Transparent Metatada
Mentaport is a proud member of the Content Authenticity Initiative (CAI) led by Adobe; which focuses on systems to provide context and history for digital media. As part of this movement Adobe has created tools for maintaining the provenance of content metadata.
C2PA
The Coalition for Content Provenance and Authenticity C2PA by Adobe, addresses the prevalence of misleading information online through the development of technical standards for certifying the source and history (or provenance) of media content. Combining the power of C2PA metadata for provenance and Mentaports watermarking for protection of authenticity and provenance, we are at the forefront of shaping the future for content protection.
When you opt-in /out of AI training in our certificates, we make sure to add it to the C2PA Metadata
as well.
Use Cases
Our integration with C2PA is broken into three main use cases:
- Use case 1: Content found with C2PA metadata and Mentaport metadata information.
- Use case 2: Content found with C2PA metadata and no Mentaport metadata information.
- Use case 3: Content found with no metadata information.
In all three use cases, in an ideal world we wouldn't need Mentaport’s infrastructure to verify the authenticity of the content. Tools like C2PA would be enough to trust the provenance of the content in hand. But, in today's world, that is not the case. However, the reality is quite different. Not only do malicious actors deliberately undermine trust, but prevalent online practices also frequently degrade content integrity—such as through screenshots or recordings, which can strip away crucial metadata. This environment makes it essential for solutions like Mentaport to step in and protect the authenticity and provenance of digital content.
For each of these three use cases, we process and check the content (image/audio) through our C2PA verification system to try and extract and check for watermarks.
Use Case 1:
** Content found with C2PA metadata and Mentaport metadata information.**
If a watermark is found, we compare the certificate paired to the watermark with the information in the metadata. If the information matches, we return a successful message with the certificate and the C2PA metadata to the user.
In the case that the certificate data and the metadata does not match, we alert the user of the issue and regenerate the C2PA metadata from the one mapped to our watermark and return the certificate extracted from the watermark.
Use Case 2:
** Content found with C2PA metadata and no Mentaport metadata information.**
If no watermark is found, we return the C2PA metadata and inform the user this content has not been certified with Mentaport.
In the case that a watermark is extracted from the content, we alert the user of the issue and regenerate the C2PA metadata from the one mapped to our watermark and return the certificate extracted from the watermark.
This is an edge case that would happen if a bad actor is trying to manipulate the metadata information directly. Given that our solution is binded between watermarking and blockchain, our certifications have a higher tamper proof theshold.
Use Case 3:
** Content found with no metadata information.**
If no watermark is found, we inform the user that the piece of content has no metadata and has not been certified by Mentaport.
In the case where a watermark is found,we alert the user of the issue and regenerate the C2PA metadata from the one mapped to our watermark and return the certificate extracted from the watermark.