Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online

Basic Tips For Photographers On How To Protect Your Images Online 

Participating in social media and taking advantage of the cloud computing and the web in general is a great way for photographers to gain exposure, make friends, get new creative ideas and promote their hobby or work. All this positivity is too good to be true and is tarnished by the dangers of online image theft.

images-security

(Image Source: Shutterstock)

This can happen at two levels:

  1. Breach of security, usually by password guessing. This means that everything in your account can be used or misused.
  2. Theft of individual images.

The first case is a catastrophic scenario that can easily wipe out professional lives and should be avoided at all costs. The second case is far less severe and can cause anything from a small irritation to serious drain of income. Images, like any data, can never be a hundred percent safe online, however there are simple measures that help.

Protect Your Password

There is a whole online community with dedicated forums on how to guess or predict passwords, it is therefore vital to follow some simple rules:

  • Never use single words as a complete password.
  • Do not include all or parts of your name, surname, birth date, pet name or data that can be found on online profiles.
  • Do not use your password as a hint.
  • Try to mix upper and lower case characters, numbers and symbols in the same password. The more unpredictable the order the better.
  • Avoid passwords that coincide with collection and gallery names. If necessary, make galleries unlisted so that only you can access them and then give access to who you want via links.
  • It might be overkill, but never use passwords of the 123456 or abcdef type. This way you are becoming a sitting duck waiting to be shot.

Protect Your Images

comic-strip-5 copy

Once an image is posted online, it is automatically pushed out in the wild jungle. Protecting individual images is in many ways an impossible task and believe it or not more difficult to achieve than keeping your passwords and accounts safe. Some measures are:

  • Disable right clicks on your website. It is the very first thing tried on images.
  • Use watermarks. These can vary from a signature in one corner of the image to heavy watermarking over the whole image surface. For the images I really care about, I prefer a combination of the two, with tiled small watermarks all over the image surface. The key here is to avoid making your shots repulsive and destroying the worthiness of otherwise good work. Making watermarks opaque and barely detectable visually is very important. If you find them annoying then resorting to a signature watermark is enough for you.
  • Resort to professional watermarking like that provided by Digimarc that includes an owner ID and tracking across the Internet. I find it hyperbole because the aim is to prevent theft in the first place.

I would say that there are ways to minimize rather than prevent damage. Once a photographer is aware of online dangers, it is at their discretion to choose appropriate measures. The whole idea is that there is many people with few moral inhibitions and very bad intentions. Therefore, spending time to protect your visual creations is time very well spent.

By Dimitrios Matsoulis

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

The Meaning Of Secure Business Agility In The Cloud

The Meaning Of Secure Business Agility In The Cloud

Secure Business Agility In The Cloud As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable…

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

Does Slack Live Up To The Hype?

Does Slack Live Up To The Hype?

Does Slack Live Up to the Hype? Slack’s the definition of a business success story. In just a couple years, it’s evolved from a gaming company’s internal communication tool to a globally used platform that was last valued at $2.8 billion. The popular collaboration tool, dubbed “social media for business,” first made an appearance on…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor