Privy Labs Protocol Whitepaper v 1.0
  • Privy Labs Protocol
    • Introduction
      • The paradox of social media
      • The persistence of piracy
      • The bottom line
    • Solution Overview
    • Team
  • Our Philosophy & Values
    • 3 Core Tenets
    • Our Why
    • Why Web3
  • Our Approach
    • Problem-solving at the source
      • Core Primitives
      • Copyright - Originality, Creativity, & Fixation
      • The DMCA
      • Removal
  • The Core Technology
    • Systems Overview
      • Virtual Account System
        • Account Abstraction
        • Privacy
        • Gas
      • Content Certificate & Tracking System
        • Proof of Ownership
        • Watermarking
        • Encryption & Cryptography
        • Storage
        • Publicity & Privacy
      • Content Verification Network
        • Permissioned Approval
        • Takedown
  • Use Cases
    • Use Cases
      • Sensitive content: Adult creators, models, & sex workers
      • Content Creators
      • Digital artists & photographers
      • Journalists
      • Families
      • Celebrities
      • Social media platforms & creative marketplaces
      • Trust & Safety Organizations
  • PrivyCam
  • Governance & Community
    • Privy DAO
  • Tokenomics & Incentives
    • Incentive Model
  • Risks & Mitigants
    • Risks & Mitigants
  • Our Roadmap
    • Our Roadmap
Powered by GitBook
On this page
  1. The Core Technology
  2. Systems Overview
  3. Content Certificate & Tracking System

Watermarking

PreviousProof of OwnershipNextEncryption & Cryptography

Last updated 2 years ago

Watermarking is a practice that has been employed since the 13th century, but in digital steganographic practice, only began to be demonstrably adopted in the early 1990’s. In our case, we apply a to convert an image into its frequency components. We then embed an artificial message inside the image (modifying its frequency from random noise into modified non-uniform noise). The goal with this particular notion is not expecting the complete recovery of the embedded message per se, but rather, to distinguish if the image was algorithmically modified at all from random noise after being shared through numerous platforms and modification methods. A better example can be shown visually below:

discrete Fourier transform