Media provenance + content credentials in one platform

How VeriSources Delivers Verifiable Media Provenance

VeriSources was built for newsrooms, multimedia publishers, broadcasters, agencies, investigators, insurers, and enterprise teams that need more than a watermark or a claim of authenticity. We tie visual assets to verified human sources, certificate records, C2PA metadata, public verification, and optional blockchain-backed proof.
Build a stronger chain of custody for images and videos in the age of AI-generated and easily manipulated media.

VeriSources certifies images and videos from verified human sources with public verification, certificate PDFs, and optional C2PA, blockchain, and AI screening.

Mobile quick view

Important VeriSources info

VeriSources helps prove where media came from by linking a certified image or video to a verified uploader, a certificate record, and a public verification page.

What it does Certifies images and videos, issues a PDF certificate with QR code, and lets anyone verify the certificate online.
Why it stands out
  • Verified human sources, not just anonymous uploads.
  • Public verification page plus certificate PDF for every certified asset.
  • Optional advanced proof layers such as C2PA, OpenTimestamps, AI screening, GPS, and pHash.
  • Verified uploader accounts with phone confirmation and admin approval.
  • Public verify page plus certificate PDF for each certified asset.
  • Mobile camera upload for phones, with no app required.
  • Optional C2PA metadata, Bitcoin proof, tamper-proof records, and AI screening on selected plans.
Core features
  • #
    SHA-256Hash fingerprint on every certified asset.
  • 🔗
    C2PAIndustry-standard provenance metadata embedding.
  • OTSBitcoin-anchored proof of existence via OpenTimestamps.
  • 🤖
    AIOptional image deception screening returned from a trusted cloud engine.
  • 🧬
    pHashPerceptual fingerprint enabling near-duplicate image discovery.
  • 📍
    GPSGPS coordinates sealed into every certificate when available.
  • 🏷
    IPTCEmbedded copyright, creator, and authorship metadata preserved in the record.
  • 🔑
    SteganographyCertificate code is hidden invisibly inside the pixel data.
For desktop visitors, the full About page still includes the detailed feature comparison, add-on explanations, and plan breakdown. On phones, this page is intentionally kept shorter and easier to read.
#️⃣ SHA-256 Hash fingerprint on every certified asset
🔗 C2PA Industry-standard provenance metadata embedding
₿ OTS Bitcoin-anchored proof of existence via OpenTimestamps
🤖 AI Optional image deception screening returned from a trusted cloud engine
🧬 pHash Perceptual fingerprint enabling near-duplicate image discovery
📍 GPS GPS coordinates sealed into every certificate (if available)
🏷️ IPTC Embedded copyright, creator, and authorship metadata preserved in the record
💧 Watermark Embedded watermark, Certificate Number, QR Code and Steganography (add on) included on every asset
VeriSources shield
Our mission

Visual truth now needs proof and intelligence

In an era of synthetic media and AI-generated imagery, the question is no longer just "does this look real?" — it is "can you prove it is real, and can you screen for deception?" VeriSources answers both with one auditable workflow.

We connect a verified human identity, a confirmed phone number, an administrator-approved account, a hash-locked file record, and optional cloud AI image analysis into a single trust record — publicly checkable by anyone with a certificate code.

On premium plans, C2PA manifests embed provenance directly into the image file, OpenTimestamps anchors each certificate hash to the Bitcoin blockchain, and the optional AI result is stored alongside the certificate record — creating a richer evidence layer for publishers, investigators, insurers, and enterprise teams.

Every certified image also receives a perceptual fingerprint (pHash) that enables near-duplicate discovery on the public verify page — so visually similar copies can be traced back to the original certificate even after re-encoding or minor cropping. EXIF GPS coordinates are automatically extracted and sealed into the certificate record when present, and any IPTC or XMP authorship metadata embedded by the photographer is preserved as part of the provenance chain.

What VeriSources provides

Every plan includes the core trust infrastructure. Optional add-ons layer additional proof and cloud intelligence on top.

Core platform
🔒

Identity-backed certificates

Every certificate is tied to a verified uploader account with confirmed phone ownership and manual admin approval — not just a file upload.

🧮

Dual hash fingerprinting

SHA-256 hashes of both the original and trusted derivative are recorded and locked at issuance. Any tampering is detectable via the public verify page.

📄

Certificate PDF export

Every certified asset produces a branded certificate PDF with QR code, certificate code, hash values, and uploader metadata — ready for publishing.

🤖

Cloud AI image detection

Optional AI screening sends supported images from the VeriSources backend to a trusted cloud engine and stores the returned probability score in the trust record for later review.

🖌

User-selectable watermark

Customers can choose to apply a VeriSources watermark on certified images and supported video outputs, adding a visible trust mark without changing the underlying registry proof.

📷

Trust banner with QR + asset ID

Certified outputs can include a branded banner showing a QR code and image or video ID number, making it easy for viewers to jump straight into public verification.

📹

Video certification

Video assets receive the same trust chain as images — uploader verification, hash locking, certificate issuance, and public verification by certificate code.

🌐

Public verification page

Anyone can verify a certificate by code without an account. The verification page shows the certificate details and supports file-hash comparison for the trusted file.

📱

Mobile camera upload

Upload directly from your smartphone camera on any plan — no app download needed. iOS and Android both supported via the mobile-optimised upload workflow.

📍

GPS location provenance

When a certified image contains GPS data, VeriSources automatically saves and seals the coordinates into the certificate record at issuance. Location presence is confirmed on the public verify page; exact coordinates are held privately.

🧬

Perceptual fingerprint (pHash)

Every certified image receives a DCT-based perceptual hash at upload time. This enables near-duplicate discovery on the public verify page — finding the original certificate even when an image has been JPEG re-compressed, resized, or slightly cropped. Only available in VeriSource.

🏷

IPTC / XMP authorship preservation

Embedded copyright notices, creator credits, titles, keywords, and source fields from metadata blocks are automatically saved from the original image and stored in the certificate manifest — preserving the photographer's authorship chain.

🔑

Steganography

The certificate code is hidden invisibly inside the pixel data of the image using a single bit per pixel, completely imperceptible to the human eye.

🔑

Developer API access

Platinum and above subscribers can generate API keys and submit images for certification programmatically via a REST endpoint — enabling CMS integrations, automated workflows, and bulk submissions without using the dashboard.

🌐

Public creator profile

Every verified creator gets a shareable public portfolio page showing their certified image thumbnails. Visitors can click any thumbnail to view the full image and verify its certificate — no login required.

📋

Activity log & audit trail

A paginated timeline showing every upload, certificate issuance, credit transaction, and account change for the logged-in user. Builds trust and gives creators a personal audit trail of their certification history.

Premium trust + intelligence add-ons

Available on selected paid plans. The proof layers below are rated by the strength of evidence they provide, while AI detection is presented separately as an advisory intelligence signal.

Premium features
★☆☆Good ★★☆Better ★★★Best Proof layers are rated by independence, permanence, and resistance to tampering. AI detection is a screening signal, not standalone proof.
🤖

Cloud AI Image Detection

Signal layer
★★★ Best+

This optional image add-on sends the uploaded image from the VeriSources Java backend to a trusted cloud AI engine, which returns a probability score indicating whether the image may be AI-generated or synthetically manipulated. The result is then stored and displayed as part of the trust record.

Used correctly, this gives organizations a second lens: VeriSources can both prove origin through identity, hashes, C2PA, and Bitcoin-backed evidence, and screen for deception using modern AI detection. That makes the platform especially compelling for media, legal, insurance, compliance, and investigative workflows.

🔧 How it is stored: The AI provider response is written into the certificate or asset manifest held in the VeriSources registry. The score can then be shown in admin review, customer dashboards, and public verification pages without changing the file itself.
🛡 Important: AI detection is advisory and probabilistic. It should not be used as the sole source of truth. In VeriSources, it is intentionally positioned as a deception signal that complements stronger proof layers such as verified identity, file hashing, C2PA provenance, and Bitcoin timestamp anchoring.
  • AI Image analysis
  • Probability score stored with asset record
  • Visible in review and verification workflows
  • Designed as an optional paid add-on
📋

C2PA Metadata Embedding

★☆☆ Good

The Coalition for Content Provenance and Authenticity (C2PA) is the open industry standard for provenance metadata, backed by Adobe, Microsoft, Intel, the BBC, and over 300 organisations. When enabled, VeriSources embeds a signed C2PA manifest directly into the trusted image file at certification time — meaning provenance data travels with the file.

Tools like Adobe Content Credentials, Microsoft's Content Integrity feature, and AI detection platforms can read the embedded proof without ever contacting VeriSources. This is the recognised standard for newsrooms and publishing workflows.

🔧 How it is embedded: An XMP metadata block is inserted to the image or video. This follows the PNG specification precisely and does not alter a single pixel. The c2pa: namespace fields declare the claim generator, manifest URL, and provenance assertion type so any C2PA-aware tool recognises it immediately.
⚠ Limitation: the metadata is embedded in the file — if someone re-saves or compresses the image through a platform that strips metadata (most social networks do), the C2PA block is lost from that copy. The proof remains in the VeriSources registry but no longer travels with the file.
  • C2PA 1.x manifest embedded in JPEG/PNG
  • Signed provenance assertion in XMP
  • Readable by Adobe, Microsoft & others
  • Proof travels with the certified file
  • AI-detection platform compatible
  • Newsroom-ready provenance signal

Tamper-Proof Timestamp, Location & Device Integrity

★★☆ Better

At the exact moment of certificate issuance, VeriSources records the precise timestamp, GPS coordinates (if the device permits), and a device integrity hash. These values are cryptographically signed and sealed into the certificate record using HMAC-SHA256 — they cannot be altered after issuance without detection.

This makes the when and where of an image independently auditable. Combined with the uploader's verified identity, this is the same kind of chain-of-custody evidence used in professional photojournalism and legal documentation workflows.

🔧 How it is embedded: The sealed record is stored as a JSON object inside the certificate's manifest held in the VeriSources database — not inside the image file itself. A canonical signing payload is built from the certificate code, issuance timestamp, both SHA-256 hashes, and the upload IP address.
✔ Advantage over C2PA: because the proof lives in the VeriSources registry rather than the file, it cannot be stripped by re-saving or sharing the image. As long as the certificate record exists the timestamp is auditable — no matter how many times the image is copied or re-encoded.
  • Cryptographically signed timestamp
  • GPS coordinates sealed at upload
  • Device integrity hash included
  • Tamper-evident after issuance
  • Chain-of-custody ready
  • Legal documentation compatible

OpenTimestamps Bitcoin Proof

★★★ Best

When this add-on is active, every certificate issuance submits the certified file's SHA-256 hash to the OpenTimestamps public calendar. The hash is aggregated into a Merkle tree alongside thousands of other hashes and anchored to the Bitcoin blockchain in a single transaction — creating a permanent, tamper-evident proof that this exact hash existed at this exact time.

OpenTimestamps is an open standard created by Bitcoin core contributor Peter Todd, used by major institutions including IETF and academic publishers. It requires zero fees, zero accounts, and zero credentials. The proof survives independently of VeriSources — it is anchored in the most widely audited public ledger on earth.

🔧 How it is embedded: At issuance the file's SHA-256 hash (32 bytes) is created. It is downloadable as a .ots file directly from the public verify page and verifiable offline using ots verify or by uploading it to opentimestamps.org. No VeriSources account or server is needed for verification — only the Bitcoin blockchain, which is publicly accessible worldwide.
★ Why it is best: the proof is stored outside VeriSources, outside any central authority, on the Bitcoin blockchain which no single entity controls. It cannot be deleted, altered, or revoked. A court, auditor, or journalist can verify it independently using only the .ots file and the Bitcoin blockchain — no login, no trust in VeriSources required. Bitcoin confirmation takes ~10 - 20 minutes after issuance; the receipt is valid immediately.
  • Bitcoin-anchored, permanently verifiable
  • Receipt stored & downloadable from verify page
  • Verify at opentimestamps.org or via CLI
  • Open standard, not vendor-locked
📱

Mobile Camera Certification — No App Required

VeriSources is a mobile-first web platform. The upload workflow uses standard browser file capture APIs to open the device's native camera directly — no third-party app, no QR code scanner, no extra download needed. Works on iOS Safari and Android Chrome out of the box.

When combined with the Timestamp & Location add-on, images captured directly through the browser workflow carry the GPS coordinates and capture time from the device — creating an unbroken chain from the physical moment of capture to the issued certificate.

  • Works on iOS Safari & Android Chrome
  • No app download required to mobile phone
  • Native camera API integration
  • GPS & timestamp captured at shoot
  • Pairs with Timestamp add-on for full proof
  • Secure upload over HTTPS
🔍

Deep Provenance Layer — GPS, pHash & IPTC/XMP

Core — all plans

Three additional provenance signals are automatically extracted from every certified image at issuance time, requiring no action from the photographer or registered user. Together they create a richer, more searchable evidence layer that goes beyond hashes and watermarks.

📍 GPS Location When an image contains GPS data in its headers — as most smartphone photos do — VeriSources seals them into the certificate manifest at issuance. The public verify page confirms that GPS data was recorded without exposing coordinates, protecting the holder's privacy.
🧬 Perceptual Hash (pHash) A 64-bit DCT-based perceptual fingerprint and stored with the certificate. Unlike SHA-256, which can change completely, pHash measures visual similarity. This powers the near-duplicate search on the public verify page: a journalist who receives a re-encoded or slightly cropped version of a certified image can upload it and find the original certificate — even when the SHA-256 no longer matches.
🏷 IPTC / XMP Authorship Metadata Embeds copyright notices, creator credits, titles, keywords, and source fields from image files using the standard. VeriSources reads the formats and stores all found fields in the certificate manifest. This means the photographer's original copyright and credit metadata is preserved in the trust record even if the image is later stripped of metadata when published. It is displayed on the public verify page and printed on the certificate.
🔑 Invisible Steganography Watermark An optional premium add-on available on selected plans. When enabled by the user at upload time, the certificate code is hidden invisibly inside the pixel data of the certified PNG image using LSB, completely imperceptible to the human eye. If the image is later re-saved, re-encoded, or lightly edited, the standard SHA-256 hash will no longer match, but the public verify page will attempt to recover the hidden code from the pixel data. If successful, it confirms the image originates from a certified source and makes clear that the file was modified after certification.
  • GPS extracted image if available
  • Near-duplicate search powered by Hamming distance
  • IPTC IIM record 2 and XMP APP1
  • Steganography on PNG outputs (optional, user opt-in, plan-specific)

Certify from your phone in four steps

No app needed. Open VeriSources in any modern mobile browser and certify images directly from your camera, with optional AI image screening when your plan includes it.

📱 Mobile
1
📲

Open on mobile

Navigate to VeriSources in Safari or Chrome on your phone. No app download required.

2
📸

Tap “Take photo”

The upload page opens your native camera. Capture the image you want to certify.

3
📤

Submit for certification

Your image is uploaded securely. GPS, timestamp, device data, and optional AI screening are triggered when your plan includes those add-ons.

4

Certificate issued

After admin review, your certificate is issued. Download the PDF or share the public verification link with the recorded trust and AI results.

How VeriSources compares

A feature-by-feature look at VeriSources versus typical image provenance and watermarking platforms, now including GPS provenance, perceptual near-duplicate search, IPTC/XMP authorship preservation, and optional cloud AI image detection.

Comparison
Feature ✓ VeriSources Watermark platforms Certificate-only tools
Human identity verification Phone OTP + admin approval Email only Email only
Dual SHA-256 file hashing Original + trusted hash Not offered Single hash only
Public certificate verification No account needed Not offered Varies
OpenTimestamps Bitcoin proof Premium add-on Not offered Not offered
C2PA metadata embedding Premium add-on Select tools only Not offered
Tamper-proof timestamp + GPS Premium add-on Not offered Not offered
AI image detection Premium add-on Not offered Not offered
Mobile camera capture (no app) All plans App required Desktop only
Image/Video asset certification All plans Select plans Images only
Certificate PDF with QR code All plans Not offered Select plans
Invisible / visible watermarking Trusted derivative Core feature Not offered
Admin workflow & approval queue Built-in Not offered Not offered
GPS location saved (If available) All Plans Not offered Not offered
Near-duplicate image search (pHash) All Plans Not offered Not offered
IPTC / XMP authorship metadata preserved All Plans Not offered Not offered
Invisible steganography watermark Premium add-on Not offered Not offered
Developer API access Premium add-on Not offered Select plans
Public creator profile All Plans Not offered Not offered
= Fully supported    = Partially / on some plans    = Not available. Competitor data based on publicly available feature documentation.

Plans & add-ons

Start free. Upgrade to unlock cloud AI image detection, blockchain proof, C2PA embedding, and tamper-proof timestamping. All plans include mobile camera upload.

Pricing
Starter
Free

Try the platform with demo certificates. Great for evaluation and testing the trust workflow.


  • Up to 3 image credits
  • Demo / watermark certificates
  • Mobile camera upload
  • Public verify page
  • OpenTimestamps Bitcoin proof
  • C2PA metadata embedding
  • Tamper-proof timestamp
  • Cloud AI image detection
Enterprise
Customized / plan

Full trust and intelligence stack with blockchain proof, C2PA, signed tamper-proof evidence, and optional AI image detection for enterprise use.


  • Unlimited credits (configurable)
  • Full certificate stack
  • Video + image certification
  • Mobile camera upload
  • OTS Bitcoin proof Add-on
  • C2PA embedding Add-on
  • Tamper-proof timestamp Add-on
  • Cloud AI image detection Add-on
Plans and pricing are configured by the VeriSources administrator. Use the contact page or create a free account to get started.
VeriSources shield

Start building verifiable trust today

Create a free account, certify your first image, and see the public verification page. Upgrade when you need cloud AI image detection, blockchain proof, or C2PA provenance.