Verify Photo Authenticity
Lumethic verifies whether photos were taken by a real camera. The system compares RAW sensor data against published images to detect manipulation and synthetic generation.
Analysis Interface
Perform Audit
Files are processed ephemerally. Source data is analyzed in memory and discarded upon completion to preserve data sovereignty.
Validation Scope
Validation Capabilities
Multiple independent verification checks
Read the technical whitepaper| Capability | Analysis |
|---|---|
| Sensor Authenticity | Analyzes physics-based characteristics to confirm the photo was captured by a real camera sensor rather than generated or composited. |
| Visual Consistency | Compares the submitted photo against a reference generated from the RAW sensor data, detecting alterations, splicing, or content manipulation. |
| Recapture Detection | Detects whether the photo is an original capture or a photo of a screen, monitor, or printed image. |
| Metadata Validation | Examines embedded EXIF information for consistency and integrity, confirming the photo's origin and processing history. |
Problem Context
Visual Inspection Is Insufficient
Synthetic and manipulated media can appear visually coherent. Lumethic runs multiple independent checks and combines their results. A photo passes verification only when it satisfies all criteria, confirming it is an authentic, unmanipulated capture from a real camera sensor.
Operational Workflow
Operational Workflow
Secure Ingest
Encrypted upload of source RAW and asset JPEG via web interface or API. Files are not retained.
Forensic Scan
Multiple independent checks analyze sensor authenticity, visual consistency, recapture indicators, and metadata integrity.
Certification
Generation of a C2PA manifest and a signed forensic report documenting provenance and chain of custody.
Application Context
Intended Use
Rights Holders
Documentation of capture origin and publication continuity. Supports authorship attribution and archive integrity.
Compliance and Legal Review
Assessment of incoming media for structural validity. Supports audit, verification, and evidentiary workflows.
Data Sovereignty
Data Sovereignty
Source files are not stored. Data is not reused. Processing occurs solely for the purpose of validation. Lumethic functions as a verification utility rather than a content repository.