Skip to main content

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

Exploring the C2PA Standard with Dom Guinard from Digimarc

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
12 FEB • 2024 1 hour 1 min
Share:

In this episode, I’m joined by Dom Guinard from Digimarc to explore the fascinating world of digital content standards. Dom’s extensive experience in IoT and digital standards offers unique insights into how we can protect and authenticate content in an increasingly AI-driven world.

We start with a deep dive into the C2PA (Coalition for Content Provenance and Authenticity) standard. What particularly caught my attention was how this technology combines metadata, watermarking, and hardware integration to establish content trustworthiness. Dom’s explanation of how these elements work together reveals the complexity of ensuring digital authenticity.

The conversation gets especially interesting when we explore the practical implications of C2PA. Dom breaks down how this standard helps combat deepfakes and unauthorized content use, while also empowering creators with more control over their work. His insights into the recent US executive order on AI and its connection to digital content standards highlight the growing importance of these initiatives.

I was particularly intrigued by our discussion of how C2PA integrates with existing technological ecosystems. Dom’s perspective on balancing innovation with content protection shows the careful consideration that goes into developing these standards. We also explore the practical tools available, including Digimarc’s C2PA Chrome Extension.

If you’re interested in digital content, creator rights, or the future of online authenticity, you’ll find plenty of practical insights here. For those wanting to dive deeper, here are some valuable resources:

Transcript

Show/Hide Transcript
[00:00] Viktor Petersson
Hello everybody, and welcome to this episode of Nerding out to Victor.
[00:03] Viktor Petersson
Today I got a very good friend of mine on the show that we got no doubt about something he has been working on for the last six months or so or 12 months probably by now.
[00:12] Viktor Petersson
And just to give some backstory, Dom is an author and wrote the book Web of Things and invented a concept of Web of Things.
[00:20] Viktor Petersson
He's the co founder of Everything that was later acquired by digimark.
[00:25] Viktor Petersson
And Dom, do you want to say a few words that are probably missed in your introduction about your backstory?
[00:32] Dom Guinard
No, I think that's it.
[00:33] Dom Guinard
Very happy to be on the show, of course.
[00:37] Dom Guinard
And yeah, today indeed, Everything was acquired by digimark.
[00:41] Dom Guinard
And I'm the VP of innovation at digimark where I work on all kind of innovation projects, including our involvement with standards.
[00:50] Dom Guinard
I've been working on standards almost my entire career.
[00:54] Dom Guinard
I don't really like standards, to be honest, but I like the power of standards.
[01:00] Dom Guinard
So that's why I keep working on those, actually.
[01:04] Viktor Petersson
Very cool.
[01:05] Viktor Petersson
So today's episode we're going to talk about something called C2PA, which is a part of what, which is similar to verify credentials.
[01:13] Viktor Petersson
And we got dive into what these two things are in detail throughout the course of this episode.
[01:19] Viktor Petersson
But maybe we should start Dom, and doing a quick introduction.
[01:23] Viktor Petersson
What even is this and why does it even matter?
[01:27] Dom Guinard
Yeah, sure.
[01:28] Dom Guinard
And I was thinking I could share a few slides maybe.
[01:32] Viktor Petersson
Let's do it.
[01:35] Dom Guinard
That's not what I want.
[01:37] Dom Guinard
PowerPoint.
[01:38] Dom Guinard
Yeah, let's just go that way.
[01:40] Dom Guinard
Right.
[01:41] Dom Guinard
So, you know, I think I'm not going to break the news by saying that generative AI has been changing pretty much everything lately.
[01:54] Dom Guinard
And in particular, it has made understanding what is real and what isn't, what is generated and what isn't really hard.
[02:04] Dom Guinard
I mean, there are lots of examples of that.
[02:08] Dom Guinard
And the one on.
[02:10] Dom Guinard
Yeah, exactly.
[02:11] Dom Guinard
The one on the bottom right is probably one of the most famous examples.
[02:15] Dom Guinard
But there were other examples that were even a bit more impactful, like the bombing of the Pentagon, which led to a dip in the stock market and was actually a deep fake.
[02:30] Dom Guinard
So that's one side of the medal.
[02:34] Dom Guinard
The other side of the medal is in the upper part.
[02:37] Dom Guinard
There is that content creators have their content being used by these generative AI tools for no compensation.
[02:46] Dom Guinard
So these genai tools are basically taking any content and then using it to generate other images.
[02:54] Dom Guinard
So we have this kind of dual side of the issue.
[03:01] Dom Guinard
And C2PA is basically answer to at least a partial answer to these questions and to these things that Genai is raising.
[03:12] Dom Guinard
So it's basically about looking at protecting the intellectual property of creators, and we'll probably deep dive into that, but it's not protecting it necessarily in a DRM way, but basically informing any user or any tool of who owns the copyright.
[03:33] Dom Guinard
And the second part is about reestablishing trust in digital content.
[03:39] Dom Guinard
I think that's really the core of where the standard is going.
[03:42] Dom Guinard
And the core value of the standard is to allow users to get provenance information about the assets they're looking at, to know where it came from, how was it modified, who created it, whether or not it was generated by AI.
[03:58] Dom Guinard
And so C2PA created a set of standards.
[04:02] Dom Guinard
They are now known more as content credentials.
[04:05] Dom Guinard
That's the marketing term for C2PA standards, content credentials.
[04:11] Dom Guinard
And essentially it's metadata that's attached to assets.
[04:15] Dom Guinard
So you have the asset and then you have the metadata attached to it.
[04:20] Dom Guinard
For instance, in the case of JPEG images, it's via the EXIF headers.
[04:25] Dom Guinard
But other formats are supported, images are supported, video are supported, and now text, as well as documents.
[04:33] Dom Guinard
And I think one thing to call out is that the recent US Executive Order on Artificial Intelligence is starting to mandate the creation of such tools, the creation of standards around the authenticity of digital content and also the labeling of synthetic content.
[04:52] Dom Guinard
And they mentioned C2PA, but they also mentioned tools like digital watermarking, where obviously digimark has a lot of expertise.
[05:00] Dom Guinard
So that's the crux of C2.
[05:04] Dom Guinard
Paul.
[05:05] Viktor Petersson
Right, so let's zoom in on this.
[05:07] Viktor Petersson
Like, who really cares about this?
[05:08] Viktor Petersson
Right, because that's the big question.
[05:11] Viktor Petersson
This is cool, but who's this for?
[05:13] Viktor Petersson
And who do you think really cares about this?
[05:19] Dom Guinard
Yeah, it's a good point.
[05:22] Dom Guinard
I think ultimately everyone should care about it.
[05:25] Dom Guinard
Whether we all care about it today is a big question.
[05:28] Dom Guinard
And I think the tools are still maturing.
[05:31] Dom Guinard
It's not like C2P is widely deployed yet.
[05:34] Dom Guinard
It's proliferating very quickly.
[05:36] Dom Guinard
But it's not like every single Image has a C2Pmanifest that you can check.
[05:40] Dom Guinard
And I don't know if it will ever be the case.
[05:43] Dom Guinard
I think it's more for images that have high value.
[05:49] Dom Guinard
I can really imagine.
[05:50] Dom Guinard
And there's a lot of traction in the, in the news industry around that because obviously that is things, you know, the news we see are things we.
[06:01] Dom Guinard
Information we really want to be able to trust.
[06:04] Dom Guinard
So that's a really a core value of C2PA.
[06:10] Dom Guinard
I think yeah, I think ultimately everyone will be a user, whether we'll be active users or simply we'll have that little PIN icon appearing and we'll look at it like half look at it and we'll look at it when something seems fishy or whether you are a content creator.
[06:27] Dom Guinard
And I think content creators are all the core users of C2PA because they want to be able to stamp their content, apply their credentials and their copyright to it, and also they want to make sure it's not manipulated without their consent, actually.
[06:45] Viktor Petersson
Right.
[06:46] Viktor Petersson
But it's really like a catch 22 or a network problem, really at its core it's not valuable until it's very largely deployed because unless you have this as part of essentially every image, it's hard to maintain much trust, I guess, in a sense.
[07:08] Viktor Petersson
Right.
[07:08] Viktor Petersson
So it's a bit of a difficult one because if you have a photo without that, you can't.
[07:15] Viktor Petersson
I guess it's a positive indicator if you do have it, but it doesn't mean that it isn't valid just because it doesn't have that.
[07:21] Viktor Petersson
If that makes sense.
[07:24] Dom Guinard
Yeah, yeah.
[07:25] Dom Guinard
I mean, apologies.
[07:30] Dom Guinard
Yes, you're right.
[07:31] Dom Guinard
I mean, and I think it's really a question of network effect and we need to have enough images that have these credentials because an image that doesn't have a credential, that doesn't have content credentials, then how do you judge it?
[07:47] Viktor Petersson
Right.
[07:48] Dom Guinard
So, yeah, I think the critical mass is important.
[07:51] Dom Guinard
What I'll just say is that there are really strong forces behind C2PA has been driven by Adobe, Microsoft, BBC, intel and others.
[08:02] Dom Guinard
So there's really a big uptake, it's going to take time and ultimately I think it will start in places where we really need to have trusted content.
[08:14] Dom Guinard
I can think of the US elections, for instance, a good example.
[08:18] Dom Guinard
So it, you know, but it has to start somewhere and I think it's proliferating quickly.
[08:25] Viktor Petersson
But you're right for journalism, I completely understand it, like to be able to trust like a BBC, whatever reputable news outlet, they need to be verified this and so that.
[08:35] Viktor Petersson
It makes a lot of sense.
[08:36] Viktor Petersson
Right.
[08:36] Viktor Petersson
I'm thinking more like a general use case on the Internet at large.
[08:40] Viktor Petersson
And it's a bit of a mis in match incentives in some ways.
[08:46] Viktor Petersson
Right.
[08:47] Viktor Petersson
Because the average user probably do not care too much about it in general.
[08:52] Viktor Petersson
Right.
[08:52] Viktor Petersson
Unless they're affected by it, which is kind of the.
[08:55] Viktor Petersson
If it's deep fakes, for instance.
[08:57] Viktor Petersson
And I guess we tie the conversation to deepfakes, which is one of the Main areas I guess trying to address here is for this to really work, you need to basically enforce all gen AI toolings to do kind of watermarking that it is a gen AI tool and that's kind of a misincentive for some of these tools.
[09:19] Viktor Petersson
And maybe you can get OpenAI to do it and some of the bigger US firms to do it.
[09:23] Viktor Petersson
But will the open source LLMs do this?
[09:27] Viktor Petersson
How are you thinking about that or how do you see about that?
[09:33] Dom Guinard
Yeah, so.
[09:34] Dom Guinard
So I think we need to look at two angles, right.
[09:39] Dom Guinard
The one angle is that C2PA can help LLMs and Gen AI providers flagging their content as AI generated.
[09:48] Dom Guinard
That's one side.
[09:50] Dom Guinard
There are other technologies that can help.
[09:52] Dom Guinard
For instance, the Executive order is citing watermarking, which is another way to help.
[09:57] Dom Guinard
And I think we can talk about the differences and the strengths of each technology.
[10:03] Dom Guinard
So yeah, I think them adopting it is primarily a question of regulation, I'd say.
[10:12] Viktor Petersson
So legislation will certainly work for companies and like OpenAI.
[10:18] Viktor Petersson
I'm thinking like Dall E or some great video generation like Synthesia and companies like that do video content generation using AI.
[10:28] Viktor Petersson
But you can't really enforce stuff open source and that's a bit challenging, I guess, because they're not really entities that you can enforce thus for.
[10:37] Viktor Petersson
In the same way.
[10:40] Dom Guinard
No, but open source projects still have to respect the regulation in place.
[10:44] Dom Guinard
So I.
[10:45] Viktor Petersson
But they're not enforced globally though.
[10:47] Viktor Petersson
So they're US centric, largely.
[10:51] Dom Guinard
You mean the regulations.
[10:52] Viktor Petersson
Yes.
[10:53] Viktor Petersson
The US Executive Order is a US only entity.
[10:56] Viktor Petersson
Right.
[10:56] Viktor Petersson
Or US.
[10:56] Dom Guinard
Yeah, that's right.
[10:57] Dom Guinard
But there's the.
[10:58] Dom Guinard
There's almost the same kind of regulation that's in preparation in the European Community.
[11:06] Dom Guinard
And then there is.
[11:08] Dom Guinard
Yeah.
[11:09] Dom Guinard
China for instance, was the first country to make a move to make it mandatory to watermark content from generative AI.
[11:17] Dom Guinard
So, you know, I don't think it's a US only thing.
[11:20] Viktor Petersson
Okay, so you anticipate this being kind of global legal framework in a sense.
[11:24] Dom Guinard
Yeah.
[11:25] Dom Guinard
And they're all similar, in particular the European regulation.
[11:28] Dom Guinard
I mean, there's no regulation yet, but there are drafts and discussions is going very much along the way of the US Executive Order, which is also not a regulation.
[11:37] Dom Guinard
Right.
[11:38] Dom Guinard
But a set of guidelines.
[11:39] Viktor Petersson
Right, right.
[11:41] Viktor Petersson
Okay, interesting.
[11:43] Viktor Petersson
Let's take a step back.
[11:45] Viktor Petersson
Verify credentials and CTPA are kind of similar.
[11:50] Viktor Petersson
My understanding is the VC or verified credentials, they're backed by W3C standard.
[11:54] Viktor Petersson
Do you want to walk me through the difference and how they are similar, but how they are different?
[11:57] Viktor Petersson
As well?
[11:59] Dom Guinard
Well, yeah, I don't think they are similar.
[12:02] Dom Guinard
I don't think similar is necessarily the right word.
[12:05] Dom Guinard
I think they're very complementary.
[12:07] Dom Guinard
Verifiable credentials.
[12:09] Dom Guinard
W3C.
[12:10] Dom Guinard
Verifiable credentials basically give.
[12:13] Dom Guinard
Allow you to use identity, decentralized identity did.
[12:19] Dom Guinard
To sign claims.
[12:20] Dom Guinard
Right.
[12:20] Dom Guinard
So you can now use your credentials to sign claims, all kind of claims.
[12:25] Dom Guinard
Right.
[12:25] Dom Guinard
So it's a generic framework for signing claims, digital claims of all sorts.
[12:35] Dom Guinard
C2PA is a framework for providing provenance information from and about assets.
[12:43] Dom Guinard
Now, the place where they meet and will meet in a more tightly coupled way in the future is that to be able to provide provenance information about assets.
[12:53] Dom Guinard
It is very interesting to be able to sign these provenance information and different claims that you're making about an asset.
[13:02] Dom Guinard
And so that's where verifiable credentials meet C2PA.
[13:07] Dom Guinard
And actually they already.
[13:10] Dom Guinard
You can already use verifiable credentials to sign C2PA claims today, but it's not 100% integrated yet.
[13:21] Dom Guinard
And I know that work in the next version of C2PA will make this a lot more supported in a lot better way.
[13:31] Viktor Petersson
Okay, so it's a kind of semi related, substandard, but not exactly the same C2PA can fit into the framework of VCs in the long run, in a sense.
[13:43] Viktor Petersson
Yeah.
[13:43] Dom Guinard
And you know, C2PA started before verifiable credentials or actually almost at the same time.
[13:53] Dom Guinard
And within the C2PA community, there's no an understanding of the power of verifiable credentials.
[13:59] Dom Guinard
And so there's an evolution to start to adopt that for signing claims.
[14:05] Viktor Petersson
Okay.
[14:06] Viktor Petersson
Okay, interesting.
[14:07] Viktor Petersson
One thing that I found interesting was the hardware integration in cameras for the, sort of.
[14:13] Viktor Petersson
For the C2PA standard.
[14:15] Viktor Petersson
You want to talk a bit about that?
[14:16] Viktor Petersson
Because I think that's super powerful.
[14:18] Dom Guinard
Yeah, I think that's very powerful.
[14:20] Dom Guinard
The closer to the source you are, the better it is.
[14:22] Dom Guinard
You don't want to be too late in the workflow to add a manifest to your assets.
[14:28] Dom Guinard
And so being able to add it to the cameras is a wonderful idea.
[14:32] Dom Guinard
And I had the chance a couple of weeks ago.
[14:35] Dom Guinard
I was at Stanford for the CAI summit, so the C2PA community summit and Leica was present there.
[14:42] Dom Guinard
And I tested the.
[14:44] Dom Guinard
I think it's the M11 Leica camera that has native C2PA capability.
[14:50] Dom Guinard
So literally you configure a camera to say who you are, that generates a key for you and then that key is used to sign the claims and Basically whenever you take a picture, it basically certifies that it was taken by this camera at this time.
[15:05] Dom Guinard
You can even add things like geolocation and so on.
[15:08] Viktor Petersson
Right.
[15:09] Viktor Petersson
So you can cryptographically say this photo was taken at this protest and I took it because I cryptographically signed it as a photographer, essentially.
[15:19] Dom Guinard
Yeah, exactly.
[15:20] Viktor Petersson
And then the news outlet can say, oh, actually we know by the mere cryptography of this that it is not tampered with.
[15:29] Viktor Petersson
And you can validate that this is actually not a fake.
[15:32] Viktor Petersson
So I can see that power workflow, end to end being super powerful.
[15:37] Dom Guinard
Yeah.
[15:38] Viktor Petersson
Cool.
[15:39] Viktor Petersson
Now let's dive into technical stuff because I think that's where it really gets interesting.
[15:45] Viktor Petersson
Right.
[15:46] Viktor Petersson
So my understanding is there are two elements to the C2 pack.
[15:52] Viktor Petersson
There is the metadata, which can be stored in EXIF, as you mentioned, for JPEGs, for instance, and there is the watermarking feature of this, because if you only store in exif, stripping that out is trivial for anybody with even the basic understanding of tech.
[16:11] Viktor Petersson
So walk me through these, the actual technology behind the watermarking.
[16:20] Dom Guinard
Behind the watermarking, you mean behind both.
[16:22] Viktor Petersson
The watermarking and the exif, I guess, and how that actually works.
[16:25] Viktor Petersson
And we can dive into this to designing and the recovery process in a moment.
[16:29] Viktor Petersson
I'm just curious about how it's structured on a big picture level.
[16:34] Dom Guinard
Yeah.
[16:34] Dom Guinard
Okay, so I think I'll share my screen again because I want to show you something because I think it's important to say that today C2PA exists without digital watermarks.
[16:50] Dom Guinard
And there's a bit of confusion on the market and in the news about that because the executive order mentions watermarking.
[16:57] Dom Guinard
The executive order also mentioned other things such as manifests.
[17:01] Dom Guinard
I mean, they're not the same.
[17:04] Dom Guinard
Currently C2PA is not watermark based.
[17:07] Dom Guinard
So currently in C2PA you basically add manifests to assets.
[17:13] Dom Guinard
And there are a few issues with that.
[17:17] Dom Guinard
Primarily two issues, right, is that you can remove the manifest and we can show that a little later in a little demonstration.
[17:27] Dom Guinard
And so if you remove the manifest from the asset, well then it's gone.
[17:30] Dom Guinard
And then you have no provenance information about the this asset.
[17:35] Dom Guinard
Another issue is that the manifest can be switched for another manifest.
[17:39] Dom Guinard
So if you're a malicious actor, you can basically strip off the manifest and add a new manifest that's cryptographically going to be perfectly okay, except you just stole my asset or you unflagged an asset that was AI generated and you make it not AI generated in the manifestation.
[18:01] Dom Guinard
These are the type of attacks that are fairly easy to perform, and the latter.
[18:06] Dom Guinard
So the switch of a manifest is an attack.
[18:08] Dom Guinard
The former, I think, very importantly, is not an attack.
[18:12] Dom Guinard
Like if you upload an image that has a C2PA manifest on pretty much any social media platform, then the manifest is going to be stripped off.
[18:22] Viktor Petersson
Right.
[18:23] Dom Guinard
Actually, I did a little experiment not long ago.
[18:26] Dom Guinard
I was writing a blog post about our C2PA extension.
[18:31] Dom Guinard
We launched a C2PA Chrome extension at Digimarc, and I was trying to find one platform that would actually not remove the, you know, the manifest from my images.
[18:42] Dom Guinard
And I failed to do so until I realized GitHub doesn't.
[18:46] Dom Guinard
Because GitHub is really not touching the images at all.
[18:50] Dom Guinard
All the other platforms, all the blogging platforms, all the social media platforms are basically stripping the manifesto.
[18:58] Viktor Petersson
For good reasons though, Right?
[18:59] Viktor Petersson
Because they do it for privacy reasons.
[19:00] Viktor Petersson
Largely because EXIF data usually includes location.
[19:03] Viktor Petersson
So for safety reasons, most of them do that.
[19:06] Dom Guinard
Right, Absolutely.
[19:08] Dom Guinard
And I think as creators, the long tail of content creators, we don't necessarily realize what these manifests contain.
[19:16] Dom Guinard
And so that's why the social networks and the platforms generally strip them off.
[19:22] Dom Guinard
I think some of them, they strip them off consciously, indeed.
[19:25] Dom Guinard
To preserve privacy.
[19:27] Dom Guinard
Some of the tools just strip them off because they don't, you know, they.
[19:31] Dom Guinard
They don't really mind and they don't really care about ensuring that these manifests are kept.
[19:38] Dom Guinard
And that's the case of many photo editing tools, for instance, or image editing tools.
[19:43] Dom Guinard
Yeah.
[19:43] Viktor Petersson
And they replace it even with their own EXIF data.
[19:46] Viktor Petersson
Yeah.
[19:46] Viktor Petersson
Rotators, for instance.
[19:47] Viktor Petersson
Right.
[19:48] Dom Guinard
Yeah.
[19:48] Dom Guinard
I think counter example is the Adobe suite of tool.
[19:52] Dom Guinard
Obviously Adobe being such a strong actor behind C2PA, their tools respect the C2PA workflows and they don't remove the manifest.
[20:00] Dom Guinard
But many other tools do.
[20:02] Viktor Petersson
Right, Right.
[20:03] Viktor Petersson
Okay.
[20:04] Viktor Petersson
So tying this back into the camera.
[20:07] Viktor Petersson
So when you mentioned the Leica cameras supporting exif.
[20:10] Viktor Petersson
Sorry, supporting ctpa, is that purely then in the form of exif or are they doing something beyond exif?
[20:19] Dom Guinard
No, today it's purely in the form of exif.
[20:22] Dom Guinard
And this is when digimarc entered the game.
[20:26] Dom Guinard
And it's not like we broke the news in the C2PA community by saying watermarks could help.
[20:32] Dom Guinard
Right.
[20:33] Dom Guinard
They already imagined watermarks could help.
[20:36] Dom Guinard
And the C2PA standard already has a mechanism called soft binding, which is a way to bind the manifest to the actual image.
[20:46] Dom Guinard
Because that's the problem.
[20:47] Dom Guinard
It's creating a strong link between, on the one hand side, the manifest, and on the other Hand side the image.
[20:54] Dom Guinard
And they already had defined soft bindings.
[20:56] Dom Guinard
And in soft bindings, they describe two techniques for soft binding.
[21:00] Dom Guinard
One of them is perceptual hashes and the other one is watermarking.
[21:04] Dom Guinard
But they were just described at a high level.
[21:07] Dom Guinard
So there's nothing in the standard that tells you how to do that just for the sake of completeness.
[21:13] Dom Guinard
A perceptual hash is unlike a traditional hash, is a hash that if you modify a little bit an image, say for instance, you could still have the same hash.
[21:26] Dom Guinard
Whereas the typical SHA256 hashes, you modify any pixel, you have a completely different hash.
[21:35] Dom Guinard
Perceptual hashes are resilient to some changes.
[21:38] Viktor Petersson
So like if you were to crop the image, for instance, you would still retain the hash?
[21:42] Dom Guinard
Yeah, I mean, depending on the perceptual hashing algorithm you use.
[21:46] Dom Guinard
But, yeah, it could be resilient to that type of issues.
[21:50] Dom Guinard
So now you have a way, in theory, using a perceptual hash to find a manifest.
[21:56] Dom Guinard
Given an image, you can find if there's a manifest for it.
[21:59] Viktor Petersson
I see.
[22:00] Viktor Petersson
Okay.
[22:00] Viktor Petersson
So that takes me into the next part, which is a big part of it, which is the recovery process of recovering a signature or an owner, really, I guess, for a photo in this case.
[22:12] Viktor Petersson
So that's how it works.
[22:13] Viktor Petersson
It's basically a lookup table based on.
[22:15] Dom Guinard
The hash, essentially based on a perceptual hash.
[22:18] Dom Guinard
But again, the problem with perceptual hashes is that they're very brittle.
[22:25] Dom Guinard
You can have, and there are a couple of interesting blog posts on that.
[22:28] Dom Guinard
You can have drastically different images that give the same perceptual hash.
[22:34] Dom Guinard
Or you can have.
[22:36] Dom Guinard
Yeah, well, yeah, it's not even collision, but it's simply the algorithm sees it as the same thing.
[22:43] Dom Guinard
And there are a couple of good examples that we can post.
[22:50] Dom Guinard
The other problem is, yeah, some tiny modifications might actually lead to a different perceptual hash as well.
[23:02] Dom Guinard
It's brittle.
[23:03] Dom Guinard
There's another problem, which is it requires an active lookup.
[23:07] Dom Guinard
So you have to basically go into a database and you have to query that database and find the corresponding manifest.
[23:16] Dom Guinard
So this is where watermarks, we believe, are a much stronger proposition because you literally embed inside the image an imperceptible signal that ties back to the manifest and that is a lot stronger.
[23:34] Dom Guinard
Also pretty resilient to many of the modifications that you can make.
[23:39] Viktor Petersson
Right, yeah, he's going back to the hashing of that.
[23:45] Viktor Petersson
So that essentially means that in some ways it's void if you can do a fuzzing attack essentially on an image and you can create the same image twice.
[23:53] Viktor Petersson
That means that you can impersonate another image and have that look up to the same.
[23:58] Viktor Petersson
So you can basically fake a real photo with a fake photo from say, a demonstration.
[24:03] Viktor Petersson
Right.
[24:03] Viktor Petersson
With a.
[24:04] Viktor Petersson
Presumably not too difficult.
[24:07] Viktor Petersson
Well, if you have somewhat decent resources at your disposal, you could fake like a nation state, for instance, could fake a photo from a protest, essentially.
[24:17] Viktor Petersson
In theory, then, yeah, you could start.
[24:19] Dom Guinard
Doing these kind of things.
[24:20] Dom Guinard
You could also, by making tiny modifications to an image, making it impossible to find the.
[24:26] Dom Guinard
To find the manifest, the original manifest.
[24:29] Dom Guinard
So you could make things that are generated by AI flag that's not generated by AI.
[24:34] Dom Guinard
So yeah, you could perform all kinds of things.
[24:37] Viktor Petersson
Yeah, I guess there's no way to.
[24:39] Viktor Petersson
Yeah, there's no way to detect that it is a collision.
[24:41] Viktor Petersson
Right.
[24:41] Viktor Petersson
Because you don't really know unless you have pointed to the original image where you actually upload the original image as well.
[24:47] Viktor Petersson
So then you have a reference to what the real is.
[24:50] Viktor Petersson
Even if you have a collision.
[24:51] Viktor Petersson
You can say, oh, actually these images are off the same.
[24:55] Dom Guinard
Yeah.
[24:55] Dom Guinard
If you can establish they're the same and you can tie it back to the original image, then yeah, you could.
[25:01] Viktor Petersson
So there's no this database.
[25:02] Viktor Petersson
Are you speaking up here?
[25:03] Viktor Petersson
So that's only like a text database, essentially, with the metadata.
[25:06] Viktor Petersson
It doesn't have a reference to the real image of any way, shape or form.
[25:10] Viktor Petersson
Right.
[25:11] Dom Guinard
Well, it could, actually.
[25:13] Dom Guinard
That depends on the implementation.
[25:15] Dom Guinard
It could also have the reference image.
[25:18] Dom Guinard
Yeah, interesting.
[25:19] Viktor Petersson
Okay, cool.
[25:20] Viktor Petersson
All right, let's go into the watermark, because I think that's a lot more interesting and far more bulletproof.
[25:26] Viktor Petersson
Right.
[25:27] Viktor Petersson
So let's talk a bit about the watermarking, how that actually could work and how.
[25:30] Viktor Petersson
Well, I guess Digitmark is working on that to solve that problem.
[25:35] Dom Guinard
Yeah, so with the idea of the watermark is that you basically, again, create that strong link between the image and the manifest because you embed inside the image an imperceptible signal that ties it back to the manifest.
[25:53] Dom Guinard
So now if you basically decouple the image from its manifest, then the watermark says, hey, well, actually there is a manifest for this image, and here is where you can find a manifest or even here is the actual manifest.
[26:09] Dom Guinard
So you can implement a recovery process based on.
[26:12] Dom Guinard
Based on the watermark.
[26:14] Viktor Petersson
Right.
[26:15] Viktor Petersson
And watermark, I mean, that's.
[26:17] Viktor Petersson
That's nothing new.
[26:18] Viktor Petersson
Right.
[26:18] Viktor Petersson
That's been all the big stock photo imagery site, they've been toying with these things for Quite some time.
[26:23] Viktor Petersson
Right.
[26:23] Viktor Petersson
Because that's a major problem they have.
[26:25] Viktor Petersson
So, so walk me through the unique approach I guess that digimark is taking on this compared to what's been using for the, for some while.
[26:35] Viktor Petersson
For some while to do attribution on images in watermarks.
[26:39] Dom Guinard
Yeah, it's true that watermarking is a, you know, set of technologies that exists for a while.
[26:45] Dom Guinard
I think the real USP of Digimark is the experience.
[26:49] Dom Guinard
Digimark has been one of the pioneers for more than 20 years in the watermarking space.
[26:54] Dom Guinard
An example is helping the world central banks with watermarking and we have helped all kinds of companies in the digital space, in the physical space.
[27:06] Dom Guinard
So there's a lot of expertise.
[27:09] Dom Guinard
Digimarc also has a lot of IP in the watermarking space and generally a lot of experience in making things as imperceptible as it can be and making these watermarks as strong as they can be.
[27:23] Dom Guinard
Now, a watermark is also not bomb proof.
[27:25] Dom Guinard
You can remove it.
[27:27] Dom Guinard
Given enough time and compute power, you can remove a watermark from an image.
[27:31] Dom Guinard
But that's very different from stripping off the manifest, which is trivial and again done by almost all the tools out there already.
[27:42] Viktor Petersson
Yeah.
[27:42] Dom Guinard
So it's already a step change in the, in the advantage.
[27:46] Viktor Petersson
So walk me through, I guess, how if I crop an image, for instance, if I crop like 25% of an image, I kick off 75% of an image.
[27:57] Viktor Petersson
What, what is the minimum ratio, I guess, or minimum size of an image do you need in order to recover that watermark?
[28:05] Viktor Petersson
Recover the manifest for that watermark?
[28:07] Viktor Petersson
What's the, like how, what's the fault tolerance?
[28:09] Viktor Petersson
I guess for this.
[28:12] Dom Guinard
Yeah, that is a very hard question to answer in absolute terms.
[28:18] Dom Guinard
What I'll say though is that the watermarks, the digimarc watermarks are implemented with a lot of redundancy and so even a, you know, a fraction of the image will, might still contain the full payload.
[28:32] Dom Guinard
So there's a lot of redundancy in watermarking.
[28:36] Dom Guinard
Answering that question in absolute terms is very hard because it really depends on the image, the type of media, the colors that you have, and so on.
[28:46] Dom Guinard
But generally it's resilient to this type of attacks to a certain level.
[28:53] Dom Guinard
But I think one important point is that the idea of introducing watermarking into C2PA is primarily first and foremost to resolve the non malicious issues.
[29:08] Dom Guinard
Resolving the malicious issues is almost like a cherry on top Right.
[29:13] Dom Guinard
Because right now the thing that really for me we can see 2 pa is all the non malicious issues, basically.
[29:20] Dom Guinard
Yeah.
[29:20] Dom Guinard
You create your image with a Leica camera.
[29:23] Dom Guinard
Great.
[29:23] Dom Guinard
You have a signature, it's digitally signed by Victor, it's all good.
[29:27] Dom Guinard
Then you upload it pretty much anywhere and the manifest is gone.
[29:31] Viktor Petersson
Right.
[29:31] Dom Guinard
And so that's really, I think, the primary issue that has to be solved and where watermarks can help.
[29:39] Viktor Petersson
Right.
[29:39] Viktor Petersson
And that's, I mean, particularly going back into the, I guess, hoppiest journalism that happens.
[29:44] Viktor Petersson
A lot of people take a photo on their cell phone and that being shared on social media and picked up by news outlets and sourced as a credential evidence of something happened.
[29:54] Viktor Petersson
Right.
[29:54] Viktor Petersson
In reality that might not at all be a real event.
[29:58] Viktor Petersson
So I guess, yeah.
[29:59] Viktor Petersson
Particular the problematic element of these social media platforms, stripping that metadata is obviously for good reasons to be fair, but is obviously kind of undermining the whole narrative around C2PA, if that is one of the use cases.
[30:14] Dom Guinard
Right, yeah.
[30:15] Dom Guinard
And I have to say here, to be totally fair to the C2PA standard, that there are discussions with the social media platforms to ensure that they don't strip off CP simply all the manifests and all the headers of assets, but that they selectively do so.
[30:32] Dom Guinard
And so they would keep potentially in the future they would keep the C2Pmanifest or at least the part that's not an issue from a privacy standpoint.
[30:44] Dom Guinard
But yeah, it's a long road also with different kind of incentives to do so depending on who you are.
[30:52] Dom Guinard
And the social media platforms don't necessarily are not necessarily ones benefiting the most from pushing this type of technology.
[31:01] Dom Guinard
So I think that's where really the watermark can help bridging until we get there, if we ever get there, to be honest.
[31:10] Viktor Petersson
What's the roadmap like for getting watermarking into the C2PA standard and more commonly adopted in.
[31:19] Viktor Petersson
I guess you still have some proof.
[31:20] Viktor Petersson
Already got some proof concept as I presume.
[31:22] Viktor Petersson
But in terms of getting that into the lightcast of the world to get them to implement the watermarking, because I assume they're a lot more computationally heavy to do on a camera as well.
[31:33] Dom Guinard
Yes and no.
[31:34] Dom Guinard
And this is also where digimark has a lot of experience in the embedded side of watermarking.
[31:42] Dom Guinard
We've been embedded in many devices, billions of devices already.
[31:47] Dom Guinard
And so it, you know, we have expertise, others as well.
[31:51] Dom Guinard
Right.
[31:52] Dom Guinard
But that's one of the core advantages.
[31:54] Dom Guinard
So it's not necessarily a footprint Problem.
[31:57] Dom Guinard
It's not necessarily going to be really the issue, but I think first of all, we need the watermarking standard to be part of the CTP standard.
[32:08] Dom Guinard
And basically, as it says on this slide, there was a task force created in September 2023 that I actually co chair together with someone from Adobe.
[32:19] Dom Guinard
And the idea is really, it's very early stage right now, but the idea is really to gather the use cases, understand what the industry wants from the watermark, and then start to make small modifications to the C2P standard so that it really embraces watermark as a soft binding technique with clear ways of binding the image and the watermark together.
[32:43] Dom Guinard
So it's work in progress.
[32:45] Dom Guinard
It has started, work in progressing well.
[32:48] Dom Guinard
Any and anyone wanting to join you can actually join C2PA and help us.
[32:53] Dom Guinard
It's a really open consortium, so joining it is pretty easy for anyone, any company.
[33:00] Viktor Petersson
Cool.
[33:00] Viktor Petersson
All right, let's dive into the sighting process because I think that's really interesting to me and that really starts with an identity.
[33:08] Viktor Petersson
And you said in the case of Leica cameras, it's some kind of cryptographic key that generated on the device, I presume you can export that key and is that the X509 key or what?
[33:18] Viktor Petersson
Actually, behind the scenes, what's the cryptographic standard?
[33:23] Viktor Petersson
I guess behind this?
[33:25] Dom Guinard
Yeah, so today it's really SSL like and this is where I think the standard is also going to evolve to embrace a lot more verifiable credentials and technique.
[33:39] Dom Guinard
But today basically, Leica acts.
[33:43] Dom Guinard
In the case of Leica Camera, Leica would act as a certification authority and their certificate would then generate a certificate for you or a key for you and then you sign that.
[34:00] Dom Guinard
And yeah, the same.
[34:01] Dom Guinard
If you use Photoshop today and you enable content credentials, then you'll have an Adobe generated certificate.
[34:08] Dom Guinard
So the trust authority is going to be Adobe and then they are signing for you.
[34:13] Dom Guinard
So you have a certificate that's generated for you.
[34:16] Viktor Petersson
So here you have a very interesting attack vector, right.
[34:19] Viktor Petersson
So if you can export the private key from your Leica camera in an attack, you can essentially impersonate that person and kind of exploit the CTPA program.
[34:31] Viktor Petersson
So if I can get a camera, if I can export one of the cameras from say a BBC photojournalist, I could impersonate that person with an AI generated image and BBC would be non devisor.
[34:44] Viktor Petersson
How is the threat modeling around that?
[34:45] Viktor Petersson
Have you had any conversation with camera vendors like is it TPM based or can you export the key or some kind of Trusted platform.
[34:54] Dom Guinard
Yeah, I mean I don't have all the details, but obviously these keys are stored in a safe place and they have crypto chips in the camera that store these keys.
[35:06] Dom Guinard
And so yeah, I'm not too worried about that in the sense that it's a general problem.
[35:11] Dom Guinard
It's not dissimilar to what you have with crypto wallets and hardware wallets and so on.
[35:18] Dom Guinard
So I think that's not necessarily an issue.
[35:23] Dom Guinard
I think what's more an issue is the trust model above and beyond the key.
[35:28] Dom Guinard
Because if you Google a bit and look at C2PA attacks, you can see that actually you could also create your own certificate and say you are, say you're the BBC and create an alternative BBC certificate and start signing things as the BBC.
[35:45] Dom Guinard
As long as there is not a set of trusted routes.
[35:52] Dom Guinard
It's a little bit the wide West.
[35:54] Viktor Petersson
Right.
[35:55] Viktor Petersson
So there is no equivalent to the root of trust that you have with CAS on the public Internet.
[36:01] Viktor Petersson
In that sense.
[36:02] Dom Guinard
Yeah, your browser has a set of root certificates that it trusts.
[36:07] Dom Guinard
We need to get to a similar construct for C2PA.
[36:12] Viktor Petersson
Right.
[36:13] Viktor Petersson
And that kind of makes me think a lot about PGP in the early days.
[36:17] Viktor Petersson
Well, still PDP still a thing of course and it's still use it once in a while but because there you have a decentralized and I guess predating the whole web three by a good 20 years of trust.
[36:29] Viktor Petersson
Right.
[36:30] Viktor Petersson
With signing parties and whatnot.
[36:31] Viktor Petersson
But that's obviously not scalable for a commercial model, which is why you have these.
[36:35] Viktor Petersson
But so you're thinking that it would be more mimicking the regular CAT structures then.
[36:48] Viktor Petersson
And will be the same actually.
[36:50] Viktor Petersson
Will, will that be just leveraging the existing PKI infrastructure you have for the public Internet with root certificates?
[36:56] Viktor Petersson
Because BBC already, obviously they already have their own certificates of course, and so would any, so would Leica.
[37:02] Viktor Petersson
Right.
[37:04] Viktor Petersson
Is that something that you think would be merged into that or is it more taking the path down blockchain?
[37:12] Dom Guinard
Well, I think it's going to be a mix of both.
[37:14] Dom Guinard
Right.
[37:14] Dom Guinard
I think there's value in leveraging the infrastructure that's already in place.
[37:19] Dom Guinard
And you said it, BBC already have a certificate.
[37:21] Dom Guinard
Digimarc have one, Adobe have one.
[37:24] Dom Guinard
So why don't we use that?
[37:26] Dom Guinard
I think where it gets interesting is to start leveraging Web3 and dids and verifiable credentials to also allow not only big entities to sign, but also individuals to sign.
[37:41] Dom Guinard
So I think the two worlds will get closer and closer to one another.
[37:47] Dom Guinard
I think what's Also interesting in the crypto world is when you sign up for, let's say, a crypto exchange account, then you have a proper KYC that's put in place.
[37:59] Dom Guinard
So we know that this key belongs to Victor and we have verified who Victor is.
[38:03] Dom Guinard
So there's really value in being able to reuse that kind of thing.
[38:08] Dom Guinard
I think we're at the beginning of this discussion and I think the next C2PA, the next iterations of C2P will really have a much more complete and complete verifiable digital signature side of things.
[38:27] Dom Guinard
I expect a lot of evolutions there.
[38:30] Viktor Petersson
Yeah.
[38:31] Viktor Petersson
I mean, if you go into the web 3 like a lot of OG crypto people are obviously very much against the KYC side of crypto and says it goes against the ethos of course, of decentralized systems.
[38:44] Viktor Petersson
But I would love to.
[38:46] Viktor Petersson
Yes.
[38:46] Dom Guinard
And I understand that in the crypto space, but like, if you consider VCs verifiable credentials above and beyond what we can do with crypto today, and if you consider them in frame of C2PA, there's a real value in actually identifying people.
[39:04] Dom Guinard
Right.
[39:04] Dom Guinard
And in being able to tie these keys to people.
[39:07] Dom Guinard
If you want to, if you want to own an asset that you created, well, then at some point you need to disclose your identity.
[39:13] Dom Guinard
Right.
[39:14] Viktor Petersson
Well, I mean, I'm just thinking from the artist.
[39:16] Viktor Petersson
Right.
[39:16] Viktor Petersson
Banksy springs to mind, obviously, as anonymous artist that has a very big public Persona despite not being a famous person.
[39:25] Viktor Petersson
I, I don't know enough about the art world, but definitely in the web3nft world there are plenty of anonymous artists that would leverage from something similar to this, where you can say, and they obviously, with NFTs obviously already tied to a cryptographic wallet that may or may not be as part of a, an exchange.
[39:45] Viktor Petersson
So I guess there is an argument for having them both, I guess, because I definitely think there's an argument for having decentralized identity as well.
[39:55] Dom Guinard
Yeah.
[39:56] Dom Guinard
But yeah, I think if you take the NFT space and you're the Bored Apes team, then there's a way to know that the key that creates an NFT asset really belong to the Bored Apes.
[40:10] Dom Guinard
Right.
[40:11] Dom Guinard
So we need something similar here.
[40:13] Dom Guinard
It's not necessarily identifying you as an individual and allowing people to track you, but it's really, we need to be able to trust these keys and know that they tie back to the original artist.
[40:26] Viktor Petersson
Absolutely.
[40:27] Viktor Petersson
And I mean, identity is kind of one of the core parts of Web3 and crypto in general.
[40:31] Viktor Petersson
And it's an age old problem that hasn't quite been solved because the problem with identity is that you can't both have it decentralized and centralized simultaneously.
[40:44] Viktor Petersson
And that's.
[40:45] Viktor Petersson
And to make it accessible to the average user, it kind of needs to be centralized with a recovery process, which kind of goes against the ethos.
[40:54] Viktor Petersson
Right.
[40:55] Viktor Petersson
But I'm curious about if we can zoom in a bit on verifiable credentials and how that ties into Web3, because obviously you've been involved with that as well to some extent.
[41:09] Viktor Petersson
Because my understanding is they have multiple signing processes.
[41:12] Viktor Petersson
Right.
[41:13] Viktor Petersson
Both.
[41:14] Viktor Petersson
It can be x509, but it can also be on the blockchain.
[41:18] Viktor Petersson
Do you want to say a few words on that?
[41:19] Viktor Petersson
Because I'm curious about how that looks and it's shaped up or structured.
[41:24] Dom Guinard
Yeah.
[41:24] Dom Guinard
I'm not a specialist of verifiable credentials.
[41:27] Dom Guinard
I've been a user of VERIFYR credentials in several of the pilots that we've been running, but I wasn't part of the standard process.
[41:36] Dom Guinard
Just as a disclaimer.
[41:37] Viktor Petersson
Sure.
[41:38] Dom Guinard
And far more next but than me.
[41:42] Dom Guinard
Yeah, well, I don't know about that.
[41:46] Dom Guinard
But yeah, again, the idea of verifiable credentials is that you have a did so you have a decentralized identity which is essentially a private public key pair and then you have verifiable claims or claims that you want to be able to sign with this signature.
[42:08] Dom Guinard
One example could be, well, Victor has done a KYC and Company X made the kyc and we are saying now on the blockchain that this key belongs to Victor and Victor was verified and that would basically verify that claim.
[42:25] Dom Guinard
And you have all kinds of ways of generating the signatures.
[42:30] Dom Guinard
You also have all kinds of ways of verifying them and all of that is basically described in the standard and so can work in an automated way ultimately.
[42:41] Viktor Petersson
And I guess that's relevant because it's tying into.
[42:45] Viktor Petersson
If C2PA becomes kind of part of verified credentials and that is the identity side of it.
[42:55] Viktor Petersson
These are super relevant elements, I guess to it.
[43:00] Viktor Petersson
Cool.
[43:01] Viktor Petersson
Let's do a quick show and tell on how this actually works because I know you have.
[43:06] Viktor Petersson
You want to showcase your new Chrome extension that Digimarch just released.
[43:12] Viktor Petersson
So I would love to see how this actually works end to end and perhaps do the stripping off this recovery process and we can talk to what actually happens behind the scenes.
[43:21] Dom Guinard
Yeah, let's do that.
[43:23] Dom Guinard
So I'll share another screen here.
[43:31] Dom Guinard
So yeah, I can show you a couple of things.
[43:37] Dom Guinard
We have basically launched this content credential extension that you can now download from the Chrome Store.
[43:46] Dom Guinard
And the idea was just when we started playing with C2PA, we felt like there was a lack of a independent way of verifying and displaying the C2PA manifest of the content credentials.
[44:02] Dom Guinard
Because if you go on a site.
[44:05] Dom Guinard
Let me just turn this off.
[44:06] Dom Guinard
But if you go on.
[44:10] Dom Guinard
Trupik is one of the big actors also behind the C2PA standard, and you go on their site, you have great examples of C2PA manifest right here on the images.
[44:22] Dom Guinard
Now, the problem I have with that is that the way it works currently is that they basically embed the JavaScript verification library themselves.
[44:32] Dom Guinard
So if you actually are a malicious actor, then it becomes pretty easy to fool your audience by simply, you know, faking it here.
[44:44] Dom Guinard
Right, because you embed it.
[44:46] Dom Guinard
So we felt that was a limitation.
[44:50] Dom Guinard
And also that generally the idea of every site must embed the whole C2PA verification and displaying functionality didn't really make sense.
[45:01] Dom Guinard
And I mean, it's a bootstrap, right?
[45:02] Dom Guinard
Everyone knows that's the way to get started.
[45:05] Dom Guinard
But that's why we thought, hey, there's a need for making your browser the one that verifies and displays content credentials.
[45:14] Dom Guinard
And that's where the extension enters the game.
[45:17] Dom Guinard
And now, so if I turn it on and I go, say on the Digimarc blog, and I take, for instance, this blog post, then I'll see that I start to have little CR icons appearing on the images.
[45:39] Dom Guinard
And that's basically what the plugin does.
[45:41] Dom Guinard
The plugin basically looks for images that you're looking at and then checks if they have a manifest.
[45:47] Dom Guinard
If they have no manifest, it does nothing.
[45:49] Dom Guinard
But if they have a manifest, it verifies it.
[45:52] Dom Guinard
So it verifies all the signatures using the process that's described in the standard, and then it displays it.
[45:59] Viktor Petersson
Right, so you can see the producer there.
[46:01] Viktor Petersson
So how would these.
[46:02] Viktor Petersson
How will these generate these images?
[46:04] Viktor Petersson
Because are these with Photoshop or how do we actually.
[46:06] Dom Guinard
Well, what do you think?
[46:07] Dom Guinard
I mean, one of them is generated by AI, the other one not.
[46:12] Viktor Petersson
Right.
[46:13] Viktor Petersson
So one of them is.
[46:13] Viktor Petersson
One of them is an AI generated image, I presume, and one is a photo.
[46:17] Dom Guinard
Yeah, exactly.
[46:19] Dom Guinard
Which one is which?
[46:20] Viktor Petersson
Well, that's actually very difficult in this day and age.
[46:23] Viktor Petersson
Until I would imagine the top one might be a photo and the bottom one might be AI.
[46:27] Dom Guinard
You're good.
[46:28] Dom Guinard
You're good.
[46:28] Dom Guinard
Usually people say the opposite, actually, but yeah, you're good.
[46:31] Dom Guinard
This one was generated, this one I took last winter.
[46:35] Viktor Petersson
Oh, wow.
[46:36] Dom Guinard
And this One, Yeah.
[46:39] Dom Guinard
Was basically produced by me in that case.
[46:41] Dom Guinard
And this one was generated by AI trained using the original image here.
[46:47] Dom Guinard
That's why the mountains look pretty similar.
[46:49] Dom Guinard
But, yeah, and so you can see directly the tool here helps you distinguish what was generated by AI and what.
[46:56] Dom Guinard
What wasn't.
[46:57] Dom Guinard
So you have the mention here.
[46:59] Viktor Petersson
And this was signed by digimarc then, right?
[47:01] Dom Guinard
Yeah, in this case, it was signed by digimarc.
[47:04] Dom Guinard
And you can also have an independent audit of the image.
[47:07] Dom Guinard
If you click on View more, then that drives you to contentcredentials.org where you have a verification tool and you can see all about the image and its provenance.
[47:23] Dom Guinard
So this is essentially what the tool allows you to do.
[47:26] Viktor Petersson
Okay, so let's.
[47:28] Viktor Petersson
Yeah.
[47:28] Viktor Petersson
Do you want to show me, like, there was a really cool example on your blog where you stripped and recovered metadata.
[47:37] Viktor Petersson
Is that something that is possible to showcase or is that something.
[47:41] Dom Guinard
Yeah, exactly.
[47:43] Dom Guinard
So we actually have designed a little tool here.
[47:47] Dom Guinard
I mean, that's not generally available to the public yet, but it's a demonstration tool that we use that basically integrates our Digimark validate technology with the C2PA standard.
[47:58] Dom Guinard
And we used this as a showcase when we started Talking to the C2PA crew about watermarking.
[48:05] Dom Guinard
So here, what you can do is you can basically upload an image and I'll upload.
[48:13] Viktor Petersson
Domad Mountaineering.
[48:15] Dom Guinard
Yes, exactly.
[48:16] Dom Guinard
It's actually one of the highest mountains I climbed.
[48:19] Dom Guinard
So I'm showing off my watch here.
[48:21] Viktor Petersson
Look at that.
[48:22] Dom Guinard
That had the altitude.
[48:24] Dom Guinard
So basically here we're checking everything about the image.
[48:28] Dom Guinard
We're creating a manifest, because he didn't have one before.
[48:32] Dom Guinard
I actually signed into the tool with my.
[48:35] Dom Guinard
With my wallet.
[48:37] Viktor Petersson
Okay, and by wallet, you mean your.
[48:40] Viktor Petersson
Your crypto wallet or.
[48:41] Dom Guinard
Yeah, with my crypto wallet.
[48:43] Viktor Petersson
Okay, so integrate with MetaMask or something like that or.
[48:47] Dom Guinard
Yeah, well, actually I can show you.
[48:48] Viktor Petersson
That if you want, but, yeah, that'd be cool.
[48:58] Dom Guinard
It's a demo tool, so it's not, by far, not bone proof in terms of security.
[49:03] Dom Guinard
Just a disclaimer.
[49:05] Viktor Petersson
Fair enough.
[49:07] Dom Guinard
Yeah.
[49:07] Dom Guinard
So here I'm registering and then it's asking me whether I want to link a wallet.
[49:15] Dom Guinard
Yep.
[49:15] Dom Guinard
So I.
[49:16] Dom Guinard
I will link it here.
[49:21] Dom Guinard
Right.
[49:21] Dom Guinard
And now I can start the process again.
[49:23] Dom Guinard
And now MetaMask will be used to sign the transactions as well.
[49:27] Dom Guinard
So you.
[49:28] Viktor Petersson
So digimarc doesn't actually.
[49:32] Viktor Petersson
Well, actually.
[49:32] Viktor Petersson
So when you actually sign it now, do you have to sign it using your wallet then, or would it sign using some kind of halfway bridge tool?
[49:42] Dom Guinard
Yeah, so it's actually a mix of both.
[49:45] Dom Guinard
Right.
[49:46] Dom Guinard
Because of the current state of the C2P standard.
[49:48] Dom Guinard
So we'll use a Digimark certificate to sign the manifest, but there's also then a verifiable credential that's going to be embedded in the manifest, and that's using then my wallet.
[50:03] Dom Guinard
My private.
[50:04] Viktor Petersson
All right, so digimarch digimark signs it, but in the signature, it points to the fact that it was signed by your wallet or engage, like, engaged by you with your wallet.
[50:15] Dom Guinard
Yeah.
[50:16] Dom Guinard
Except right now, these two things are separated and manifest.
[50:19] Dom Guinard
So you don't have a strong link between the two, but that's the kind of things that are being worked on.
[50:24] Viktor Petersson
Right.
[50:24] Viktor Petersson
So in the long run, you would essentially sign this, would say metamask directly.
[50:29] Viktor Petersson
Yeah, yeah, got it.
[50:33] Dom Guinard
Right.
[50:33] Dom Guinard
So next I'm basically gonna.
[50:36] Dom Guinard
The tool is gonna add a manifest, but it's also then gonna generate a.
[50:42] Dom Guinard
A watermark and add the watermark to the image and then tie the two.
[50:46] Dom Guinard
The two togethers.
[50:47] Dom Guinard
And here you can see that.
[50:48] Dom Guinard
Yeah, I'm basically creating a verifiable credential that I'm signing with my key here.
[50:57] Dom Guinard
So metamask popped up and now I can sign it, and it's adding the watermark to the image.
[51:07] Dom Guinard
And then I'll be able to show you that the image now contains a.
[51:12] Dom Guinard
So I can download the image and it now contains a manifest.
[51:17] Viktor Petersson
And visually, it obviously, because it's XIM data, it is not visible to the eye.
[51:25] Dom Guinard
Yeah, well, yeah, so it contains now an EXIF manifest where you have the C2PA content credential, but it also contains a watermark.
[51:36] Dom Guinard
Now, being able to see a digimarc watermark is tough.
[51:39] Dom Guinard
Right.
[51:39] Dom Guinard
You need a lot of training.
[51:41] Dom Guinard
So it's really imperceptible, but it's not invisible.
[51:46] Dom Guinard
Right.
[51:47] Dom Guinard
But it's just very hard to see.
[51:52] Dom Guinard
So now, yeah, I can do.
[51:54] Dom Guinard
Can use the CTP toolchain to basically get the manifest that's attached to this image, and that's a rendering of the manifest as JSON.
[52:05] Dom Guinard
And you can see there are loads of things in there, right?
[52:09] Dom Guinard
Yeah.
[52:10] Dom Guinard
Like the different signatures, the different claims, different modifications that were applied.
[52:15] Dom Guinard
For instance, the fact the watermark was applied is tracked.
[52:20] Dom Guinard
And this is what we're working on in the standard.
[52:22] Dom Guinard
In making these actions.
[52:24] Dom Guinard
Standard actions.
[52:25] Dom Guinard
And if I was making any modification to the image, like, I don't know, cropping it or adding something else to the image, this would all be logged in the C2Pmanifest.
[52:36] Viktor Petersson
Okay.
[52:36] Viktor Petersson
So that assuming you're using a tool that maintains.
[52:43] Viktor Petersson
Yeah, yeah.
[52:44] Viktor Petersson
Okay.
[52:44] Viktor Petersson
So if you use Photoshop, for instance, it will retain that data.
[52:47] Dom Guinard
So if I edit this image in Photoshop, I'll have additional actions that are being applied that correspond to the modifications that I made.
[52:55] Viktor Petersson
So how.
[52:57] Viktor Petersson
I mean, obviously I think it's kind of trivial, but how much space does this add?
[53:01] Viktor Petersson
Because it's quite a few bytes, I presume, but it's, I guess, trivial in the grand scheme of things.
[53:07] Dom Guinard
Yeah, I mean, it could become big.
[53:09] Dom Guinard
Like if there are lots of modifications of the image.
[53:12] Dom Guinard
Yeah, it could become significant.
[53:15] Dom Guinard
It's not stored as JSON.
[53:17] Dom Guinard
Right.
[53:17] Dom Guinard
So it stores in the, in the headers in a much more optimized way.
[53:25] Viktor Petersson
Yeah.
[53:26] Dom Guinard
And yeah, so, but yeah, it could be significant.
[53:31] Dom Guinard
Does it really matter nowadays?
[53:33] Dom Guinard
I'm not entirely sure it does.
[53:35] Viktor Petersson
Probably not.
[53:36] Dom Guinard
It's not going to be gigabytes of data.
[53:38] Viktor Petersson
Right, right.
[53:39] Viktor Petersson
But it could be like a percent off the image size in metadata or few percentages.
[53:45] Dom Guinard
Well, to make this not too big, it's using the CBOR format, which is kind of an alternative to JSON that's much more compressed.
[53:58] Dom Guinard
So that's the actual format that's that used there.
[54:01] Dom Guinard
Okay.
[54:02] Dom Guinard
But back to our example.
[54:04] Dom Guinard
Now what I can do is basically I can simulate being an attacker and just go on any tool here and take the file and remove the headers.
[54:17] Dom Guinard
Now again, I don't even need to be an attacker, Right.
[54:20] Dom Guinard
I could basically upload this image to Twitter, to X or Facebook and it would remove the manifest.
[54:27] Dom Guinard
But here, just for the sake of example, I just took an online tool, right?
[54:33] Dom Guinard
And now I have this other image.
[54:35] Dom Guinard
So if I go here and now I look at the tool on that new image, then it tells me There are no C2Pmanifest.
[54:47] Viktor Petersson
Right.
[54:50] Dom Guinard
Right.
[54:50] Dom Guinard
But if I go back to our tool and I go on the verify side of our tool and I take.
[54:59] Viktor Petersson
This image, you see, the rotation was lost as well because you stripped the EXIF data.
[55:06] Dom Guinard
Yeah, yeah, that's a good point actually.
[55:09] Dom Guinard
Yeah.
[55:11] Dom Guinard
Right.
[55:12] Dom Guinard
And here it gets spotted.
[55:13] Dom Guinard
Right.
[55:14] Dom Guinard
So this is basically the crux of the strength of watermarks that the strengths watermarks add to.
[55:22] Viktor Petersson
So this image did have a watermark as part of it.
[55:25] Viktor Petersson
It is not just EXIF data.
[55:27] Dom Guinard
Okay, yeah, exactly.
[55:28] Dom Guinard
We watermarked it when we did the protect step, we basically watermarked it.
[55:33] Dom Guinard
We created the manifest and watermarked it through digimarc validates watermarks.
[55:40] Viktor Petersson
Right.
[55:42] Viktor Petersson
And if you had only used the non watermark approach, I guess you would not.
[55:48] Viktor Petersson
Would have you be able to restore it the same way?
[55:51] Dom Guinard
No.
[55:51] Dom Guinard
Basically, if I don't watermark it and I verify, then it's going to tell me it knows nothing about this image.
[55:59] Viktor Petersson
So even if you haven't altered it based on the hash, that it would not have been able to look it up reverse.
[56:06] Viktor Petersson
Look that up on the image without the watermark with only.
[56:10] Dom Guinard
Well, no.
[56:11] Dom Guinard
If you had a soft binding, like a perceptual hash, and then you were querying the right repository, then it would tell you, potentially if you made no modification, then the soft binding should work.
[56:24] Dom Guinard
If you made no modification, even a hard binding would work like an actual hash.
[56:30] Dom Guinard
But there's a problem with that, which is who do you ask?
[56:34] Viktor Petersson
Right.
[56:35] Dom Guinard
Because the idea is that, yeah, not all images will be in a central place.
[56:40] Dom Guinard
Right.
[56:41] Dom Guinard
And not all manifests will be centralized.
[56:44] Dom Guinard
So without the watermark, there's a real problem of knowing which repository do you ask for manifests when you don't have a manifest?
[56:53] Viktor Petersson
Of course.
[56:54] Viktor Petersson
And with the Chrome extension, if you were to say, browse a website that has this image with the EXIF data stripped, would it be able to say, actually this should be attributed to this person?
[57:13] Viktor Petersson
I mean, essentially you would be ddosing, essentially digimarc servers as you were browsing the Internet, I guess.
[57:20] Viktor Petersson
But I'm curious if that would be like a reverse lookup.
[57:23] Viktor Petersson
So you could say, actually this is stolen from there.
[57:26] Viktor Petersson
Or in the case of stock image.
[57:28] Dom Guinard
Yeah, well, I'd say if you don't have a watermark, you'll be DDOSing the manifest repository.
[57:33] Dom Guinard
But if you don't have a watermark, in theory, not.
[57:36] Dom Guinard
Right.
[57:36] Dom Guinard
Because you will only check when you see the watermark.
[57:41] Dom Guinard
So as watermarks become widespread, that's a clear signal of, well, this image had a manifest and here's the watermark vendor, so you should go and query their repository.
[57:54] Viktor Petersson
No, I meant more in the case.
[57:56] Viktor Petersson
Let's say you upload this image to Twitter strips the EXIF data.
[58:02] Viktor Petersson
We would not pick up that it is a verified image.
[58:07] Viktor Petersson
Right.
[58:08] Viktor Petersson
Because that would be an interesting feature to have for, say, Twitter, where you actually can traverse back and say this is actually the real image.
[58:16] Dom Guinard
Yeah.
[58:17] Dom Guinard
So this, in theory, the extension could do that.
[58:22] Dom Guinard
Right.
[58:22] Dom Guinard
I mean, we created the extension to be 100% standard compliant.
[58:26] Dom Guinard
So currently it doesn't include a watermark because it's not yet part of the standard.
[58:32] Dom Guinard
But the next version of the extension, we will basically look for watermarks, look for Digital validate watermarks.
[58:40] Dom Guinard
And we will then reconcile the watermark with the manifest on the fly.
[58:48] Dom Guinard
When there is a watermark.
[58:50] Viktor Petersson
Right.
[58:51] Dom Guinard
So we could start doing what you said, right.
[58:53] Dom Guinard
Like if there's no manifest but the watermark is still there, we could tell you.
[58:56] Dom Guinard
Well, we could tell you something similar to what's here.
[59:00] Dom Guinard
Right.
[59:01] Dom Guinard
That was your original image.
[59:02] Viktor Petersson
Exactly.
[59:03] Dom Guinard
That's the image you uploaded.
[59:04] Dom Guinard
But we have this image that the watermark point us pointed us to with this manifest.
[59:12] Viktor Petersson
Yeah, exactly.
[59:13] Viktor Petersson
And.
[59:14] Viktor Petersson
All right, so we're getting to the kind of like our scheduled time for the show.
[59:19] Viktor Petersson
So let's start.
[59:20] Viktor Petersson
I would love to start wrapping things here and move forward to kind of like, where are the next steps?
[59:25] Viktor Petersson
Where can people learn more?
[59:26] Viktor Petersson
And it's been super interesting to myself as well.
[59:29] Viktor Petersson
And I'm just curious, where can we learn more about this stuff?
[59:32] Viktor Petersson
How?
[59:32] Viktor Petersson
Well, they find the Chrome extension.
[59:34] Viktor Petersson
What do you want to do a shout out about with regards to ctpa?
[59:39] Dom Guinard
Yeah.
[59:40] Dom Guinard
So where can you learn more about it?
[59:42] Dom Guinard
Well, you have the ctp.org site where you can see the technical specification.
[59:48] Dom Guinard
You have the Content Authenticity Initiative site.
[59:52] Dom Guinard
That's basically the organization that predated the C2PA standard.
[59:58] Dom Guinard
You have content credentials.org which is a site that shows to everyone what content credentials are.
[01:00:06] Dom Guinard
If you want to look at the Chrome extension, well, you can just search for C2P on Chrome.
[01:00:11] Dom Guinard
And it's the only extension.
[01:00:13] Dom Guinard
It was the first one that digimarc released.
[01:00:17] Dom Guinard
And then, yeah, follow Firefox.
[01:00:19] Viktor Petersson
Type Shakovic.
[01:00:20] Dom Guinard
Yeah, I know you're a Firefox fanboy, so we'll see if we can do that as well.
[01:00:29] Dom Guinard
And yeah, then, yeah, follow Digimarc for developments in terms of watermark and C2PA.
[01:00:35] Dom Guinard
That's really what we're at the forefront of.
[01:00:38] Dom Guinard
And we'll post news on that.
[01:00:41] Viktor Petersson
Amazing.
[01:00:42] Viktor Petersson
Thank you so much for coming on the show, Dom.
[01:00:44] Viktor Petersson
This has been a real pleasure to learn more about this stuff.
[01:00:47] Viktor Petersson
I know you've been super excited and telling me about this for last year or so, and I'm super excited to see do a bit of show and tell this.
[01:00:53] Viktor Petersson
So thank you so much, Dom, and have a good one.
[01:00:55] Viktor Petersson
Cheers.
[01:00:56] Dom Guinard
Thank you very much, Victor.
[01:00:57] Dom Guinard
Bye.

Found an error or typo? File PR against this file or the transcript.