Verification Protocol

Technical specification of the forensic analysis pipeline. Each submission undergoes four independent checks. A photo passes verification only when all checks succeed.

Overview

Multi-Check Architecture

The verification system operates on a fail-safe principle. Rather than relying on a single detection method, multiple independent analyses must all return positive results. This reduces false positives and increases confidence in verification outcomes. Each check examines a different aspect of the image data, making it difficult to bypass the system through targeted manipulation.

Processing

Analysis Pipeline

Files are processed through a sequential pipeline. RAW data is never stored permanently. Processing occurs in isolated memory with strict access controls.

1

File Ingestion

RAW and JPEG files are uploaded via encrypted connection. File integrity is verified using SHA-512 hashing. Both hashes are recorded in the verification report for future reference.

2

RAW Decoding

The RAW file is decoded using manufacturer-specific demosaicing algorithms. A reference JPEG is generated from the sensor data using standard color science transformations.

3

Geometric Alignment

The submitted JPEG is aligned to the RAW-derived reference using feature matching. This accounts for cropping, rotation, and aspect ratio changes that may have occurred during editing.

4

Verification Checks

Four independent checks are executed in parallel: sensor authenticity, visual consistency, recapture detection, and metadata validation. Each check produces a binary pass/fail result with a confidence score.

5

Result Aggregation

Individual check results are combined. The overall verification passes only if all checks succeed. A detailed report is generated with per-check breakdown and confidence metrics.

6

C2PA Signing

For verified images, a C2PA manifest is generated and cryptographically signed. The manifest embeds provenance data directly in the image file, creating a tamper-evident record.

Verification Checks

Analysis Methods

Read the full technical whitepaper

Sensor Authenticity

Verifies that the photo originates from a genuine camera sensor. Every camera sensor produces unique physical signatures in the images it captures. These patterns are inherent to the photographic process and difficult to replicate artificially. The check examines noise characteristics, signal distribution, and sensor-specific artifacts.

Analyzes:Noise patterns, signal entropy, sensor fingerprints
Detects:AI-generated images, composites, synthetic media

Visual Consistency

Compares the submitted photo against a reference version generated from the camera's RAW sensor data. This verifies that the submitted image accurately represents what the camera captured. The comparison uses structural similarity metrics and perceptual hashing to detect deviations.

Analyzes:SSIM scores, perceptual hashes, histogram correlation
Detects:Content splicing, localized edits, face swaps

Recapture Detection

Detects whether a photo is an original capture or a photo of a photo. Images photographed from screens, monitors, or prints exhibit telltale artifacts from the display or print medium. The check analyzes frequency domain patterns and moiré artifacts.

Analyzes:Frequency spectra, moiré patterns, pixel grid artifacts
Detects:Screen photographs, monitor captures, print recaptures

Metadata Validation

Examines embedded information within the photo file for consistency and integrity. Camera-generated metadata follows specific patterns and conventions that help confirm a photo's origin. The check compares EXIF fields between RAW and JPEG to detect tampering.

Analyzes:EXIF structure, timestamp consistency, device identifiers
Detects:Metadata stripping, timestamp manipulation, device spoofing

Sample Reports

Example Verifications

Review completed verification reports to understand the output format and level of detail provided. Each report includes the full check breakdown, confidence scores, and visual comparison tools.

Compatibility

Supported RAW Formats

The system supports RAW formats from major camera manufacturers. Only files containing mosaic Bayer pattern sensor data are supported. Demosaiced TIFF exports, Foveon sensors, and other non-Bayer architectures are not compatible.

FormatManufacturer
DNGAdobe (Universal)
CR2Canon
CR3Canon (newer models)
NEFNikon
ARWSony
RAFFujifilm
ORFOlympus / OM System
RW2Panasonic
PEFPentax

Input Requirements

Submission Format

Verification requires both the camera RAW file and the published JPEG. The RAW file provides the ground truth reference. The JPEG is the asset under examination.

RAW File

Reference

Original sensor data from the camera. Must be the unmodified file as written by the camera.

Embedded previews are ignored. Only sensor data is used for comparison.

JPEG File

Target

The published or distributed version of the photo. This is the asset being verified against the RAW source.

Standard JPEG compression is expected. Progressive encoding is supported.

Output

Verification Results

Each verification produces a detailed report with per-check results, confidence scores, and visual comparison tools. Verified images receive a C2PA manifest for downstream verification.

Verification Report

A structured record of the verification including file hashes, individual check results, and overall status. Reports can be shared via unique URL or downloaded as PDF.

Verification IDUUID
TimestampISO 8601
File HashesSHA-512
Check ResultsPass/Fail

C2PA Manifest

Coalition for Content Provenance and Authenticity manifest embedded in the verified image. Contains cryptographic signatures binding the verification to the image data.

Conforms to C2PA specification version 1.3. Signed using ECDSA P-384.

Manifests can be verified at verify.contentauthenticity.org or using CAI browser extensions.

Editing Tolerances

Acceptable Transformations

The system accounts for standard photographic post-processing. Certain transformations are expected and will not cause verification to fail. Destructive edits that alter image content will be detected.

Permitted Operations

  • Exposure, contrast, and white balance adjustments
  • Cropping and aspect ratio changes
  • Standard sharpening and noise reduction
  • Color grading and tone curve adjustments

Operations That Will Fail Verification

  • Content-aware fill, object removal, or cloning
  • Compositing elements from multiple sources
  • AI-based upscaling or generation

Run Verification

Submit a RAW and JPEG pair for forensic analysis. Results are available immediately.