Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Document Watermarking

in Blog, Document Security, DRM, PDF Security

Watermarks for document security.

Watermarking is quite an old technique, appearing to start in the 13th century when it identified the papermaker or the trade guild manufacturing the paper.  So right from the beginning it was about preventing forgery and identifying the source of the paper.  The Gutenberg Bible was watermarked.

The common use of watermarks in paper today is to protect banknotes and postage stamps (since 1826).  Putting watermarks into the paper was not the only technique developed – intaglio printing printed into the paper and made a distinct ridge that was noticeable to the touch.

But intaglio might be thought of as a precursor to using laser and inkjet printers to produce watermarks as part of printed documents.  What makes the difference is that with today’s printing technology we print everything with a single pass of the paper instead of having multiple passes, one for each technique.

So what’s the big deal about watermarking as a security method?

The thing is that watermarks can be used to provide many controls reasonably easily.

The properties of watermarks include:

  • Authenticating the source of the document;
  • Identifying the content owner;
  • Authenticating that the content is unchanged;
  • Identifying any copyrights claimed;
  • Identifying the authorised user of this copy of the document.

This is useful in any number of use cases, and as a result, users commonly watermark Excel, Word, PDF, and image files as well as physical banknotes, documents, postage notes, etc.

Authenticating the source and owner

On banknotes, the watermark is used to prove that the claimed issuing bank is valid and that the banknote is valued at the sum shown on the face.  It does this by containing watermarks that are very difficult to copy, and are a mixture of printing and embedding, adding holograms and sometimes even transparent portions.  The idea is not to make them impossible to forge, that would be rather far-fetched, but to make it so expensive to copy that it is not worth doing.

In the humble world of computers you can’t get a printer that would reproduce all these technical complexities, but you can still make things difficult to copy.

Take the picture below.  It may not look very interesting at first glance, but it does have some very interesting properties.  It is a selection from what is called a Mandelbrot set.

This is a highly complex piece of mathematics which when expressed visually as fractals, which are infinitely complex patterning, produce some interestingly complex patterns that are quasi-self-similar (in detail they do not repeat).  See Wikipedia if you are interested in the technicalities.

So you can select a pattern such as the one below, and be reasonably confident that nobody else will be able to reproduce it exactly.  Reproducing the image below which I have provided as an illustration of the point is very hard indeed, which means you can use the technique to create almost unique patterns to associate with your document content.

Another opportunity when using such patterns is to make them fairly light rather than highly contrasted.  That has the result that if printed documents are scanned or copied the pattern will either fill in and look muddy, or will become more highly contrasted and show up as hard black and white instead of grey.  In either case the authenticity of the document is in question.

Unfortunately normal laser and inkjet printers are not able to print to a quality that would show hidden words and markings when photocopied although other printing technologies (as used on banknotes and cheques) can do that.

Finally, adding a watermark of this type can help resist processing using an OCR scanner since the scanner can be upset trying to make some sense out of the background watermark.

Authenticating content is unchanged

In order to change the content that the watermark is protecting you have to be able to separate the content from the watermark.  If the text is a black colour and the watermark is also colour black it will be impossible to run the extract.  If you try to drop new text with a transparent background on to the current image it has to fit exactly over existing text or it will reveal it is faked.

Similarly you cannot copy and paste from one part of the picture to another because the pattern does not repeat so it will be immediately obvious it has been altered.

So the authentication of the content of the document is much more straightforward, particularly if it is being claimed that the document is a genuine copy, but not provably an original.

Identifying Copyrights

One of the issues of using copyright as a legal measure of control is the need to include a copyright mark in some prominent position.  Whether this needs to be on every page is a matter of debate, although some prefer to do that to address the case of linking copyright to particular diagrams, pictures or tables.

It is possible to include a copyright statement as a watermark, but by the nature of watermarking, text is always put in the same place, so it is possible to use an editing tool to remove it, unless the publisher is happy to have invasive watermarking which goes through text and pictures in the document.  This may be acceptable, particularly where printed copies bear invasive watermarks while viewed watermarks do not.

Of course this would require that there were different watermarking schemes possible between viewed and printed images.  That would require a relatively sophisticated DRM control system that allowed a content owner to distinguish between the treatment of a visual image (which is presumably the desired presentation and brand image) and the printed image (which could be for backup or offline use).  This may seem to reverse centuries of dealing with the printed image, but over the next 20 years we are going to see generations of people who read naturally from a tablet or phone and they are not going to reach for a book when they can go online.  But we must plan for the future.

Identifying the authorized user

Watermarking strategies are also about making the authorized user feel uncomfortable or unwilling to allow other to have copies of documents they were authorized to use.

Some people claim that under Copyright Law it is their right to allow others to have copies of any document for the purpose of private study (reading it?) at no charge.  In classical terms you could say that such people are effectively operating as lending libraries?

And that is all because normally there is nothing to identify which user(s) passed on their copy to someone else.  However, using dynamic watermarking it is possible to include personalization into both viewed and printed copies of documents.  Personalization could be the addition of a name or an identifier, an email address, a company name (where a corporate body is the ‘user’ and not a private individual) that would allow the publisher, through information in their own administration system, to identify which individual or organization was the source of the printed copy or the screen shot.

General observations about watermarking

Watermarking can be a powerful technique provided you understand what protection effect is going to be achieved with the method you have selected.  It may be necessary to use more than one type of watermark, since an anti-copy watermark or adding a stamp to a PDF will not identify the authorized user, and vice-versa.

Choosing the colour of a watermark is important.  If screen images are captured – say by a camera – then a picture editor can be used to remove a watermark easily if the watermark is a unique colour.  So a red watermark when red is hardly ever used as a colour, is easily removed.

Also, if a watermark is always outside the normal page area of the document (say always in the header or footer) it is also not too difficult to remove, although more work than removing a colour.  But to make this more difficult, it is necessary to have the (text) watermark run with the text of the document.  This can create a conflict between the wish to protect the document and the wish to have a highly attractive document.  So there will be some compromise between appearance and security which only the publisher can decide.  The more important the security, the less visually attractive the result.

It is possible to select extra thin fonts – examples of free fonts may be found searching the Internet – and include Swiss 721 thin BT and HowardThinRegular which are much less likely to seriously overwrite written text or pictures.  Using a larger font and a lower opacity – Swiss 721 thin BT and HowardThinRegular can improve the acceptability from a visual impact.

Finally, you may want to time-stamp a digital document for copyright purposes and to verify sequencing.

Tags: document drm, document security, drm, pdf drm, pdf security
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Document Expiry using DRM controls Link to: Document Expiry using DRM controls Document Expiry using DRM controlsLink to: Offline Use of Documents with Locklizard PDF DRM Link to: Offline Use of Documents with Locklizard PDF DRM Offline Use of Documents with Locklizard PDF DRM
Scroll to top Scroll to top Scroll to top