DeadMark
Invisible watermarking for image, video, and audio — C2PA-aware, log-backed, and designed to survive real-world transforms.
The goal is simple: keep it invisible, keep it verifiable, and keep it alive after edits.
For image and video we tune changes as close to pixel level as possible while balancing invisibility, robustness, and survivability. For audio (including video audio tracks) we apply subtle edits at selected time-frequency instances to keep the watermark inaudible but recoverable.
Every encode produces structured logs (CSV/JSON) to support audits and later model training. It can also work alongside C2PA manifests when they are present in your distribution workflow.
DeadMark uses an AI-driven, ML-adaptive multi-carrier stack across image, video, and audio. The system automatically decides the best technique mix and strength for each asset so watermark signals stay as invisible as possible while maintaining robust verification after common edits.
C2PA + DeadMark workflow
We use C2PA manifests when present, but DeadMark does not depend on C2PA alone. Our primary verification path is the invisible UID watermark + internal decode logs, so source tracing still works even if a platform strips manifest metadata.
In practice, our UID recovery rate is designed to remain useful even when manifest recovery fails. C2PA strengthens provenance. DeadMark keeps verification continuity.
What ships together
- • Invisible media watermark (image / video / audio)
- • UID-linked encode + decode logs
- • Detection overlays for operator review (product UI)
- • C2PA manifest support in provenance workflows
- • Fallback verification when C2PA is stripped
C2PA when available. DeadMark verification even when it isn’t.
We support standards-based provenance (including C2PA) where it helps, but our verification workflow is not dependent on a manifest surviving the entire content journey. DeadMark uses its own operator workflow, embedded UID signal, and timestamped internal logs to preserve traceability when external metadata is removed.
Practical note: in many real-world distribution paths, metadata can be lost before the embedded signal is. In our intended workflows, embedded UID/signal recovery is designed to outlast manifest survival, and even when full UID decode degrades, signal presence/evidence may still remain unless the media is heavily transformed (including some AI transforms). That’s why we treat C2PA as a valuable layer—not the only layer.
Generate / ingest media
Media enters the DeadMark workflow through our own operator workflow and pipeline controls. C2PA can be attached when present, but generation and verification do not depend on it.
Embed UID + internal logs
DeadMark embeds a source-linked UID signal and records decode/verification context in internal logs. This gives us continuity even when external metadata is incomplete or stripped.
C2PA provenance layer
C2PA manifests are additive and useful for standards-based provenance workflows. We surface them in review outputs when available, but they are not the only proof path.
Recover, verify, and audit
Verification can use embedded UID recovery, decode evidence overlays, and timestamped internal audit logs. If C2PA is stripped, the embedded signal and logs can still support triage and traceability workflows.
Why we show both C2PA and internal evidence
Standards matter for interoperability. Embedded forensic signals and internal logs matter for resilience. Showing both helps buyers understand the full verification workflow without exposing proprietary embedding details.
Roadmap note
Text documents, plain text, and code artifact support are planned next. Current target for broader preview coverage is around June 2026, alongside expanded document-focused verification workflows.