Content Authentication / Provenance
Information IntegrityactiveC2PA, watermarking, and other cryptographic methods for verifying content origin.
Risks Addressed
2
Cluster: Information Integrity
Tags
function:assurancescope:field
C2PA, watermarking, and other cryptographic methods for verifying content origin.