Embed multi-layer steganographic watermarks into any image. Survive WhatsApp compression. Detect origin even when EXIF is stripped. Powered by XOR obfuscation + LSB + spread-spectrum tech.
Even if your image gets shared, compressed, or stripped — our system finds it.
Payload embedded in least-significant bits of each pixel. Invisible to human eye. Survives lossless operations.
Distributed across random pixels using a seed derived from your payload. Resilient to JPEG compression above quality 60.
Hash of your payload is encoded into corner pixels. Even if main payload is stripped, residue remains detectable.
XOR-obfuscated metadata embedded into EXIF fields and JPEG comment markers. Carries full identity data.
POST any image, get it back with 4 invisible watermark layers. Custom metadata support.
Send any suspected image — our system scans all layers and returns full metadata.
Read full EXIF, IPTC, XMP metadata. Write custom fields. Returns JSON.
Detects if image was compressed by WhatsApp, Telegram, or other apps. Estimates quality.
Every API call, watermark, detection, user registration — all logged to your private Telegram channel in real time.
4 keys per user: 2 watermark, 1 detect, 1 metadata. Separate monthly limits per key type.
Free → Basic → Pro → Enterprise. Instant upgrades with Indian payment support.
All payloads XOR-encrypted with your master key. Only your system can decode. Tamper-evident.
Works with any language. No SDK needed. Returns watermarked image URL + full metadata JSON.
# Apply watermark
curl -X POST https://wm.atdb.uno/api/watermark \
-H "X-Api-Key: vxw_your_key_here" \
-F "image=@photo.jpg" \
-F "owner=YourBrand" \
-F "custom_client_id=CLT-001"
# Detect watermark
curl -X POST https://wm.atdb.uno/api/detect \
-H "X-Api-Key: vxd_detect_key" \
-F "image=@suspect.jpg"
# Response: {"watermark_detected":true,"wm_uuid":"..."}
All plans include watermark + detect + metadata APIs. No hidden charges.