Provenance, Authentication and Privacy

Loading

Provenance, Authentication and Privacy

14 Sep 2025
Technical Papers Room
Technical Papers

Whether you are a journalist or a viewer of news, can you trust what you are seeing? One body working to standardise a solution to this is the Coalition for Content Provenance and Authenticity (C2PA). Its members include some of the world's most prestigious media companies. Our first presentation conducts a privacy analysis of present C2PA systems to assess potential security weaknesses which might identify personal details of the media creator. After examining how content credentials are used in broadcast journalistic workflows, potential attacks are considered at three places: use of C2PA-enabled camera data, privacy leakage from media editing software, and on-line tracking weaknesses. Join us to hear how serious these threats might be.

Our second contribution addresses the problem of delivering C2PA information in a streaming workflow without influencing the media elementary streams. It does this through a proof-of-concept implementation where C2PA-autheticated media is live-streamed using DASH. Finally, in a third presentation we learn how the video standards group JVET has recently equipped its video coding standards (including audio) with mechanisms for trustworthy content signing and authentication.