people can read it.  And @mmoore82 is right.  I tell people who ask about 'protecting' their pictures on the web, if you can display it, I can copy it.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
iMac stalls in Office 2016 5 57
Mac Laptop - Water Spill 12 98
time machine 8 40
Auto-rotate google map 1 28
If you are using Mac OS X and have a large number of login items set up in accounts, under system preferences, you may find that your computer is sluggish and unresponsive during startup until everything is done launching. Another problem that a…
Syslogd is a utility that traps and logs messages sent by running processes. It is configured with the syslog.conf file, which consists of lines containing a pair of fields: "the selector field which specifies the types of messages and priorities to…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now