This disclosure describes techniques to authenticate that a media content item such as a photograph, a video, etc. is attributed to and originated by a particular user, based on the device on which the content was created. The content item is created on a device and associated with a digital signature using an attestation mechanism of the device such as trusted hardware or a sensor pattern that is unique to the device. The digital signature and content item are provided to a register or service for access by other users. When an accessing user views the content item, the content item is verified, via the digital signature, as having originated from the originating user’s device. The accessing user’s device displays the status of user attrib...
This disclosure describes techniques that enable a user to identify a video or a movie by capturing ...
Users have extensive collections of digital photographs or videos on their devices. This disclosure...
The rapid increase of the Internet connectivity and the data publishing activity, like user-generate...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
Computing devices often include media capture devices, such as cameras, video recorders, and/or micr...
Content such as images is sometimes used online without proper permission or attribution by parties ...
This disclosure describes techniques for validating media item accuracy before a media item is provi...
Distribution of copyrighted multimedia objects by way of uploading these to online hosting sites can...
This disclosure describes techniques to prevent unauthorized access to information via a facial reco...
Today, media content is both a way of making money and a part of the art. To protect copyright from...
This disclosure describes techniques for user authentication and authorization for devices with supp...
Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, t...
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and auth...
When users access embedded content from within third-party services or applications, there is a need...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
This disclosure describes techniques that enable a user to identify a video or a movie by capturing ...
Users have extensive collections of digital photographs or videos on their devices. This disclosure...
The rapid increase of the Internet connectivity and the data publishing activity, like user-generate...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
Computing devices often include media capture devices, such as cameras, video recorders, and/or micr...
Content such as images is sometimes used online without proper permission or attribution by parties ...
This disclosure describes techniques for validating media item accuracy before a media item is provi...
Distribution of copyrighted multimedia objects by way of uploading these to online hosting sites can...
This disclosure describes techniques to prevent unauthorized access to information via a facial reco...
Today, media content is both a way of making money and a part of the art. To protect copyright from...
This disclosure describes techniques for user authentication and authorization for devices with supp...
Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, t...
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and auth...
When users access embedded content from within third-party services or applications, there is a need...
Large numbers of images are uploaded and shared over the internet, e.g., via email, social networks,...
This disclosure describes techniques that enable a user to identify a video or a movie by capturing ...
Users have extensive collections of digital photographs or videos on their devices. This disclosure...
The rapid increase of the Internet connectivity and the data publishing activity, like user-generate...