Image theft is not only practiced by many people but there are also plenty of services that advocate plagiarism and encourage it by providing the means to do so. Over the years, web page content has become more accessible and the search engines have provided services for special searches to locate and download your media. On top of this, there are hundreds of software developers that create programs to seek and download your media and evade any protective measures possible. These unauthorized users of your intellectual property try to justify themselves with rights to free information statements but in reality, they are most protective of anything that they have themselves even if they just stole or “borrowed” it.
The first effective form of image protection
that was introduced for use on the Internet that actually
worked beyond theory was image encryption. It was developed
by ArtistScope in 1998. Image encryption has many advantages
but is not a perfectly safe solution since it needs to
include some other techniques to protect the image from
other methods of copying. Here are some of the techniques
that cunning people may use to copy your images as well as
their pros and cons.
Overlying a clear image over the main image seems like a clever idea and this can actually work unless someone realizes that there is an overlaid
image. The technique that is employed here is to place a sacrificial
image in a layer that is superimposed over the image that you are trying to protect. The overlaid
image, being a transparent gif, is invisible on the page and the visitor who tries to save the
image by right mouse-click will only be able to steal the gif. This seems effective but only until the person realizes that the
image that he wants is behind a layer. To get around this copy protection technique, one only has to save the whole page with the
Some photographers use watermarking to label photographs that they distribute to agencies. Some naive photographers actually believe that this form of watermarking provides copy protection for a
image when in fact; it is merely a means of attaching a business card to a
image as a tag. The watermark tag is invisible to the eye and can only be seen when the file is opened in a
image viewer that supports such watermarking techniques. The watermark tag is ineffective in the prevention of copying or saving from a web page and the
image thief only has to open the file in any image editor and save it again to shed the watermark tag completely.
Another form of watermarking is by overlaying text or another image onto the image that is to be protected and then merging them. There are software programs that are specially designed to do this and most image editors can also watermark your images, especially if they support layers. The technique here is to have the original image open in the editor and then either type in some text over the image or to create a new layer for the text or maybe even use a ready-made transparent logo. When the image is saved, the layers are then merged into one to furnish the original image with an overlaid watermark. This type of watermarking is a deterrent for people wanting to use your image because it has been marred and cannot be used in other projects. If it is your logo in the middle of the image, they will definitely not want to use it.
It is funny how some people recommend the use of degraded images. It is not effective protecting the originals because they are not accessible and it is certainly not going to impress your visitors or enhance sales if you are using the
image to represent your product. So what is a degraded image?
Image degradation results to a loss of picture quality because of
image or file compression. To compress a image, you simply open it in any popular
image editor and indicate your desired quality setting. Compressing to 60% or less will yield a poor quality
image. On the other hand, original images (taken from scans of
images or digital cameras) can easily be compressed to 80% without any noticeable loss of quality. A degraded
image will be one that has been compressed to 60% or less and will obviously be
The splicing of images can limit the image grabbers to an extent but is really of little importance. While a spliced
image may slow down mouse saves of a image, it does nothing to prevent anyone from taking a screenshot or saving the whole page. Here, the technique of "splicing a
image" is cutting it up into segments. To display a segmented image, they need to be re-aligned in a web page and arranged in a form of a table that one can actually take a screenshot of, since saving the table keeps the picture intact.
Image splicing is not an effective copy protection measure at all because the visitor can get the original in any case.
Utilizing Flash to display images will slow down the copying because the
image will no longer be recognized as a image (site and
image downloaders) but it can still be copied by taking a screen shot. Also, there are many programs available today that are used to decompile Flash and extract their contents. Flash used to support some functions for disabling the clipboard but those functions are no longer supported in the latest versions.
Disabling right mouse click can slow down copying but it offers nothing more than a mild inconvenience to the person who wants to steal your
images. By disabling the right-click capability of your mouse, you are removing the menu options which include copy, paste, save as, etc. However, a simple page save will allow you to save all
When the mouse hovers over an image, IE6+’s image toolbar appears automatically with an option to save the
image. Of course, this can be disabled but it is just one of the many threats that we are faced with as a result of the browser makers and other advocates of plagiarism offering more and more tools for stealing our livelihood.
First, only Internet Explorer offered the option of wholly saving a web page with all images and other media neatly packed into a folder. Nowadays, however, all browsers allow this kind of action to be carried out. This will save the page and collect every component that is used on that page, easily evading most copy protective measures that you may have installed. The only way to prevent this diabolical saving technique is to use encrypted images.
While a image is displayed in a Java applet and may be safe from mouse saves and site grabbers, the
image can still be copied by taking a screenshot and the visitor can also view source to get the location of the
image. There are also many ordinary applets proffered as
image protection in an attempt to imitate the
ArtistScope security applets (more below).
Regardless of how the image is diced or spliced, it can still be located in cache. Every component of a web page is first downloaded and saved in the temporary Internet folder known as "cache". Not so long ago, web browsers might have itemized the content of their cache but accessing a file directly was almost impossible. But today, that has all changed and the browser makers have yet again made our livelihood more accessible to everyone by enabling direct access with a simple “double-click”. To protect content stored in trash, that is, to prevent it from being directly accessible, it needs to be encrypted or domain-locked so that it is inaccessible and its original location will not be compromised.
There are numerous programs available for searching websites and downloading media. Some specialize in particular file types and others can be set to look for a desired file type. These programs, often known as site grabbers, will spider your web pages like a search engine does and list the targets for download. To protect from this copy/save technique, you need to either encrypt your
images or the links to them, or have your pages delivered on the fly using a scripting language like ASP or PHP that set some special requirements before delivering the page.
Encrypted images cannot be displayed without first being decrypted, otherwise they won't be visible.
Image encryption is also the most secure solution for storing
images on a web server because until they are decrypted, they are of no use even to your webmaster. First developed by
ArtistScope in 1998,
Secure Image is the only solution that will display encrypted
images on a web page that does not require a system plugin.
Encrypted images created by ArtistScope copy protection solutions cannot be displayed in any image viewer except the ArtistScope security viewer as well as only from the owner's website. The key code for decryption is embedded into the image and when loaded, the security applet checks the key code against the URL that is displaying the website. If the encrypted image's key code does not match the website, the image will not be displayed.
Encrypted images are also safe from retrieval from browser cache (temporary internet files) because the image in cache is the encrypted version and not one that has been decrypted. Only the ArtistScope security applet can decrypt the image and it does that only if it is displayed on the owner's website.
Encrypted images can offer the following protection for images:
Encrypted images created by ArtistScope software (true
image at all. They may encrypt a link to a image but they cannot encrypt the
image itself. For proper software to encrypt images,
please see Secure
Image and CopySafe Web.
To protect images from screenshots and screen capture you need
a plugin with permission to operate at system level. There are
many plugins proffered as screen capture protection but they
are mostly not secure because they rely on detecting a screen
capture program by name and preventing it from functioning or
causing it to crash. The only solution that properly prevents
PrintScreen is the CopySafe
solution by ArtistScope, which runs as a Windows service to
manage the clipboard when necessary.
After every precaution has been taken and every preventative
technique employed, there is still the possibility that someone
can take a screenshot while viewing your web page using a
remote connection. "Remote viewing" is the process of logging
into another computer from your computer and being able to view
and run programs on the desktop. In effect, the person is
operating the other computer remotely and see and does most
things just as if they were using it directly.
CopySafe Web is the only
solution that provides protection from PrintScreen and screen
capture. Images are encrypted by CopySafe Web are domain
locked and can only be displayed on your licensed web site.
In fact those images files are perfectly safe while stored
on the web server, even safe from your web designer and the
web host's staff.
The CopySafe Runtime is not to be confused with any of the hack imitations that you may find offered elsewhere. CopySafe was designed as a universal solution for use on Windows to secure the livelihood of artists, a cause that ArtistScope has maintained by overcoming ever emerging obstacles since 1998.
The fact that others may try to imitate CopySafe is just another example of the piracy, plagiarism and theft of intellectual property that we are all trying to prevent.
ArtistScope Site Protection System (ASPS)
does not need to encrypt images to protect them most
securely, because ASPS copy protects
everything displayed on a web page when viewed using
the ArtisBrowser on both Windows and Mac computers. However to
use ASPS, one needs to use a dedicated or virtual server for
the permissions to install ASPS software at system level.
Otherwise, for hosted web sites,
CopySafe Web can