Page 22 - Detecting deepfakes and generative AI: Report on standards for AI watermarking and multimedia authenticity workshop
P. 22

Detecting deepfakes and generative AI: Report on standards for AI
                                           watermarking and multimedia authenticity workshop



                      Figure 9: Mosaic of AI-generated images shown during the workshop by Andrew
                      Jenks to illustrate the rapid advancement of AI in contrast with Figure 3� Warning:
                      these images are not real�































                      The main advantage of Content Credentials is that they can combine secure metadata,
                      watermarks, and content fingerprinting to provide a solution to establish the provenance of
                      multimedia content.

                      Some of the techniques for recording and preserving provenance data include:
                      •    Secure metadata: This is verifiable information about how content was made associated
                           with the content itself, in a way that cannot be altered without leaving evidence of
                           alteration. Content Credentials can provide information about the provenance of any
                           piece of multimedia content or composite. It indicates whether a video, image, or sound
                           file was created with AI or captured in the real world with a device like a camera or
                           audio recorder. Content Credentials are designed to be chained together to provide
                           information about how content may have been altered, what was combined to produce
                           the final content, and even what device or software was involved in each stage. The
                           various elements of provenance in the lifecycle of a digital asset can be combined in
                           ways that preserve privacy and enable creators and consumers to obtain information
                           on the origins of the digital asset and how it was created. The metadata can be either
                           signed using digital signatures or preserved using distributed ledger technologies such
                           as blockchain to maintain the integrity of the provenance data and verify its authenticity.
                      •    Watermarking: Watermarking is a technique to embed hidden information that cannot
                           be seen by people. It can be decoded using a watermark detector. State-of-the-art
                           watermarks can be impervious to alterations such as the cropping or rotating of images or
                           the addition of noise to video and audio. Importantly, the strength of a watermark is that
                           it can survive efforts to remove secure metadata such as taking screenshots or pictures of
                           pictures, or re-recording audiovisual content.
                      •    Fingerprinting: This refers to a way to create a unique code or hash based on pixels,
                           frames, or audio waveforms that can be computed and matched against other instances
                           of the same content, even if there has been some degree of alteration. The fingerprint
                           can be stored separately from the content as part of Content Credentials. When someone
                           encounters the content, the fingerprint can be re-computed and matched against a
                           database of Content Credentials and its associated stored fingerprints. The advantage





                  14
   17   18   19   20   21   22   23   24   25   26   27