The Publisher's Guide to
AI Image Provenance

Why embedded metadata fails. How four protection layers preserve verification paths across real-world publishing workflows. And what decision-makers should understand before August 2, 2026.

⏱ EU AI Act Article 50 · Key transparency milestone: August 2, 2026
markmyai.com · March 2026 · v1.3

Table of Contents

01The Problem: AI Images in the Wild3
02Why Metadata Alone Fails — Test Results4
03The EU AI Act: What Publishers Must Do5
04Four Layers of Protection6
05How the Marking Works — Step by Step7
06Watermark Robustness: Real Test Data8
07The Proof Product: Verification Anyone Can Use10
08What Survives If MarkMyAI Disappears?11
09Getting Started12
10Selected References13
11FAQ for Decision-Makers14
Who this guide is for: Publishing leads, compliance officers, marketing directors, and anyone responsible for AI-generated visual content in their organization. No technical background required.

Executive Summary

Embedded provenance alone often fails in real publishing workflows. MarkMyAI combines four independent layers to preserve verification paths when images are compressed, resized, redistributed, or stripped of metadata.

Publishers mark images through one API call or dashboard workflow. Verifiers can then check whether an image's origin is still verifiable — free, with no account required.

Proof PDFs and public proof references support independent verification and make provenance usable for compliance, editorial, legal, and operational review.

Chapter 01

The Problem: AI Images in the Wild

Every day, AI-generated images are published online. In many common publishing workflows, their machine-readable origin signals are quickly lost.

When a tool like DALL·E or Adobe Firefly generates an image, it typically embeds a Content Credential — a machine-readable provenance record following the C2PA open standard. This record identifies the AI tool as the creator. Some major tools, including Midjourney and open-source Stable Diffusion, have been slower to adopt this, though coverage is expanding.

But here's what happens next:

The image is created

DALL·E generates a PNG with embedded C2PA metadata identifying OpenAI as the signer.

A designer downloads it

The image is saved to a local folder. C2PA metadata is still intact.

It goes through a CMS

WordPress, Shopify, and many CMS workflows generate thumbnails and new file variants. In these re-encoding steps, embedded C2PA metadata is often stripped or lost.

It's shared on social media

WhatsApp, Instagram, and X typically re-encode uploaded images. In many cases, the original embedded signature no longer survives.

Someone asks: "Is this AI-generated?"

The original embedded proof may already be gone by step 3, leaving no reliable publisher-side verification path.

The core problem: AI tools can sign the creation of an image. But publishers still need proof that survives real distribution workflows. By the time an image reaches its audience, the original embedded proof is often no longer available.

This isn't a theoretical edge case. It is a common outcome across many major publishing and sharing workflows.

Chapter 02

Why Metadata Alone Fails — Test Results

In our internal tests, we applied 10 common transformations to a signed image. In this test set, C2PA survived none of them.

We took a MarkMyAI-signed PNG image (1408 × 768 px) with a valid embedded C2PA publisher manifest and subjected it to 10 transformations common in real publishing workflows.

C2PA Robustness Test Results

# Transformation C2PA Intact? mark_id Found?
1PNG Re-compressionDESTROYEDNO
2Resize to 50%DESTROYEDNO
3Crop (center 80%)DESTROYEDNO
4Rotate 90°DESTROYEDNO
5Rotate 15° (arbitrary)DESTROYEDNO
6Convert to JPEG (Q90)DESTROYEDNO
7Convert to JPEG (Q50)DESTROYEDNO
8Convert to WebP (Q80)DESTROYEDNO
9Metadata StripDESTROYEDNO
10Social Media PipelineDESTROYEDNO
0/10
C2PA Survived
100%
Proof Destroyed
<1s
Time to Destroy
Why this happens: C2PA data is stored as JUMBF chunks (PNG) or APP11 markers (JPEG). Any image processing library — Sharp, ImageMagick, Pillow, or any CMS/platform backend — parses the pixel data and re-encodes it, silently discarding these markers. Even a simple re-save can remove the embedded signature, depending on the image pipeline used.
Important context: C2PA is not inherently "broken" — it is evolving. The C2PA Specification[2] defines recovery paths including hosted/remote manifests (storing provenance data server-side) and soft-binding (linking provenance to image content rather than file metadata). These mechanisms are designed to address exactly the fragility shown above. However, as of early 2026, these recovery paths are not yet widely implemented in the CMS and CDN pipelines that publishers actually use. The practical gap remains: embedded C2PA manifests are lost in most real-world workflows today. This is why MarkMyAI's additional layers exist — not to replace C2PA, but to bridge the gap until C2PA's own recovery mechanisms reach broad adoption.

Chapter 03

The EU AI Act: What Publishers Must Do

Article 50 of the EU AI Act increases transparency obligations around AI-generated and manipulated content. For many publishing workflows, August 2, 2026 is a key operational milestone.

What the law says

The EU AI Act (Regulation 2024/1689), specifically Article 50,[1] introduces transparency obligations around synthetic and manipulated content. In practice, this increases the importance of machine-readable marking and detectability for AI-generated image outputs.

For publishers, agencies, and organizations distributing AI-generated visuals, the practical issue is not only whether marking happens at creation time, but whether that transparency survives through real publishing workflows.

Who is responsible?

The AI Provider (OpenAI, Google, etc.) may add provenance or machine-readable markers at creation time. Some leading tools already do this through standards such as C2PA.
The Publisher (you) still needs a workflow that preserves transparency through editing, CMS processing, CDN delivery, and redistribution.

The transparency gap is structural: AI providers may fulfill their obligation at creation time, but embedded provenance often does not survive downstream publishing workflows.

These obligations are moving from policy discussion into operational reality. Article 50 defines transparency and disclosure obligations — it does not specifically mandate watermarking or any particular technology. But if your publishing workflow strips all machine-readable provenance from AI-generated images, you lose the ability to demonstrate compliance with those transparency requirements. The practical takeaway for publishers: provenance and disclosure must survive real workflows, not just exist at the moment of generation.

The practical question for publishers is no longer whether transparency matters, but how to preserve it through real publishing workflows.

Three questions every compliance team should ask

1. Do our AI-generated images retain their machine-readable provenance after going through our CMS, CDN, and social media channels?

2. If someone questions whether a published image is AI-generated, can we provide verifiable proof?

3. Does our proof survive independently — even if the marking provider disappears?

Not sure if your workflow has this gap?

Email us a short description of how your team publishes AI-generated images. We'll help you identify where your provenance chain is likely to break and what it may take to strengthen it. Free, 20 minutes, no commitment.

Request Free Audit →

hello@markmyai.com

Chapter 04

Four Layers of Protection

No single technology can guarantee provenance across all scenarios. MarkMyAI combines four independent layers so that verification can still be supported even when individual layers fail.

1 C2PA Publisher Signature

A digital signature following the open C2PA standard, embedded directly in the image file. Machine-readable by any C2PA-compatible tool (Adobe, Google, Microsoft). Identifies the publisher, not just the AI tool.

Fragile — commonly lost during re-encoding and derivative file generation

2 Invisible Watermark

A signal embedded directly in the pixel data using TrustMark[3] (MIT-licensed, developed by Adobe Research). Invisible to the human eye but detectable by software.

Robust — Designed to survive many common transformations such as JPEG compression, resize, moderate crop, and format conversion

3 Audit Trail + Fingerprint

A perceptual fingerprint (visual hash) stored in an external database. Even substantially modified images may still be re-identified through visual similarity matching.

External — Independent of embedded data

4 Blockchain Anchor

A public, timestamped anchor on Polygon that supports independent verification of key proof data. Sensitive publisher fields such as creator and model are pseudonymized before anchoring.

Permanent — Cannot be altered or deleted

Why four layers matter

Scenario C2PA Watermark Fingerprint Blockchain Proof?
Original image, untouchedFULL
Shared via WhatsAppYES
Uploaded to InstagramYES
JPEG compressed to Q30YES
Resized to 50%YES
Cropped 20%YES
Screenshot of screen~PARTIAL
Heavy manipulation combo~PARTIAL

Each layer independently contributes to the proof. The combination is designed to preserve verification paths across many common real-world scenarios, even when individual signals are lost.

Scenario labels reflect representative workflow assumptions based on internal tests. Exact outcomes depend on platform-specific processing pipelines, image content, and transformation parameters.

Reference: TrustMark (Bui, Agarwal & Collomosse, 2025)[3] provides the research basis for robust, pixel-level invisible watermarking used in Layer 2.

Chapter 05

How the Marking Works — Step by Step

One API call. Four protection layers applied automatically. Here's what happens when you mark an image with MarkMyAI.

Upload
Image
Invisible
Watermark
C2PA
Signature
Audit Trail
+ Fingerprint
Blockchain
Anchor
Download
Marked Image

Step 1: Invisible Watermark (TrustMark)

The image pixels are modified imperceptibly. A compact payload is embedded using the TrustMark neural watermarking model. The watermark encodes a cryptographic reference linked to the image's unique mark_id. In our tests, visual quality remained imperceptible to the human eye (PSNR > 40 dB).

Step 2: C2PA Publisher Signature

A C2PA manifest is embedded into the image file. This machine-readable provenance record identifies the publisher, records the timestamp, and marks the action as "published." It follows the C2PA v2 open standard, readable by Adobe Content Credentials, Google, Microsoft, and others.

Step 3: Audit Trail + Perceptual Fingerprint

A visual fingerprint (perceptual hash) and a cryptographic SHA-256 hash are computed and stored in a tamper-evident audit log. The fingerprint supports re-identification across many common modifications, including compression, resizing, cropping, and format conversion.

Step 4: Blockchain Anchor

A zero-value transaction is written to the Polygon blockchain. This creates a timestamped public record containing key proof data needed for independent verification. Creator and model fields are pseudonymized on-chain for GDPR compliance.

The result: You receive the marked image, a unique verify URL, and access to a downloadable Proof PDF — a self-contained document designed to remain usable even if MarkMyAI is no longer available.

Integration options

MethodBest forEffort
REST APIDevelopers, automation pipelines1 API call
Web DashboardMarketing teams, individual publishersDrag & drop
WordPress PluginWordPress sites, content teamsInstall & activate BETA
Chrome ExtensionReaders, compliance teams, editorsBrowser layer

Chapter 06

Watermark Robustness: Real Test Data

In our internal tests, the watermark survived 10 of 11 common transformation scenarios.

The test was conducted on March 8, 2026, using our production TrustMark worker. The test image (800 × 450 px) was watermarked and then subjected to each transformation independently.

Invisible Watermark Robustness Results

# Transformation Watermark mark_id Verified CRC Valid
0Original (baseline)SURVIVED
1JPEG Quality 90SURVIVED
2JPEG Quality 70SURVIVED
3JPEG Quality 50SURVIVED
4JPEG Quality 30SURVIVED
5Resize to 75%SURVIVED
6Resize to 50%SURVIVED
7Crop center 80%SURVIVED
8WebP conversion (Q80)SURVIVED
9PNG re-saveSURVIVED
10Social Media Pipeline*DESTROYED

*Social Media Pipeline = Resize to 1080px + JPEG Q30 + Center Crop applied in combination — simulates the aggressive multi-step processing of platforms like Instagram or WhatsApp.

We're being honest about the hard case. The Social Media Pipeline scenario — aggressive resize combined with heavy JPEG compression and cropping — destroyed the watermark in our tests. This is exactly why MarkMyAI uses four independent layers: no single embedded signal is expected to survive every workflow. Even when the watermark no longer survives, other layers can still support verification.
10/11
Watermark Survived
100%
Bit Accuracy (Survived)
40.5 dB
PSNR (Visual Quality)

What these numbers mean

JPEG Q30 is extremely aggressive compression — significantly harsher than many common consumer publishing workflows. In our tests, the watermark still survived this level.

Resize to 50% halves the image dimensions. Even after losing 75% of pixels, the watermark was still reliably extractable in our test setup.

Center crop 80% removes 20% of the image area. The watermark's distributed nature means it survives even partial image loss.

Format conversion completely re-encodes the file. The watermark can persist across format conversion because it is embedded in pixel values rather than stored as file metadata.

Chapter 06 (continued)

C2PA vs. Watermark: Side by Side

The same image, the same transformations — dramatically different results.

Transformation C2PA Metadata Invisible Watermark Fingerprint Match
JPEG Re-compressionDESTROYEDSURVIVEDMATCH
Resize 50%DESTROYEDSURVIVEDMATCH
Crop 20%DESTROYEDSURVIVEDMATCH
Format ConversionDESTROYEDSURVIVEDMATCH
Metadata StripDESTROYEDSURVIVEDMATCH
Social Media PipelineDESTROYEDDESTROYEDPARTIAL
Key insight: Where C2PA metadata fails in our tested scenarios, the watermark and fingerprint provide fallback paths. In the extreme social media pipeline case, other layers can still support verification even when embedded signals are lost.

What happens with a MarkMyAI-marked image in practice?

Scenario: A publisher uses the WordPress plugin on ki-welt.ch.

1. An AI-generated image is uploaded to WordPress Media Library → the MarkMyAI plugin sends it to the API.

2. The API embeds an invisible watermark (TrustMark BCH_SUPER) + C2PA signature → returns the marked file.

3. The plugin replaces both the original file and the WordPress -scaled version (if present) with the marked image. Old thumbnails are deleted. WordPress then regenerates all thumbnail sizes from the newly marked original.

4. The website serves thumbnails to visitors. Field-tested results: the TrustMark watermark survives all WordPress resizing — C2PA is stripped, but the invisible watermark remains intact in every size:

Note: WordPress creates a -scaled copy for images exceeding 2560 px. Since v1.3.2, the plugin explicitly overwrites this file to ensure the watermark is present in every frontend rendition.

Original (1500×1043)626 KB✓ watermark + C2PA
Large (1024×712)95 KB✓ watermark
Medium (768×534)57 KB✓ watermark
Thumbnail (300×209)12 KB✓ watermark

5. A reader right-clicks the image → saves it → uploads to markmyai.com/check. The checker decodes the watermark, matches the embedded token to the audit trail via reverse lookup, and returns "Verified Provenance" with a link to the proof record.

6. The publisher downloads the Proof PDF → a self-contained document with blockchain reference for audit and compliance review.


Transparency note: These are internal robustness tests conducted under controlled conditions on a specific test image (800×450 px, TrustMark BCH_5 Q-model). Results may vary based on image content, resolution, and transformation parameters. We publish our methodology and raw results because we believe honest communication builds trust.

Related reading: TrustMark (Bui et al., 2025)[3] for robust watermarking; HiDDeN (Zhu et al., 2018)[4] and Stable Signature (Fernandez et al., 2023)[5] for broader background on neural watermarking and provenance signals in generated images.

Chapter 07

The Proof Product: Verification Anyone Can Use

MarkMyAI doesn't just embed data. It produces a decision-ready proof that can support compliance, editorial, legal, and publishing workflows. No account required.

Three proof levels

✓ Verified Provenance

Full proof chain intact. Strong provenance signals were confirmed and aligned. This image has verifiable provenance linked to a publisher-side proof chain.

~ Recovered Provenance

Embedded metadata lost (stripped by platform), but the image was re-identified via fingerprint matching or watermark recovery. Provenance record found in audit trail.

✗ No Verifiable Provenance

No embedded markers, no watermark detected, no fingerprint match. No reliable provenance path could be established for this image within our system.

The Proof PDF

Every marked image can generate a Proof PDF — an A4 document that contains everything needed to verify the image's provenance, even without access to MarkMyAI:

What's in the PDF:

• Image details (SHA-256 hash, fingerprint, creator, AI model)

• Status of all 4 protection layers

• Blockchain transaction hash + Polygonscan link

• On-chain anchor string plus verification instructions

• Step-by-step instructions for server-independent verification

Who uses it:

Legal teams — as supporting documentation for internal and external review

Compliance officers — for audit documentation

Publishers — to document due diligence

Journalists — to verify image sources

Archivists — for long-term preservation

Chrome Extension: Verification in the Browser

The MarkMyAI Chrome extension (v1.0.4) brings verification directly to the reader's browser. When a user clicks the badge on an image, the extension always runs a real fingerprint check against the actual image pixels via the MarkMyAI API (~3 seconds). If the WordPress plugin embedded data-markmyai-mark-id attributes in the HTML, those are used as a fallback only if the pixel-based check doesn't match.

The Layer Check shows explicit status labels for each detection layer: Fingerprint (MATCHED / NO MATCH), Blockchain (ANCHORED / NOT FOUND), Watermark (FOUND / NOT FOUND / NOT CHECKED), and C2PA (BROWSER N/A). An optional deep watermark check (~15 seconds) can be triggered by button to verify the TrustMark watermark in the actual pixel data. The tooltip pins open on click to allow comfortable interaction.

Detection API: All Four Layers in One Call

The POST /v1/detect endpoint is the most comprehensive detection tool in MarkMyAI. Given any image URL, it runs all four detection layers simultaneously and returns a single, unified result:

LayerMethodRobustness
C2PACryptographic manifest validation via c2pa-nodeFragile — metadata stripping destroys it
Invisible WatermarkTrustMark BCH_SUPER pixel-level decodingRobust — survives JPEG, resize, moderate crop
Perceptual FingerprintVisual hash + Hamming distance matchingRobust — fuzzy matching after transforms
Database LookupAudit log records with creator and AI modelExternal — independent of embedded data

The response includes a single is_marked verdict, detailed results for each layer, and recovery_paths that explain which proof chains are still intact. If the watermark recovers a mark_id, the API automatically links it to the original proof record — even if C2PA metadata was stripped.

Key benefit: The detect endpoint works even on images that have been compressed, resized, format-converted, or had their metadata stripped. At least one recovery path typically survives common publishing workflows.

Free Public Checker

Anyone can verify an image at markmyai.com/check — no account, no login, no cost. Upload an image and the checker runs three detection methods simultaneously:

  1. C2PA Extraction — Server-side parsing via c2pa-node (with regex fallback) to identify the claim generator and signer.
  2. Invisible Watermark — TrustMark decoding to recover the embedded mark_id.
  3. Perceptual Fingerprint Matching — The uploaded image's visual hash is compared against the full audit trail. If a match is found (Hamming distance < 10), the checker recovers the original proof chain — even if the watermark was destroyed by CMS resizing, re-encoding, or screenshot capture.

This fingerprint-based recovery is what allows the checker to identify a WordPress-resized thumbnail as the same image that was originally marked at full resolution. The result is displayed as "Recovered Provenance" with a direct link to the publisher proof.

This is what makes MarkMyAI a proof product, not just a proof infrastructure. The Proof PDF, the Chrome extension, the public checker, and the three-level proof status turn technical provenance data into something humans can read, understand, and act on.

Chapter 08

What Survives If MarkMyAI Disappears?

A proof system that depends entirely on a single vendor is inherently fragile. Here's what happens to your proof if MarkMyAI's servers go offline permanently.

Proof Element Survives? How?
Invisible WatermarkYESLives in the pixel data. TrustMark is open source (MIT license). Anyone can run the decoder.
C2PA SignatureYESEmbedded in the image file. Readable by any C2PA-compatible tool worldwide.
Blockchain TransactionYESImmutable on Polygon. The TX data contains key proof data in readable form.
Blockchain ProofYESSelf-contained public anchor: key proof data can be independently checked without MarkMyAI servers.
Proof PDFYESOnce downloaded, works offline forever. Contains all data for independent verification.
Audit TrailNODatabase-dependent. Proof PDF serves as offline backup.
Fingerprint RecoveryNORequires database lookup. Watermark takes over as recovery path.
Verify APINOServer-dependent. Proof PDF + Blockchain TX replace this function.
5/8
Survive Permanently
3
Fully Independent
Blockchain Lifetime

Independent verification in 4 steps

Even without MarkMyAI, anyone with a Proof PDF can still validate key parts of the provenance record independently.

1. Check the blockchain

Look up the TX hash on polygonscan.com. Decode the hex data field to read the anchor string.

2. Verify the image hash

Compute SHA-256 of the original image. Compare with the hash in the anchor string.

3. Verify creator identity

The anchor string contains pseudonymized publisher fields. Compare the corresponding values from the Proof PDF to validate alignment.

4. Check the watermark

Run the open-source TrustMark decoder on the image. Verify the extracted hash matches.

Reference: The C2PA Specification's soft-binding guidance[2] and the TrustMark paper[3] both address the principle that embedded provenance and recovery-aware signals solve different parts of the provenance problem.

Chapter 09

Getting Started

Three ways to start marking your AI-generated images today.

Option A: Web Dashboard

Go to markmyai.com/dashboard, create a free account, and upload images directly. No code required. The Free plan includes 50 marks per month.

Option B: REST API

For automated workflows, use the API. One call marks an image with all four layers:

curl -X POST https://markmyai.com/api/mark \
  -H "Authorization: Bearer mk_live_..." \
  -H "Content-Type: application/json" \
  -d '{"image_url":"https://...","creator":"Your Name","ai_model":"dall-e-3"}'

Detect: Check Any Image with One Call

The detect endpoint runs C2PA, watermark, fingerprint, and database lookup simultaneously:

curl -X POST https://markmyai.com/api/v1/detect \
  -H "Authorization: Bearer mk_live_..." \
  -H "Content-Type: application/json" \
  -d '{"image_url":"https://example.com/suspicious-image.jpg"}'

The response returns is_marked (true/false), details for each layer (C2PA, watermark, fingerprint matches), and recovery_paths that describe which proof chains are still intact. This is the most comprehensive detection endpoint — ideal for automated compliance checks, content moderation pipelines, and editorial verification workflows.

Free Checker API (No Auth Required)

The POST /api/check-watermark endpoint powers the public checker at markmyai.com/check. It accepts a file upload and runs C2PA extraction (via c2pa-node), watermark decoding, and perceptual fingerprint matching — all without authentication:

curl -X POST https://markmyai.com/api/check-watermark \
  -F "image=@photo.jpg"

The response includes watermark results, C2PA fields (c2pa_claim_generator, c2pa_signer), and a fingerprint_match object with the best audit trail match (mark_id, similarity, creator, verify_url). Fingerprint matching is the key recovery path when images have been resized or re-encoded by a CMS.

Option C: WordPress Plugin BETA

The MarkMyAI WordPress plugin is available for selected early adopters. Once installed, every uploaded image can be marked automatically — no code, no manual steps. Visit markmyai.com/wordpress for details and the install guide.


Pricing

Plan Price Marks/Month Blockchain Proof PDF
Free€020
Starter€19/mo200
Business€49/mo2,000
EnterpriseCustomCustom
Pilot program: We offer custom pilot programs and evaluation periods for organizations looking to test MarkMyAI in production workflows. Contact us at hello@markmyai.com to discuss your use case and apply.

Start publishing AI images with verifiable provenance today

Create a free account at markmyai.com and mark your first image in under 60 seconds.

markmyai.com/dashboard →

Chapter 10

Selected References

The following standards, papers, and technical guidance documents informed the ideas summarized in this guide.

Note: This guide combines internal MarkMyAI test results with external standards and research literature. External references provide background for the broader provenance, watermarking, and transparency concepts discussed throughout.

Regulation and Standards

ReferenceWhy it matters
[1] Regulation (EU) 2024/1689
EU AI Act, Articles 50 and 99
Primary legal basis for transparency obligations around AI-generated and manipulated content, including disclosure duties for deployers (Art. 50(4)) and penalties (Art. 99(4)).
[2] C2PA Specification v2.1
Content Provenance and Authenticity — c2pa.org/specifications, September 2024
Core industry standard for Content Credentials, covering embedded manifests, hosted/remote manifests, soft-binding, and recovery paths for provenance that survives downstream processing.

Watermarking and Provenance Research

ReferenceWhy it matters
[3] Bui, Agarwal & Collomosse (2025)
TrustMark: Robust Watermarking and Watermark Removal for Arbitrary Resolution Images
ICCV 2025. (Preprint: arXiv:2311.18297, 2023.) University of Surrey & Adobe Research
Direct research basis for the invisible watermarking used in MarkMyAI. GAN-based method trained for robustness against JPEG, resize, crop, and format conversion. MIT-licensed open source.
[4] Zhu, Kaplan, Johnson & Fei-Fei (2018)
HiDDeN: Hiding Data With Deep Networks
ECCV 2018, pp. 682–697 — arXiv:1807.09937
Foundational work demonstrating that neural networks can encode and recover hidden payloads in images with robustness to common distortions including JPEG, blur, and cropping.
[5] Fernandez, Couairon, Jégou, Douze & Furon (2023)
The Stable Signature: Rooting Watermarks in Latent Diffusion Models
ICCV 2023 — arXiv:2303.15435 — Meta AI Research & INRIA
Important background for watermarking strategies in AI-generated image systems; shows robustness of invisible signatures even when images are cropped to 10% of original content.
How to read these references: The legal and standards documents explain why provenance matters and what obligations apply. The watermarking papers explain why pixel-level embedded signals are the right recovery mechanism when metadata alone does not survive real-world workflows.

Chapter 11

FAQ for Decision-Makers

The questions we hear most from compliance teams, publishers, and agency leads.

Which images are actually in scope for the EU AI Act?

Article 50 applies specifically to AI-generated and AI-manipulated content — not to all images. Here is a practical orientation:

Image type Example EU AI Act scope
AI-generated imageDALL·E, Midjourney, Firefly outputLikely in scope
AI-manipulated photoBackground replaced, face swapped, deepfakeLikely in scope
AI-assisted editingGenerative fill, AI upscale, content-aware cropDepends on context
Stock photo (unmodified)Getty, Shutterstock — no AI manipulationLikely out of scope
Original photographyCamera photo, journalist photoLikely out of scope
Manual illustrationDesigned in Illustrator or FigmaLikely out of scope

This table is a practical guidance aid, not legal advice. Final assessment depends on context, workflow, and jurisdictional interpretation.

Is MarkMyAI a deepfake detector?

No. MarkMyAI provides verifiable provenance records about who published an image, when, and with what AI tool. We don't analyze whether an image is "real" or "fake." We provide verifiable documentation of origin.

We already use C2PA. Isn't that enough?

C2PA is an excellent standard for embedding provenance at creation time. But as our internal tests show, it did not survive the real-world transformations we tested. If your images pass through a CMS, CDN, or social platform, C2PA alone may not be enough. MarkMyAI adds additional layers designed to support verification where embedded metadata is lost.

Is this mainly a WordPress issue?

No. WordPress is simply the most familiar example for many publishers. The same failure mode appears wherever the delivered image is transformed after marking: Shopify, headless CMS stacks, CDN image optimization, messenger apps, and social platforms can all strip or break embedded provenance signals during resize, re-encode, format conversion, or metadata removal.

What about GDPR? You store data on a blockchain.

Our blockchain design is structured to minimize direct exposure of sensitive data and support EU-oriented privacy requirements. Since v3, creator and model fields are stored as pseudonymized SHA-256 hashes on-chain. The plaintext is only available in the database and Proof PDF — both under standard GDPR controls. Exact on-chain data handling should always be reviewed against your legal and compliance requirements.

What if MarkMyAI shuts down?

5 of 8 proof elements survive permanently without our servers. The invisible watermark lives in the image pixels (open-source decoder), the C2PA signature is embedded in the file, and the blockchain transaction is immutable. The Proof PDF provides a complete offline backup. See Chapter 8 for details.

How long does marking take?

8–15 seconds per image via API, including all four protection layers. The WordPress plugin marks images asynchronously after upload — the upload itself completes instantly.

Can I mark existing images retroactively?

Yes. Upload existing images via the API or dashboard. The marking process is identical regardless of when the image was created.

Does the invisible watermark affect image quality?

In our internal tests, the watermark remained visually imperceptible across multiple image types, with PSNR values above 40 dB.

Can I use MarkMyAI for non-AI images?

While designed for AI-generated images under the EU AI Act, MarkMyAI's provenance system works for any image. Some customers use it for product photography and editorial content to strengthen provenance and publication traceability.


Questions? We'd love to hear from you.

hello@markmyai.com

markmyai.com

Provenance that survives
the real world.

Four layers. One API call.
A proof anyone can check.

markmyai.com

© 2026 MarkMyAI · Dominic Tschan · Waltenschwil, Switzerland