Digital Piracy Protection & Applied Security - Images, Audio, Video & Multimedia

Giovanni™ Under the Hood Step 2: Watermark Message Generation

The watermark message is created and the watermark payload is generated. Giovanni recruits part of the random number that it spun at the beginning of the process and uses it to "fingerprint" the message that is to be watermarked into the signal, using the hashing algorithm. Giovanni is agnostic on hash algorithms, and others could be employed. The product of that hash - a combination of the message, usually a short number, and the hash - forms the watermark payload, literally the bits that will be embedded into the information.

Copyright © 1997-2013 Blue Spike, Inc. Giovanni, Scrambler, the Blue Spike logo, and the Giovanni logo are trademarks of Blue Spike, Inc. "Didya Use Protection," "Digi Use Protection" and "recognition, recognition, recognition" are also trademarks of Blue Spike, Inc. "Blue Spike" and "Giovanni" are registered trademarks. All other trademarks are the property of their respective owners. The Company reserves the right to make alterations or amendments to the information in this document and/or product specifications at its discretion. No freedom to use patents or other intellectual property rights is implied by the publication of materials on this Web site or to off-site documents to which it directs readers. Send comments and suggestions to

Privacy Policy | Terms of Use

For Sales & Licensing:

For Technical Support:

For Press & Media Relations:

For Career Opportunities: