{"id":1168054,"date":"2026-04-07T13:29:07","date_gmt":"2026-04-07T20:29:07","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?post_type=msr-project&#038;p=1168054"},"modified":"2026-04-07T13:31:38","modified_gmt":"2026-04-07T20:31:38","slug":"provenance-for-trustworthy-digital-media","status":"publish","type":"msr-project","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/provenance-for-trustworthy-digital-media\/","title":{"rendered":"Provenance for Trustworthy Digital Media"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background- card-background--full-bleed\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"788\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance.jpg\" class=\"attachment-full size-full\" alt=\"Provenance graphic: three icons on a purple to orange gradient background\" style=\"\" srcset=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance.jpg 1400w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-300x169.jpg 300w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-1024x576.jpg 1024w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-768x432.jpg 768w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-1066x600.jpg 1066w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-655x368.jpg 655w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-240x135.jpg 240w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-640x360.jpg 640w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-960x540.jpg 960w, https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/03\/provenance-1280x720.jpg 1280w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/>\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 \">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 class=\"wp-block-heading\" id=\"provenance-for-trustworthy-digital-media\">Provenance for Trustworthy Digital Media<\/h1>\n\n\n\n<p>Cryptographically securing the authenticity of digital assets<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"provenance-for-trustworthy-digital-media-1\">Provenance for Trustworthy Digital Media<\/h2>\n\n\n\n<p>As generative AI accelerates the creation of realistic synthetic media (e.g., photos, videos, audio, documents), it is increasingly difficult for people and platforms to distinguish authentic content from fabricated or manipulated material. Provenance technologies aim to restore trust by enabling audiences and tools to answer practical questions like: <strong>Where did this come from? Has it been edited? Who vouches for it?<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/group\/msr-cryptography\/\">Microsoft Research Cryptography team<\/a> works on cryptographic and privacy-preserving provenance technologies to address these questions; continue reading to learn more about some of our recent and current projects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"standards-ecosystem-c2pa-and-content-credentials\">Standards & ecosystem: C2PA and content credentials<\/h3>\n\n\n\n<p>A central effort in the provenance ecosystem is the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/c2pa.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Coalition for Content Provenance and Authenticity (C2PA)<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, which develops open technical standards for certifying the source and history (provenance) of digital content.<\/p>\n\n\n\n<p>The C2PA was co-founded by Microsoft. Members of our team are still very much active in the coalition, shaping the future of the specifications and the provenance technologies it oversees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"project-origin\">Project Origin and the <em>IPTC Verified News Publishers List<\/em><\/h3>\n\n\n\n<p>MSR&#8217;s work on provenance for news and media started with <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/project\/project-origin\/\">Project Origin<\/a>, an initiative to build trust at the origin of digital media by creating accountability through provenance. The project has since branched off and migrated to two different organizations: the technical specification is now part of the C2PA, while the news media-specific items moved to the <strong>International Press Telecommunications Council (IPTC)<\/strong>.<\/p>\n\n\n\n<p>To make provenance actionable for journalism and publishing, ecosystem participants also need publisher identity mechanisms and trust lists. The IPTC continues the work started in Project Origin. Among other things, they created a C2PA-compatible <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/iptc.org\/verified-news-publishers-list\/\" target=\"_blank\" rel=\"noopener noreferrer\">list of verified news publishers<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and associated certificate materials to support verification workflows. Our cryptographers continue to support the IPTC with consultation and prototyping efforts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"research-privacy-for-c2pa-signers\">Research: Privacy for C2PA signers<\/h3>\n\n\n\n<p>Provenance can improve trust, but it can also raise privacy and safety concerns for creators, especially when a signer&#8217;s identity could expose them to retaliation, coercion, or unwanted tracking. We explore approaches that preserve verifiability of authenticity while protecting signer identity.<\/p>\n\n\n\n<p>This <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/christianpaquin.github.io\/2026-03-13-privacy-for-c2pa-signers.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> describes scenarios and techniques for <strong>signer privacy<\/strong> (ranging from pseudonymity to stronger anonymity goals), including discussion of how today&#8217;s C2PA signing model relies on X.509 certificates and how additional privacy-preserving approaches may be layered on top. We&#8217;ve also released an <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/github.com\/christianpaquin\/c2pa-signer-privacy\" target=\"_blank\" rel=\"noopener noreferrer\">open-source prototype<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> for the most privacy-protecting techniques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"media-integrity-and-authentication\">Media Integrity and Authentication: Status, Directions, and Futures<\/h3>\n\n\n\n<p>In February 2026, Microsoft published the <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/publication\/media-integrity-and-authentication-status-directions-and-futures\/\"><em>Media Integrity and Authentication: Status, Directions, and Futures<\/em><\/a> report, evaluating C2PA secure provenance, imperceptible watermarking, and soft-hash fingerprinting across images, audio, and video. The report introduces <em>High-Confidence Provenance Authentication<\/em> and <em>Sociotechnical Provenance Attacks<\/em> as key concepts, and outlines directions for strengthening media authentication. Members of our team co-authored the report; see the accompanying <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/blog\/media-authenticity-methods-in-practice-capabilities-limitations-and-directions\/\">blog post<\/a> and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/news.microsoft.com\/signal\/articles\/a-new-study-explores-how-ai-shapes-what-you-can-trust-online\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Signal article<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> for accessible summaries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"get-involved-contact\">Get involved \/ contact<\/h2>\n\n\n\n<p>If you&#8217;re working on provenance, media authenticity, publisher identity, or privacy-preserving verification, and want to collaborate with the <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/group\/msr-cryptography\/\">Microsoft Research Cryptography team<\/a>, please reach out.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Cryptographically securing the authenticity of digital assets As generative AI accelerates the creation of realistic synthetic media (e.g., photos, videos, audio, documents), it is increasingly difficult for people and platforms to distinguish authentic content from fabricated or manipulated material. Provenance technologies aim to restore trust by enabling audiences and tools to answer practical questions like: [&hellip;]<\/p>\n","protected":false},"featured_media":1167137,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-1168054","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[1162614],"related-downloads":[],"related-videos":[],"related-groups":[1107918],"related-events":[],"related-opportunities":[],"related-posts":[1162092],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Christian Paquin","user_id":31473,"people_section":"Section name 0","alias":"cpaquin"}],"msr_research_lab":[1161007],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1168054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":3,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1168054\/revisions"}],"predecessor-version":[{"id":1168059,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1168054\/revisions\/1168059"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media\/1167137"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1168054"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1168054"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1168054"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1168054"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=1168054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}