Truepic is continuously working to use the latest in computer vision, AI, and cryptography technologies to solve the complex task of photo and video verification.
People often rely on what they see to discern truth. But digital photos and videos can be manipulated in several ways, making it a challenge to trust their contents.
Using one of the countless accessible photo or video editing apps to add, remove, or modify objects in an image.
Changing the location information embedded in the photo or video, to make it appear as if it were captured somewhere else.
Changing or removing the time, date, camera model, and other information typically embedded into the photo or video by the capture device.
Taking a picture of an existing picture (possibly a manipulated one), with the intention of passing it off as an original.
Re-sharing a photo or video found on the Internet as if it were an original, with or without additional modification.
Using artificial intelligence to fabricate photos and videos. Includes deepfakes, which can show victims saying or doing things they never said or did.
Truepic's patented Controlled Capture technology establishes trust in digital photos and videos by verifying their origin, pixel contents, and metadata, from the instant the capture button is pressed. It leverages cutting-edge machine learning, computer vision, and cryptographic techniques to ensure the highest possible levels of trust, credibility, and immutability.
In addition to the data from the image sensor, Controlled Capture technology uses additional data and testing to establish trust in photos or videos. Only those images that pass the extensive verification process are designated as authentic originals, for the maximum possible level of trust.
Every photo and video taken with Controlled Capture technology passes through an unbroken chain of custody, from the instant the light reaches the image sensor to the time the image is shared with the recipient. Every link in the chain of custody is logged and can be verified at any point later.
The unique cryptographic signature of each photo and video taken using Controlled Capture technology is written to the blockchain. This creates an immutable record in a distributed public ledger, which is outside Truepic's control, for maximum resiliency.
At the instant that the capture button is pressed, the Controlled Capture pipeline receives data directly from the image sensor, along with data from other onboard sensors such as GPS. It computes a cryptographic signature—like a digital fingerprint— for the image, and encrypts all this information for transmission to Truepic's servers. A unique identifier is created for the image. This initiates the image's "chain of custody".
Once the image is captured, it undergoes a battery of over 20 verification tests, including: the integrity of the capture device; the date and time of capture; the location of capture; and that the image is not a recapture of an existing one. Only photos and videos that pass these verification tests are designated as authentic originals.
The original image, along with its metadata, cryptographic signature, and the results of the verification tests are stored in the Truepic vault in perpetuity. A verification page is created for the image, allowing recipients to view the original image and the results of the verification tests.
An immutable record, containing the image's cryptographic signature, is written to a public distributed ledger that is neither controlled by Truepic nor hosted on Truepic's servers. This closes the chain of custody.
Truepic’s patented Controlled Capture technology is at the heart of our products that offer the highest level of trust, for organizations ranging from insurance carriers to NGOs.
Truepic Vision is our trusted virtual inspection platform, built from the ground-up to drastically simplify and speed up the virtual inspection process for insurance carriers and lenders.Learn more about Truepic Vision