Liccium
Liccium.comTDM·AI Opt-OutCreator CredentialsFAIA – FAIR AI AttributionContact us
  • About Liccium
    • Introduction
      • What is Liccium?
      • Who is Liccium for?
      • Why Does Liccium Matter?
  • Technology
    • ISCC Content Fingerprinting
    • Verifiable Creator Credentials
    • Soft Binding of Metadata
    • Federated Content Registries
  • Products
    • Liccium Cloud app
      • Generating ISCC Codes
      • Basic metadata
      • Liccium plugins
      • Creator credentials
      • Liccium browser plugin
  • Liccium B2B Declaration Engine
  • Metadata API
  • Registry Set-up
  • Solutions
    • FAIA – Fair AI Attribution
    • Opt-Out Registry
    • TDM·AI 𐂂 – Asset-Based Opt-Out
  • Use Cases
    • Creators & Rightsholders
    • AI Model Providers & Digital Platforms
  • Journalists, Fact-Checkers & News Organizations
  • Institutions & Regulatory Bodies
  • References
    • Liccium
    • ISCC
    • Standards
    • Regulation
  • Legal information
    • Imprint
Powered by GitBook
On this page

Was this helpful?

  1. Context
  2. Complementary solutions

Watermarking and steganography

Last updated 1 year ago

Was this helpful?

In/visible messages are embedded in the non/perceptible parts of the media file

Efficiently incorporating information into media files can be achieved through techniques like watermarking and steganography, where digital signatures, certificates, or other data can be embedded either visibly or covertly. These well-established technologies, with centuries of history, offer a dependable means to safeguard both the file and its embedded metadata against tampering.

In the context of discussions surrounding synthetic or AI-generated content, watermarking and steganographic methods have emerged as potential solutions to address the challenge of identifying AI-generated content and enhancing transparency in media markets.

However, there are drawbacks to consider. These techniques often rely on proprietary and costly technology, creating dependencies, and necessitating that users have access to the same software used for embedding hidden messages initially. Moreover, the embedded data can be susceptible to removal.

Watermarking and steganography