Brief intro explaining the high level concept of this tool. Eget consequat at proin sed dolor morbi urna. Quam aliquam imperdiet est lobortis lectus sit vel.
Like this Space in the nav above
Joining the conversation in the Community tab
How it works
Images are generated using a hosted model and AI disclosure is added to the file. This information, referred to as Content Credentials, serves as a nutrition label for the content. We employ the tamper-evident open C2PA standard, which utilizes PKI and is resistant to forgery. You can download and transfer the image to supported editing tools like Photoshop, where your edit history can also be securely added to the file. This historical information, known as provenance, accompanies your media and can be extracted and displayed using a tool or website.
Want to know more? Read our community blog post.
How it works
Images are generated using a hosted model and AI disclosure is added to the file. This information, referred to as Content Credentials, serves as a nutrition label for the content. We employ the tamper-evident open C2PA standard, which utilizes PKI and is resistant to forgery. You can download and transfer the image to supported editing tools like Photoshop, where your edit history can also be securely added to the file. This historical information, known as provenance, accompanies your media and can be extracted and displayed using a tool or website.
Want to know more? Read our community blog post.