Pixel Police

Pixel Police

A protocol that enables organisations to verify that digital content(image or video) is not GenAI/ Deepfake

The problem Pixel Police solves

How Our Protocol Revolutionizes Digital Content Verification
In today's digital age, distinguishing authentic images from those generated by AI, especially in sensitive areas like news and social media, is increasingly challenging. Our protocol addresses this crucial need by offering a reliable solution for verifying and tracing the origin of digital content.

Key Benefits and Features:
Combatting AI-Generated Content in Media: Our protocol is a game-changer for news organizations and social media platforms. With the proliferation of sophisticated AI technologies capable of creating realistic images, these organizations often struggle to verify the authenticity of received content. Our solution ensures that only legitimate, unaltered images are circulated, upholding the integrity of information.

Empowering Citizen Journalism: We are not just creating a protocol; we are fostering a community of citizen journalists. By providing an app that integrates with our protocol, individuals can capture and share images confidently, knowing their authenticity will be preserved and verifiable.

Secure Image Authentication and History Tracking: When a user captures an image through our app, it is immediately signed with a private key on the device and attested on our rollup. Any subsequent edits are also recorded and attested. This process creates a transparent and traceable history for each image, enabling anyone to verify its authenticity and trace its origin.

Alignment with Emerging Industry Standards: Our work is in line with the Work-in-Progress (WIP) standard C2PA (Content Authenticity and Provenance), which is being adopted by industry giants like Adobe and Microsoft. This alignment not only validates our approach but also ensures compatibility and standardization across platforms.

Challenges we ran into

Navigating the RISC-0 EVM Environment:
One of the most significant challenges was adapting to the RISC-0 EVM, a constrained environment that made implementing arbitrary computation code particularly difficult. This required us to think creatively and develop tailored solutions that could operate efficiently within these limitations.

Custom Image Processing Algorithms:
To address this, we developed our own image processing computations that are compatible with the RISC-0 EVM environment. Crafting these algorithms from scratch was a complex task, but it was crucial for ensuring our protocol could handle the intricate task of image verification and attestation.

Managing Digital Content and Metadata:
Handling Vast Amounts of Data: A major part of our work involved dealing with extensive digital content, especially images and their metadata. This was necessary to build a solution compliant with the C2PA standard. Managing this large amount of data required sophisticated data processing and storage solutions.

Building a Custom Rollup:
Developing a Unique Rollup: Perhaps the most ambitious part of our project was writing our own rollup. This involved creating a custom state machine with unique state transitions specifically designed to incorporate provable changes in digital content. The development of this rollup was critical in enabling our protocol to effectively trace and verify the history of an image or video.

Tracks Applied (10)

Arbitrum Track

We used arbitrum chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts which ca...Read More

Arbitrum

Polygon Track

We used ppolygon zkevm chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts wh...Read More

Polygon

Filecoin Track

Since we are managing attestations for digital content and storing all the media content onchain in a state which would ...Read More

Filecoin

Celo Track

We used celo as an settlement layer for our rollup. For that we deployed our proof verifier contracts which can run in e...Read More

Celo

Base Track

We used base goerli chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts which...Read More

Base

Alliance Track

This idea holds the potential to enable the standard for C2PA, hence this can serve as a infra layer for major web2 comp...Read More

Alliance

Mantle Network Track

We used mantle testnet chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts wh...Read More

Mantle Network

Lighthouse.storage Track

We leveraged lighthouse sdk for storing data over IPFS to avoid state bloating as storing all the digital media content ...Read More

lighthouse

OKX Track

We used OKX testnet chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts which...Read More

OKX

Scroll Track

We used scroll sepolia chain as an settlement layer for our rollup. For that we deployed our proof verifier contracts wh...Read More

Scroll

Discussion