Resemble Watermarker

Invisible watermarks. Permanent proof.

Embed verifiable provenance into every AI-generated audio, image, or video file. It survives anything short of destroying the file.

Trusted by
Model

Powered by PerTh

Our own watermarker model, PerTh is embedded at the limit of human perception. It pushes the watermark to a perceptual threshold where removal would cause so much damage, it would render the file useless. MIT licensed VideoSeal is used to watermark images and video.
~100%
Detection on clean and compressed audio
PerTh V2 · No-attach + standard codes
RESEMBLE AI WATERMARK ROBUSTNESS

Can they be removed? Only by destroying the file.

MP3 compression + re-encoding
WATERMARK HOLDS
WATERMARK HOLDS
Screenshot re-capture & image editing
WATERMARK HOLDS
WATERMARK HOLDS
Pitch shifting + time-stretching
WATERMARK HOLDS
WATERMARK HOLDS
Used to train another AI model
WATERMARK HOLDS
WATERMARK HOLDS
Replay attack (speaker re-record)
WATERMARK HOLDS
WATERMARK HOLDS
Noise injection to destruction
FILE DESTROYED FIRST
FILE DESTROYED FIRST
OUR CAPABILITIES

Provenance that doesn't need babysitting

Embed, survive, and verify without manual intervention at any step.
Audio automatically embedded at creation
If you’re creating audio with Resemble AI, your asset is encoded with an inaudible watermark. One step and done.
Watermark travels with the file
The watermark survives any attacks short of file destruction. It persists even when audio is used to train another AI model.
Verified in seconds
The Inspector checks the neural watermark and C2PA manifest simultaneously. Provenance report ready, no engineering required.
~100%
Detection accuracy on clean and compressed audio
160+
Generative AI models tested against in real-time
$2.6B
Reported global losses tied to deepfake attacks
AI CONTENT RISK BY INDUSTRY

Built for regulated industries

Where unverified AI content carries legal, clinical, or financial consequences.

Banking & finance
Industry risk:
Voice-clone fraud bypassing biometric systems.
Resemble AI solution:
Prove a disputed transaction used an authentic voice, not a synthetic clone.
Law enforcement
Industry risk:
Evidence excluded without documented provenance.
Resemble AI solution:
Establish chain of custody for audio, image, and video evidence.
Telecommunications
Industry risk:
FCC non-compliance on AI-generated voice calls.
Resemble AI solution:
Prove which calls originated from your systems at scale.
Media & entertainment
Industry risk:
Unauthorised use of synthetic talent voices.
Resemble AI solution:
Make every generated file self-evidencing for talent rights and IP.
Healthcare & HealthTech
Industry risk:
Unverified synthetic instructions in clinical pathways.
Resemble AI solution:
Verify clinical voice instructions are authentic before they reach care teams.
Generative AI platforms
Industry risk:
EU AI Act compliance, mandatory from August 2026.
Resemble AI solution:
Watermark content by default at point of generation. EU AI Act ready.
SOC2 Type II
Enterprise plans
EU AI Act ready
Mandatory Aug 2026
GDPR Compatible
On-prem available
HIPAA Compatible
Air-gapped deployment
SSO / SAML
Enterprise identity
C2PA Standard
Content provenance
AI SECURITY

Trusted where it matters most

When the stakes are real, rely on Resemble AI
U.S. Senate Judiciary
Resemble AI's CEO testifies on election deepfakes, presenting detection infrastructure as a national security requirement.
Carahsoft Public Sector
Available to US Federal, State and Local Government across hundreds of contract vehicles.
Canada AI Code of Conduct
Signed alongside IBM and Scale AI, as a pillar of responsible AI deployment.
AI narration for The Andy Warhol Diaries
Generated from three minutes of source audio, PerTh watermarked every file for talent IP protection and authenticity disclosure.
INTEGRATIONS AND DEPLOYMENTS

Go live in hours, not sprints.

Rest API
Python SDK
Node.js SDK
JavaScript SDK
MCP for Cursor & Claude Code
On-prem available
Frequently asked questions
Does watermarking affect audio or image quality?
No. PerTh embeds into inaudible frequencies for audio. VideoSeal embeds into imperceptible pixel variations for images and video. Quality metrics (SNR, PSNR) remain at production grade across all three media types. End users notice nothing.
What is C2PA and how does it work with PerTh watermarking?
C2PA is an open standard for embedding a content provenance manifest into a file's metadata. It tells platforms and regulators who created the content and how it was produced. PerTh works alongside C2PA: C2PA handles the metadata layer, PerTh embeds directly into the file itself. If the metadata is stripped, the watermark remains. Both layers together provide the most complete provenance record available.
Can we detect if our data was used to train another model?
Yes. PerTh's watermark persists through AI model training pipelines. If your watermarked content was used without authorization in a third-party training run, the signal survives and can be verified. This provides a direct line of defense against unauthorized IP use.
Does my data leave our infrastructure during API processing?
On-premise and air-gapped deployment options mean media files never leave your own infrastructure. For teams using the cloud API, Zero Retention Mode permanently deletes submitted media after processing completes, with no retention or re-analysis. Contact us for specifics on processing location and compliance coverage for GDPR and HIPAA.
Is Resemble Watermarker compliant with the EU AI Act?
Yes. Resemble Watermarker aligns with EU AI Act Article 50, which requires watermarking on all AI-generated content and takes effect August 1, 2026. PerTh covers audio. Videoseal (MIT license) covers images and video. Both provide the persistent, machine-readable provenance signal the regulation requires. Non-compliance carries fines of up to €35 million.
How quickly can we integrate?
Most teams are live within a few hours via REST API. Python, Node.js, and JavaScript SDKs are available. MCP server support for Cursor and Claude Code is included. Synchronous mode returns results in a single request without polling.
Get complete generative AI security
Join thousands of developers and enterprises securing with Resemble AI