Computing devices often include media capture devices, such as cameras, video recorders, and/or microphones. Advances in computing, particularly in artificial intelligence (AI), are enabling computing devices to modify or alter media (e.g., images, video, or audio), or even create such media (also called deepfakes), such that it may be difficult to determine whether the media is authentic or legitimate. As described herein, when capturing media, a switch built into the software media-capture operating system enables a computing device to selectively generate a unique fingerprint for the media, for example, by means of a hash function, a checksum, or other function. Alternatively, with user consent, the computing device may automatically generate a unique fingerprint for the media. The computing device may store the fingerprint within a distributed ledger or blockchain managed by a computing network, which may also be referred to as a consensus network. If another computing device later seeks to authenticate the media, the computing device generates a new fingerprint for the media and compares the new fingerprint to the fingerprint stored within the distributed ledger. The computing device determines a media file is genuine or legitimate when the new fingerprint matches the fingerprint stored within the distributed ledger. The computing device determines that a media file is inauthentic, illegitimate, or fake when the new fingerprint does not match the fingerprint stored within the distributed ledger.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Sweet, Logan, "MEDIA AUTHENTICATION VIA BLOCKCHAIN", Technical Disclosure Commons, (August 26, 2019)