Truepic
Truepic
+

AWARD-WINNING TECHNOLOGY Pioneering provenance-based media authentication

Truepic's industry-leading Controlled Capture provenance technology ensures the integrity of photos and videos from the point of capture, creating a new breed of media files whose authenticity can be cryptographically proven to viewers.

OUR Technology Partners
The Problem

When seeing may no longer be believing

People often rely on what they see to make important business and personal decisions. But digital photos and videos can be easily manipulated—or even synthesized by AI—making it a challenge to trust their contents. This can impede everything from transacting online to deciding whom to vote for.

THE SOLUTION

Don’t detect what’s fake. Prove what’s real.

Truepic securely establishes the provenance of visual media through its patented Controlled Capture technology.

Controlled Capture ensures the integrity of digital photos and videos from the instant they’re captured. It secures the capture process such that pixel contents and metadata, including date, time, and location, faithfully represent the what, when, and where of the visual reality before the camera.

It then leverages strong cryptography to seal and protect the integrity of this captured information, such that a recipient can authenticate a Truepic photo or video reliably, with full provenance information intact.

Controlled Capture

THE ORIGINAL MEDIA PROVENANCE TECHNOLOGY

The first generation of Truepic's Controlled Capture technology is used daily by enterprises, NGOs, and other organizations all over the world through our flagship Truepic Vision virtual inspection platform. This establishes a chain of custody for photos and videos from the instant they are captured on the mobile device to their immutable storage on Truepic servers, and notarizes them on the Bitcoin and Ethereum blockchains. It executes over 20 verification tests, including picture-of-picture detection and reverse image lookup.

Learn more about Truepic Vision

Truepic Vision app secures the capture of photo and video files along with sensor readings, then creates a SHA256 hash of this data and uploads it to Truepic’s servers.

Truepic’s servers verify the integrity of the received data, and perform additional verification tests including picture-of-picture detection and reverse image lookup.

The original image file along with its hash and verification results are stored in Truepic’s vault, and a comprehensive test report page is created for each image.

The SHA256 hash of the image file is written to the Bitcoin and Ethereum blockchains, creating an immutable record of the original image file that can be used to authenticate it.

Next Generation

ADVANCED SCALABILITY, PRIVACY, AND SECURITY

Truepic’s next-generation Controlled Capture 2.0 technology forgoes blockchain as the anchor of immutability, in favor of more widely-deployed and scalable Public Key Infrastructure (PKI) technologies. It leverages on-device processing to securely capture high-integrity photos and videos without requiring uploads to Truepic’s servers, creating photo and video files that are self-authenticating and compliant to emerging open standards for authenticatable media. This ensures maximum user privacy and prepares the technology to scale widely without centralized bottlenecks.

Sign up for CC 2.0 updates

Controlled Capture subsystem embedded in camera app generates a private/public keypair that will be used to sign images. The private key never leaves the device. The public key is sent to Truepic’s Certificate Authority for signing.

Truepic’s Certificate Authority verifies integrity of mobile device, then issues a cryptographic certificate for the public key and sends it to the device.

Controlled Capture subsystem securely acquires and verifies integrity of image sensor and other sensor data including location and depth map. It then writes the media to the file, along with full provenance metadata.

Controlled Capture subsystem uses private key to generate a digital signature, including trusted timestamp, then embeds it in the file. This creates a verifiable cryptographic seal for the contents and provenance metadata of the photo or video.

OUR ECOSYSTEM

Scaling Provenance Technology

Undoing the corrosive effects of distrust in visual media will require making provenance technology accessible to everyone—from everyday people to large enterprises and governments. And this means that all media capture devices should have the capability to capture authenticatable media files, and the systems and software tools that people and organizations use to view photos and videos should be able to decode and authenticate them.

This is why Truepic is working with the larger technology ecosystem to prepare the technology to scale, by addressing the challenges of security, distribution, and adoption.

Truepic® Foresight™

SCALING PROVENANCE TECHNOLOGY: SECURITY

Truepic Foresight is the revolutionary hardware-secured implementation of Truepic’s Controlled Capture 2.0 technology. Foresight leverages the same hardware security features of smartphone chipsets that protect biometrics, digital payments, and premium video content to protect the capture of visual media. By acquiring sensor data using secure channels, and processing it in secure memory spaces and processors that are isolated from the operating system and other software running on the smartphone, Truepic Foresight achieves unprecedented levels of hardware-based security and risilience, creating media provenance data of the highest possible integrity.

Read our announcement

Groundbreaking Collaboration with Qualcomm Technologies

SCALING PROVENANCE TECHNOLOGY: DISTRIBUTION

An estimated 85% of all photos uploaded to the internet are captured on smartphones. That’s why Truepic is collaborating with Qualcomm Technologies, the mobile technology leader, to make Truepic Foresight a native capability of smartphones powered by mobile chipsets from Qualcomm Technologies, starting with the Qualcomm® Snapdragon™ 888 5G Mobile Platform.

The collaboration will put secure media provenance technology as a native capability in the hands of millions of people very rapidly, empowering them to capture and disseminate authentic visual media using the camera they use everyday: the smartphone.

Watch the keynote Snapdragon 888 Brief Snapdragon 888 Website

The Content Authenticity Initiative

SCALING PROVENANCE TECHNOLOGY: ADOPTION

Photos and videos are meant to be shared, and creativity with visual media should not be hindered. That’s why it’s important to create an open, scalable, widely adopted framework for media authentication that can provide viewers with full transparency about the provenance of the media they’re viewing, and any edits done to it.

The Content Authenticity Initiative, founded by Adobe, Twitter, and the New York Times, aims to create the first open standard for digital content attribution. All cameras, creative tools, apps, and online platforms that adopt the CAI specification can maintain and display a transparent, cryptographically-assured chain of custody of any CAI-compliant piece of content from its provenance.

Truepic is a collaborator and active contributor to the CAI, and has helped write the technical specification for the emerging standard. Photos and videos created using Truepic’s Controlled Capture 2.0 technology are CAI compliant.

Read the CAI Whitepaper

Secure Mode Enabled

OUR collaboratION WITH ADOBE

In Fall 2020, Truepic and Adobe collaborated with award-winning photojournalist Sara Naomi Lewkowicz to preview the first-ever end-to-end system for image provenance through the Content Authenticity Initiative.

The photojournalist used a prototype Qualcomm Technologies mobile device with Truepic Foresight technology to capture CAI-compliant photos in New York City, which she then edited in a CAI-enabled version of Adobe Photoshop.

Interact with the First CAI-Compliant Images

Let's stay in touch

Get the latest insights and news from the Truepic team. Simply submit your email address below and we’ll do the rest.
Let's stay in touch