Content such as images is sometimes used online without proper permission or attribution by parties other than content creators and owners. Prior to use, such parties may also alter the content as well as associated metadata. Such practices subvert rights of the content creators and owners and can mislead readers due to a lack of cues that can help determine the provenance, veracity, and credibility of the content. This disclosure describes a mechanism to track, verify, and attribute provenance to content such as images. Per techniques of this disclosure, provenance information signed with a user’s private key is included in the EXIF block of an image. With the user’s permission, the image is uploaded to a globally trusted party that uses b...
Provenance, i.e., the origin or source of something, is becoming an important concern, since it offe...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...
Blockchain transactions are recorded in a shared and append-only repository that multiple parties ve...
While art forgery has been a persistent issue since the Renaissance, a new technology now seems to h...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
This disclosure describes techniques to authenticate that a media content item such as a photograph,...
The threat posed by misinformation and disinformation is one of the defining challenges of the 21st ...
Technologies such as generative adversarial networks (GANs) and other machine learning techniques ha...
In a global marketplace, customers are often unaware of the exact sources of the products they purch...
The traditional Proof of Existence blockchain service on the Bitcoin network can be used to verify t...
Trusted distribution and consumption of media content has become a challenging issue, especially wit...
One of the research fields at the Institute for Simulation and Software Technology at the German Aer...
Given the significant increase of on-line services that require personal information from users, the...
Techniques described herein provide innovation directed to authenticating a device. An intrinsic att...
In addition to the general intentional scattering of fake news and its conscious or unconscious shar...
Provenance, i.e., the origin or source of something, is becoming an important concern, since it offe...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...
Blockchain transactions are recorded in a shared and append-only repository that multiple parties ve...
While art forgery has been a persistent issue since the Renaissance, a new technology now seems to h...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
This disclosure describes techniques to authenticate that a media content item such as a photograph,...
The threat posed by misinformation and disinformation is one of the defining challenges of the 21st ...
Technologies such as generative adversarial networks (GANs) and other machine learning techniques ha...
In a global marketplace, customers are often unaware of the exact sources of the products they purch...
The traditional Proof of Existence blockchain service on the Bitcoin network can be used to verify t...
Trusted distribution and consumption of media content has become a challenging issue, especially wit...
One of the research fields at the Institute for Simulation and Software Technology at the German Aer...
Given the significant increase of on-line services that require personal information from users, the...
Techniques described herein provide innovation directed to authenticating a device. An intrinsic att...
In addition to the general intentional scattering of fake news and its conscious or unconscious shar...
Provenance, i.e., the origin or source of something, is becoming an important concern, since it offe...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...
Blockchain transactions are recorded in a shared and append-only repository that multiple parties ve...