Skip to content

Commit 34c1ebd

Browse files
authored
Merge pull request #92 from arm-university/matt-working
c2pa updates
2 parents f2ef7dd + 381b3e0 commit 34c1ebd

File tree

3 files changed

+139
-98
lines changed

3 files changed

+139
-98
lines changed

Projects/Projects/Video-&-Audio-Provenance-In-The-Age-of-AI.md

Lines changed: 39 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Video & Audio Provenance on Arm in the Age of AI"
3-
description: "Integrating transparent provenance - disclosing whether media is AI-generated or AI-edited, and also what other AI processing has occurred on any media - is necessary for accountability in domains like journalism, security, and regulated industries. This project uses C2PA 2.3 to record such actions as signed, machine-verifiable assertions attached to the asset. This reduces deepfake proliferation and fraud by providing a method to verify provenance. Additionally it tracks authorised and potential unauthorised use of models to analyse the asset."
3+
description: "Integrating transparent provenance - disclosing whether media is AI-generated or AI-edited, and what other AI processing has occurred on any media - is fundamental for accountability in domains like journalism, security, and regulated industries. This project uses C2PA specification (www.c2pa.org) revision 2.3 to record such actions as signed, machine-verifiable assertions attached to the asset. This reduces deepfake proliferation and fraud by providing a method to verify provenance. Additionally, it tracks authorized and potential unauthorized use of models to analyze the asset, by means of Model Provenance."
44
subjects:
55
- "ML"
66
- "Security"
@@ -18,67 +18,72 @@ support-level:
1818
publication-date: 2026-02-06
1919
license:
2020
status:
21-
- "Hidden"
21+
- "Published"
2222
badges:
2323
- trending
2424
- recently_added
2525
donation:
2626
---
2727

28+
## Description
2829

29-
## Description
30+
### Why is this important?
3031

31-
### Why is this important?
32+
Generative AI has created a trust gap:
33+
- Images, videos, and audio may be AI-generated or heavily manipulated
34+
- this can lead to deepfakes, and fraud.
35+
- This AI-enhancement or editing can occur in real-time - i.e. a person can live stream themselves but use ML to change their appearance and voice.
36+
- Moreover, the use of AI models to scan images, video, and audio (e.g. facial or voice recognition) is often opaque, with no actual changes to the underlying data.
37+
- Viewers rarely know whether AI analysis was performed, or what conclusion was reached. Such seamless content transformation, does not require much specialized skills and hence within the reach of common masses.
3238

33-
Generative AI has created a trust gap:
34-
- Images, videos, and audio may be AI-generated or heavily manipulated - this can lead to deepfakes, and fraud.
35-
- This AI-enhancement or editing can occur in real-time - i.e. a person can livestream themeself, but use ML to change their appearance and voice.
36-
- Moreover, the use of AI models to scan images, video, and audio (e.g. facial or voice recognition) is often opaque, with no actual changes to the underlying data.
37-
- Viewers rarely know whether AI analysis was performed, or what conclusion was reached.
38-
39-
Integrating transparent provenance - disclosing whether media is AI-generated or AI-edited, and also what other AI processing has occurred on any media - is necessary for accountability in domains like journalism, security, and regulated industries. This project uses C2PA 2.3 to record such actions as signed, machine-verifiable assertions attached to the asset. This reduces deepfake proliferation and fraud by providing a method to verify provenance. Additionally it tracks authorised and potential unauthorised use of models to analyse the asset.
39+
Integrating transparent provenance - disclosing whether media is AI-generated or AI-edited, and what other AI processing has occurred on any media - is fundamental for accountability in domains like journalism, security, and regulated industries. This project uses C2PA specification (www.c2pa.org) revision 2.3 to record such actions as signed, machine-verifiable assertions attached to the asset. This reduces deepfake proliferation and fraud by providing a method to verify provenance. Additionally, it tracks authorized and potential unauthorized use of models to analyze the asset, by means of Model Provenance.
4040

4141
[Arm is a founder member of the C2PA Standards Group.](https://newsroom.arm.com/blog/c2pa-fights-disinformation) The Coalition for Content Provenance and Authenticity (C2PA) specification lets creators and platforms attach cryptographically signed metadata to content like:
4242
- images 📷
4343
- videos 🎥
4444
- audio 🎧
4545
- documents 📄
4646

47-
That metadata can include:
48-
- who created it
49-
- what tool was used (camera, Photoshop, generative AI, etc.)
50-
- what edits were made and when
51-
- whether AI was involved
47+
The metadata can include:
48+
- who created it
49+
- what tool was used (camera, Photoshop, generative AI, etc.)
50+
- what edits were made and when
51+
- whether AI was involved
5252

53-
Anyone can later verify this info to see if the content is authentic or has been tampered with.
53+
Anyone can later verify this info to see if the content is authentic or has been tampered with.
5454

55-
The best place to start would be with processing on static audio or video files, but we encourage you to ultimately target a streamed data format - i.e. streamed audio or video, and to perform the inference and record the actions in real-time.
55+
The best place to start would be with processing on static audio or video files, but we encourage you to ultimately target a streamed data format - i.e. streamed audio or video, and to perform the inference and record the actions in real-time, via attaching provenance information on the streaming content.
5656

57-
You should leverage an Arm-powered device, such as a Windows-on-Arm laptop, Apple Silicon MacBook, Arm-powered mobile phone, or Raspberry Pi.
57+
You should leverage an Arm-powered device, such as a Windows-on-Arm laptop, Apple Silicon MacBook, Arm-powered mobile phone, or Raspberry Pi.
5858

59+
### Project Summary
5960

60-
### Project Summary
61+
Build and evaluate a comprehensive AI-augmented audio/video capture and provenance system on an Arm-powered device (e.g. Windows-on-Arm laptop)
62+
- captures streamed media with a camera or microphone,
63+
- runs AI models on-device (i.e. face/object/keyword/sentiment detection, upscaling/filters/enhancements),
64+
- generates C2PA Content Credentials that transparently disclose:
65+
1. which models were run,
66+
2. their effect/impact on the image or video
6167

62-
Build and evaluate a comprehensive AI-augmented audio/video capture and provenance system on an Arm-powered device (e.g. Windows-on-Arm laptop)
63-
- captures streamed media with a camera or microphone,
64-
- runs AI models on-device (i.e. face/object/keyword/sentiment detection, upscaling/filters/enhancements),
65-
- generates C2PA Content Credentials that transparently disclose:
66-
1. which models were run,
67-
2. their effect/impact on the image or video
68+
and demonstrates how this provenance enables trust and auditability in real-world use cases such as content integrity validation and responsible media pipelines.
6869

69-
and demonstrates how this provenance enables trust and auditability in real-world use cases such as content integrity validation and responsible media pipelines.
70+
You should be able to show your source code, along with documentation/instructions/comments, a short demo video or images to show the project in action, and a short document describing your decisions and how you implemented the project.
7071

71-
You should be able to show your source code, along with documentation/instructions/comments, a short demo video or images to show the project in action, and a short document describing your decisions and how you implemented the project.
72+
## What will you use?
7273

74+
You should be willing to learn about, or already familiar with:
75+
- Programming and building a basic application on your chosen platform/OS
76+
- C2PA and the concepts behind content provenance and authentication
77+
- Deploying optimized inference models on Arm-powered CPU via frameworks with KleidiAI integration (e.g. PyTorch).
7378

74-
## What will you use?
75-
You should be willing to learn about, or already familiar with:
76-
- Programming and building a basic application on your chosen platform/OS
77-
- C2PA and the concepts behind content provenance and authentication
78-
- Deploying optimised inference models on Arm-powered CPU via frameworks with KleidiAI integration (e.g. PyTorch)
79+
80+
## A few helpful links to relevant items:
81+
- [Live Video Streaming](https://spec.c2pa.org/specifications/specifications/2.3/specs/C2PA_Specification.html#live-video)
82+
- [C2PA](https://github.com/contentauth/c2pa-rs)
83+
- [C-Wrapper for Rust Library](https://gitlab.com/guardianproject/proofmode/simple-c2pa)
7984

8085

81-
## Resources from Arm and our partners
86+
## Other potentially useful resources from Arm and our partners
8287
- Repository: [AI on Arm course](https://github.com/arm-university/AI-on-Arm)
8388
- Arm / Cambridge University edX course: [AI at the Edge on Arm (Mobile)](https://www.edx.org/learn/computer-science/arm-education-ai-at-the-edge-on-arm)
8489
- Learning Path: [Vision LLM Inference on Android with KleidiAI](https://learn.arm.com/learning-paths/mobile-graphics-and-gaming/vision-llm-inference-on-android-with-kleidiai-and-mnn/)

docs/_data/navigation.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,30 @@ projects:
4545
- Arm Ambassador Support
4646
status:
4747
- Published
48+
- title: Video-&-Audio-Provenance-In-The-Age-of-AI
49+
description: Integrating transparent provenance - disclosing whether media is
50+
AI-generated or AI-edited, and what other AI processing has occurred on any
51+
media - is fundamental for accountability in domains like journalism, security,
52+
and regulated industries. This project uses C2PA specification (www.c2pa.org)
53+
revision 2.3 to record such actions as signed, machine-verifiable assertions
54+
attached to the asset. This reduces deepfake proliferation and fraud by providing
55+
a method to verify provenance. Additionally, it tracks authorized and potential
56+
unauthorized use of models to analyze the asset, by means of Model Provenance.
57+
url: /2026/02/06/Video-&-Audio-Provenance-In-The-Age-of-AI.html
58+
subjects:
59+
- ML
60+
- Security
61+
- Edge AI
62+
platform:
63+
- AI
64+
- Laptops and Desktops
65+
sw-hw:
66+
- Software
67+
support-level:
68+
- Self-Service
69+
- Arm Ambassador Support
70+
status:
71+
- Published
4872
- title: AI-Agents
4973
description: "This self-service project builds a sandboxed AI agent on Arm hardware\
5074
\ that harnesses appropriately sized LLMs to safely automate complex workflows\u2014\

0 commit comments

Comments
 (0)