Invisible Watermark — Embed & Extract
Hide a secret message inside a JPEG image using steganography. Extract it later with the same password. Everything runs in your browser — your files never leave your device.
How Invisible Watermarking Works
Invisible watermarking uses steganography — the science of hiding information within other data. Unlike encryption (which makes data unreadable), steganography hides the very existence of the message.
This tool uses the F5 algorithm, one of the most respected JPEG steganography methods. F5 works by making tiny, imperceptible changes to the DCT (Discrete Cosine Transform) coefficients that JPEG compression produces. These changes are so small that the image looks identical to the original, but the hidden data can be recovered with the correct password.
Your password controls how the data is shuffled and distributed across the image. Without the correct password, extraction returns meaningless noise. This adds a layer of security on top of the steganographic concealment.
Limitations
Invisible watermarks are a useful tool, but it is important to understand their limitations before relying on them.
- Fragile to re-compression. Saving the image with different JPEG quality settings can destroy the watermark.
- Does not survive format conversion. Converting to PNG, WebP, or any other format removes the JPEG-specific data where the watermark lives.
- Cropping and resizing. Geometric transformations alter the DCT coefficients and will likely corrupt the watermark.
- Screenshots. Taking a screenshot creates a new image from pixels, discarding all embedded data.
- Not encryption. While the password adds security, the primary goal is concealment, not cryptographic protection.
Use Cases
Proving Original Ownership
Embed a unique identifier, your name, or a timestamp before sharing an image. If someone claims it as their own, you can prove ownership by extracting the watermark from the original file.
Tracking Distribution
Embed different identifiers for different recipients. If an image leaks, you can determine which copy was shared by extracting the watermark.
Secret Communication
Hide a text message inside an ordinary-looking photo. Only someone with the password and this tool can extract it.
Copyright Notices
Embed copyright information that persists even after visible watermarks are removed, as long as the image is not re-encoded.