BlueCheck Protocol

BlueCheck Protocol

Bluecheck verifies the pics & vids authenticity with AA and steganography.

The problem BlueCheck Protocol solves

The BlueCheck Protocol introduces a groundbreaking service that allows all users to easily take, upload, store, and verify photos. Utilizing advanced steganography and algorithms (AA), this protocol embeds verifiable information into user photos in a secure manner. Users can prove the authenticity and unaltered status of their photos, while blockchain technology ensures that all verification processes are transparent and immutable. The BlueCheck Protocol aims to elevate trust in the digital realm, all while protecting individual privacy.

  • Prevent fake photos
  • No fake identification
  • NFT receipt for each upload / download
  • Make scalable zk-based tx layer (private txs)

Challenges we ran into

To create a verifiable photo, steganography is used to store an indexer in the pixels, and the entire photo is converted into a hash value. This index and hash value are then mapped and stored, and later, this mapping is used to compare the hash value with the index of the photo that is requested for verification. Additionally, to ensure that users without a wallet can also have a seamless experience, social login automatically creates an Account Abstraction (AA) for them. To create AA, the stackup solution provided by Alchemy is used, and a basic structure has been built on the Mumbai testnet, with the indexer being stored in the photo pixels using steganography. During this indexer-hash value mapping process, the structure is designed to allow encryption of the intended hidden information within the metadata.

Tracks Applied (6)

Astar zkEVM

Could use Astar zkevm layer 2 as a zk evm layer 2

Astar Foundation

Launchpad Bounty

Could use near evm compatible layer as a zk evm layer 2

NEAR Protocol

Mina Protocol

Could use minaeth zkapp instead of zk evm layer 2

Mina Protocol

Fhenix - Build Dapps on ETH L2 using FHE

Could use fhenix as a zk evm layer 2

Fhenix

Best Use Case of Neon EVM

Could use neonevm as a zk evm layer 2

Neon 🧬

Injective inEVM Bounty Program

Could use inevm as a zk evm layer 2

Injective Labs

Discussion