University of Amsterdam Secures €3.2 Million NWO Grant for AuthentiMark Digital Watermarking Project to Counter Online Impersonation

University of Amsterdam Secures €3.2 Million NWO Grant for AuthentiMark Digital Watermarking Project to Counter Online Impersonation

What the AuthentiMark Project Aims to Achieve

The University of Amsterdam’s new initiative, AuthentiMark, is a response to the growing threat of online impersonation. By embedding invisible digital watermarks into content, the project seeks to provide a verifiable trail that distinguishes genuine material from forged or manipulated versions. The goal is to make it easier for organizations and individuals to confirm authenticity, thereby reducing fraud, phishing, and misinformation.

Combating Online Impersonation with Digital Watermarking

Digital watermarking works by inserting a unique code into a file’s data structure. When the file is accessed or shared, the watermark can be extracted and verified against a central registry. This process is transparent to end‑users but offers a robust audit trail for security teams. The AuthentiMark consortium is developing a scalable, AI‑driven watermarking engine that can handle a wide range of media types—text, images, video, and even PDFs.

Actionable takeaway: If your organization deals with sensitive documents or media, start by mapping out the most common channels where content is shared. Identify the file formats that need protection and assess whether a watermarking solution could be integrated into your existing content management system.

Key Stakeholders and Interdisciplinary Collaboration

AuthentiMark brings together experts from the Amsterdam School of Communication Research, Radboud University Nijmegen, and Amsterdam UMC. The consortium also partners with industry leaders such as Verify, Microsoft Nederland, and the Dutch Banking Association. This blend of academia, technology, and policy ensures that the solution is not only technically sound but also aligned with regulatory requirements.

Academic Leaders and Industry Partners

  • Prof. Dr. Jessica Piotrowski – Lead researcher on persuasive communication and digital trust.
  • Prof. Dr. Guda van Noort – Specialist in social media and media manipulation.
  • Prof. Dr. Christian Burgers – Expert in communication, organizations, and society.
  • Industry partners such as Verify and Microsoft provide the computational backbone and real‑world testing environments.

By collaborating across disciplines, AuthentiMark can address both the technical challenges of watermarking and the human factors that influence adoption.

Practical Implications for Businesses and Public Sector

For banks, healthcare providers, and municipal governments, the stakes of online impersonation are high. A single forged email or manipulated video can erode public trust and lead to financial loss.

Implementing Watermarking in Existing Workflows

  1. Audit your content pipeline: Identify where documents are created, edited, and distributed.
  2. Choose a watermarking tool: Evaluate solutions that support the file types you use most frequently.
  3. Integrate with your identity management system: Link watermark verification to your existing authentication processes.
  4. Train staff: Provide quick reference guides on how to verify watermarks and what to do if a watermark is missing.
  5. Monitor and update: Set up automated alerts for watermark tampering and schedule periodic reviews of the watermarking algorithm.

These steps help ensure that the technology is not just added on but becomes part of the organization’s security culture.

Future Outlook and How to Get Involved

AuthentiMark is still in the research phase, but the consortium is actively seeking partners for pilot projects and real‑world testing. Organizations that want to be at the forefront of digital trust can collaborate on field trials, provide data for algorithm refinement, or contribute to policy recommendations.

Opportunities for Collaboration and Funding

  • Participate in pilot studies that test watermarking in high‑risk sectors such as finance and healthcare.
  • Apply for joint funding opportunities through the KIC Mission Digital Identities programme.
  • Engage with the consortium’s advisory board to shape the direction of the technology.

By joining forces, stakeholders can accelerate the deployment of a system that protects both institutions and the public.

Take Action Now

Ready to strengthen your organization’s resilience against online impersonation? Here are the next steps you can take:

Related Posts

Get in Touch with Our Experts!

Footer and Blog Sticky Form

Share:

Facebook
Twitter
Pinterest
LinkedIn
  • Comments are closed.