Verify Photo Authenticity

Lumethic verifies whether photos were taken by a real camera. The system compares RAW sensor data against published images to detect manipulation and synthetic generation.

Analysis Interface

Perform Audit

Files are processed ephemerally. Source data is analyzed in memory and discarded upon completion to preserve data sovereignty.

Validation Scope

Validation Capabilities

Multiple independent verification checks

Read the technical whitepaper
CapabilityAnalysis
Sensor AuthenticityAnalyzes physics-based characteristics to confirm the photo was captured by a real camera sensor rather than generated or composited.
Visual ConsistencyCompares the submitted photo against a reference generated from the RAW sensor data, detecting alterations, splicing, or content manipulation.
Recapture DetectionDetects whether the photo is an original capture or a photo of a screen, monitor, or printed image.
Metadata ValidationExamines embedded EXIF information for consistency and integrity, confirming the photo's origin and processing history.

Problem Context

Visual Inspection Is Insufficient

Synthetic and manipulated media can appear visually coherent. Lumethic runs multiple independent checks and combines their results. A photo passes verification only when it satisfies all criteria, confirming it is an authentic, unmanipulated capture from a real camera sensor.

Operational Workflow

Operational Workflow

01

Secure Ingest

Encrypted upload of source RAW and asset JPEG via web interface or API. Files are not retained.

02

Forensic Scan

Multiple independent checks analyze sensor authenticity, visual consistency, recapture indicators, and metadata integrity.

03

Certification

Generation of a C2PA manifest and a signed forensic report documenting provenance and chain of custody.

Application Context

Intended Use

Rights Holders

Documentation of capture origin and publication continuity. Supports authorship attribution and archive integrity.

Compliance and Legal Review

Assessment of incoming media for structural validity. Supports audit, verification, and evidentiary workflows.

Data Sovereignty

Data Sovereignty

Source files are not stored. Data is not reused. Processing occurs solely for the purpose of validation. Lumethic functions as a verification utility rather than a content repository.

RAW files: processed in isolated memory, zero retention
JPEG artifacts: stored in EU-region infrastructure
GDPR Article 17: deletion cascades on request
DPA available for enterprise integration

Technical Reference