Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online 

Participating in social media and taking advantage of the cloud computing and the web in general is a great way for photographers to gain exposure, make friends, get new creative ideas and promote their hobby or work. All this positivity is too good to be true and is tarnished by the dangers of online image theft.

images-security

(Image Source: Shutterstock)

This can happen at two levels:

  1. Breach of security, usually by password guessing. This means that everything in your account can be used or misused.
  2. Theft of individual images.

The first case is a catastrophic scenario that can easily wipe out professional lives and should be avoided at all costs. The second case is far less severe and can cause anything from a small irritation to serious drain of income. Images, like any data, can never be a hundred percent safe online, however there are simple measures that help.

Protect Your Password

There is a whole online community with dedicated forums on how to guess or predict passwords, it is therefore vital to follow some simple rules:

  • Never use single words as a complete password.
  • Do not include all or parts of your name, surname, birth date, pet name or data that can be found on online profiles.
  • Do not use your password as a hint.
  • Try to mix upper and lower case characters, numbers and symbols in the same password. The more unpredictable the order the better.
  • Avoid passwords that coincide with collection and gallery names. If necessary, make galleries unlisted so that only you can access them and then give access to who you want via links.
  • It might be overkill, but never use passwords of the 123456 or abcdef type. This way you are becoming a sitting duck waiting to be shot.

Protect Your Images

comic-strip-5 copy

Once an image is posted online, it is automatically pushed out in the wild jungle. Protecting individual images is in many ways an impossible task and believe it or not more difficult to achieve than keeping your passwords and accounts safe. Some measures are:

  • Disable right clicks on your website. It is the very first thing tried on images.
  • Use watermarks. These can vary from a signature in one corner of the image to heavy watermarking over the whole image surface. For the images I really care about, I prefer a combination of the two, with tiled small watermarks all over the image surface. The key here is to avoid making your shots repulsive and destroying the worthiness of otherwise good work. Making watermarks opaque and barely detectable visually is very important. If you find them annoying then resorting to a signature watermark is enough for you.
  • Resort to professional watermarking like that provided by Digimarc that includes an owner ID and tracking across the Internet. I find it hyperbole because the aim is to prevent theft in the first place.

I would say that there are ways to minimize rather than prevent damage. Once a photographer is aware of online dangers, it is at their discretion to choose appropriate measures. The whole idea is that there is many people with few moral inhibitions and very bad intentions. Therefore, spending time to protect your visual creations is time very well spent.

By Dimitrios Matsoulis

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving