Overview
Pictures shape the perception of our world. The protection of content provenance and authenticity of digital images and movies is therefore increasingly important for our society. Recent initiatives like C2PA indicate the need to control and protect digital images and movies along their life-cycle.
FairPicture is a start-up from Lucerne and focus on people in southern hemisphere and sees itself as trusted safeguard to prevent digital pictures being used, altered against the will of the portrayed people, the creators, the distributors, and the consumers. The goal of this reseach project is to contribute to equal relationships between visual creators, portrayed people, clients, and the general public.
FairPicture aims at offering a global, digital platform for fair and safe photography by addressing the following types of problems:
- How can we make the images traceable even if the circulate on the internet? What are limitations on the traceability?
- How can metadata (description, location, context, etc.) in images be stored in a privacy preserving way? The problem is that images need context but disclosing the context can be potentially harmful for those portrayed on the picture.
- To what extend is it conceivable to withdraw consent form pictures?
The use-case is that people who have been photographed withdraw their informed consent for the images.
The protection of content provenance is increasingly important in our (mis-)information age. The C2PA initiative is a broad industry consortium with contents providers that addresses this topic. C2PA released a technical specification begin of 2022 detailing requirements for contents protection. Camera manufacturer Leica and Nikon joined C2PA in October and will bring cameras to market in 2023 that comply with theses specification.
In the light of fake-media, the JPEG standardization group is working to extend currents specification taking into account new trends in AI, fake-media, NFT and C2PA.
The goal is to map C2PA to the use-cases of FairPicture and to derive therefrom cyptographic protection mechanisms adequat to the problem at hand.