Uploaded image

Content Credentials
Digital watermark

Result

How it works

Images are generated using a hosted model and AI disclosure is added to the file. This information, referred to as Content Credentials, serves as a nutrition label for the content. We employ the tamper-evident open C2PA standard, which utilizes PKI and is resistant to forgery. You can download and transfer the image to supported editing tools like Photoshop, where your edit history can also be securely added to the file. This historical information, known as provenance, accompanies your media and can be extracted and displayed using a tool or website.

Want to know more? Read our community blog post.

How it works

Images are generated using a hosted model and AI disclosure is added to the file. This information, referred to as Content Credentials, serves as a nutrition label for the content. We employ the tamper-evident open C2PA standard, which utilizes PKI and is resistant to forgery. You can download and transfer the image to supported editing tools like Photoshop, where your edit history can also be securely added to the file. This historical information, known as provenance, accompanies your media and can be extracted and displayed using a tool or website.

Want to know more? Read our community blog post.