Skip to content

Commit 83f1bd2

Browse files
committed
Edits suggested by Cursor
1 parent b3bcf6c commit 83f1bd2

File tree

1 file changed

+15
-13
lines changed

1 file changed

+15
-13
lines changed

docs/faqs.mdx

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,34 +10,36 @@ import TOCInline from '@theme/TOCInline';
1010

1111
### Are Content Credentials alone sufficient to prevent the spread of misinformation?
1212

13-
The most effective approach to content provenance is a combination of technologies and practices, including Content Credentials' secure metadata, undetectable watermarks, and content fingerprinting. Using these three technologies together in concert can make content provenance more robust than using just one.
13+
Content provenance is most effective when combining three key technologies:
1414

15-
This "three-pronged" approach includes using:
15+
1. Content Credentials (secure metadata)
16+
2. Undetectable watermarks
17+
3. Content fingerprinting
1618

17-
- **Secure metadata** (Content Credentials): Verifiable information about how content was made that cannot be altered without leaving evidence of alteration. This metadata can indicate the provenance of a digital media asset and indicate how it was created. The CAI open-source SDK enables applications to create and securely attach this metadata to assets and display it to end-users.
19+
Each technology serves a distinct purpose:
1820

19-
- **Watermarking**: Hidden information undetectable by humans but that can be decoded using a specialized watermark detector. State-of-the-art watermarks can be impervious to alterations such as cropping or rotating or the addition of noise to video and audio. Importantly, a watermark can survive rebroadcasting efforts like screen-shotting, pictures of pictures, or re-recording of media, which can remove secure metadata.
21+
- **Content Credentials**: Provides verifiable, tamper-evident metadata about how content was created and modified
22+
- **Watermarking**: Embeds invisible information that survives content modifications like cropping, rotation, or screen capture
23+
- **Fingerprinting**: Creates unique content identifiers based on the media itself, enabling matching against databases without requiring embedded data
2024

21-
- **Fingerprinting**: A way to create a unique code based on pixels, frames, or audio waveforms that can be computed and matched against other instances of the same content, even if there has been some alteration. The fingerprint can be stored separately from the content, re-computed on the fly, and matched against a database of Content Credentials and associated stored fingerprints. This technique does not require embedding of information in the media itself and is immune to information removal because there is no information to remove.
25+
Using these technologies together creates a more robust content provenance system than any single approach alone.
2226

23-
Combining these three approaches provides a unified solution that is robust and secure enough to ensure reliable provenance information.
24-
25-
For more information, see the blog post from April 8, 2024, [Durable Content Credentials](https://contentauthenticity.org/blog/durable-content-credentials).
27+
For more details, see [Durable Content Credentials](https://contentauthenticity.org/blog/durable-content-credentials) (April 8, 2024).
2628

2729
### Are Content Credentials a blockchain system?
2830

29-
While Content Credentials are compatible with blockchain, they do not require or use blockchain directly.
31+
No. While Content Credentials can work with blockchain systems, they don't require or directly use blockchain technology.
3032

31-
Examples:
33+
Notable implementations using blockchain:
3234

33-
- [Starling Lab case study](https://www.starlinglab.org/78days/) that uses blockchain for distributed storage.
34-
- [Numbers Protocol](https://www.numbersprotocol.io/) is also using blockchain to store Content Credentials; See [Numbers Blockchain](https://docs.numbersprotocol.io/developers/numbers-blockchain).
35+
- [Starling Lab](https://www.starlinglab.org/78days/) - Uses blockchain for distributed storage
36+
- [Numbers Protocol](https://www.numbersprotocol.io/) - Stores Content Credentials on their [Numbers Blockchain](https://docs.numbersprotocol.io/developers/numbers-blockchain)
3537

3638
### Are Content Credentials about digital rights management?
3739

3840
No; Content Credentials do not enforce permissions for access to content. In many cases, the name displayed on the [Verify website](https://contentcredentials.org/verify) is the name of the exporter of the content, not the rights owner.
3941

40-
The [Produced by section](verify.mdx#produced-by) in Verify refers to the name of the exporter. If the image was created with an Adobe Product such as Photoshop with Content Credentials (Beta) enabled, the Produced by section shows the name of the Adobe ID associated with the user who exported the image.
42+
The ["Produced by" section](verify.mdx#produced-by) in Verify refers to the name of the exporter. If the image was created with an Adobe Product such as Photoshop with Content Credentials (Beta) enabled, the "Produced by" section shows the name of the Adobe ID associated with the user who exported the image.
4143

4244
### Do Content Credentials indicate if an image is fake or altered?
4345

0 commit comments

Comments
 (0)