Media Authentication Glossary

Learn about deepfakes, cryptographic hashes, digital seals, AI detection, and more. Essential terms for understanding media authentication and content verification.

AI & Synthetic Media

AI-Generated Content
Digital content created entirely by artificial intelligence systems.
DALL-E
OpenAI's AI system that generates images from natural language descriptions.
Deep Learning
A subset of machine learning using multi-layered neural networks to learn complex patterns.
Deepfake
Synthetic media created using deep learning to replace a person's likeness in existing images or video.
Face Reenactment
AI technique that transfers facial expressions from one person to another in video.
Face Swap
A technique that replaces one person's face with another's in photos or videos.
GAN
Generative Adversarial Network — an AI architecture consisting of two neural networks that compete to generate realistic synthetic data.
Midjourney
An AI image generation service known for producing artistic and photorealistic images.
Neural Network
A computing system inspired by biological neural networks that learns patterns from data.
Stable Diffusion
An open-source AI model that generates images from text descriptions.
Synthetic Media
Any media content — image, video, audio, or text — generated or manipulated by AI.
Voice Cloning
AI technology that replicates a person's voice to generate synthetic speech.

Authentication

Content Authenticity
The verifiable property of digital content being genuine, unaltered, and traceable to its origin.
Digital Seal
A cryptographic certificate that binds media content to its creation metadata, proving authenticity.
Timestamp
A recorded date and time indicating when a digital event occurred or when data was created.

Compliance

Consent Management
The process of obtaining, recording, and managing user consent for data processing.
Data Sovereignty
The concept that data is subject to the laws of the country in which it is located.
GDPR
General Data Protection Regulation — the EU's comprehensive data privacy law.
HIPAA
Health Insurance Portability and Accountability Act — US law protecting medical information.
ISO 27001
An international standard for information security management systems.
Right to Be Forgotten
The right to have personal data deleted under certain circumstances.
SOC 2
A compliance framework for managing customer data based on five trust service criteria.

Cryptography

Checksum
A small-sized datum derived from a block of data for the purpose of detecting errors.
Cryptographic Hash
A fixed-size digital fingerprint produced by a hash function that uniquely identifies data.
Data Integrity
The assurance that data has not been altered or corrupted since its creation.
Digital Signature
A mathematical scheme for verifying the authenticity and integrity of digital messages or documents.
Encryption
The process of converting data into a coded format that can only be read with the correct key.
Hash Function
A mathematical function that maps data of arbitrary size to a fixed-size value.
Merkle Tree
A tree data structure where each leaf node contains a hash and each non-leaf node contains the hash of its children.
Non-Repudiation
The guarantee that the sender of a message cannot deny having sent it.
Public Key Cryptography
A cryptographic system using pairs of keys: public keys for encryption and private keys for decryption.
SHA-256
A cryptographic hash function that produces a 256-bit hash value, widely used for data integrity verification.
Tamper Detection
The ability to identify unauthorized modifications to data or systems.
Zero-Knowledge Proof
A method by which one party can prove to another that a statement is true without revealing additional information.

Digital Media

EXIF Data
Exchangeable Image File Format — metadata standard for photos containing camera settings, timestamp, and GPS data.
Metadata
Data about data — information embedded in files describing creation time, device, location, and other properties.

Education

Media Literacy
The ability to critically analyze and evaluate media content and its sources.

Image Processing

Perceptual Hash
A hash function that produces similar outputs for visually similar images, unlike cryptographic hashes.

Information Security

Disinformation
Deliberately false information spread with the intent to deceive and manipulate.
Misinformation
False or misleading information spread without deliberate intent to deceive.

Intelligence

OSINT
Open Source Intelligence — gathering and analyzing publicly available information.

Legal

Admissibility
The quality of evidence that makes it acceptable for consideration in legal proceedings.
Chain of Custody
The documented chronological history of handling evidence from creation to presentation.
Digital Evidence
Information stored or transmitted in digital form that has probative value in legal proceedings.
eDiscovery
The process of identifying, collecting, and producing electronically stored information for legal proceedings.

Media Forensics

Clone Detection
Identifying copy-paste regions within a single image.
Compression Artifact
Visual defects introduced by lossy compression of digital media.
Digital Watermark
An invisible or visible mark embedded in digital media for identification and tracking.
Error Level Analysis
A forensic technique that identifies areas of an image with different compression levels.
Image Fingerprint
A unique identifier derived from the visual content of an image.
JPEG Compression
A lossy compression standard for digital images that introduces characteristic artifacts.
Noise Analysis
Examining the noise patterns in an image to detect inconsistencies from manipulation.
Photo Forensics
The scientific analysis of photographs to determine their authenticity and history.
Splicing Detection
Identifying regions from different images that have been combined into one.
Steganography
The practice of hiding secret data within ordinary files like images.

Standards

C2PA
Coalition for Content Provenance and Authenticity — an open standard for certifying content origin.
Content Credentials
Metadata attached to content showing its origin, creation, and edit history.
Provenance
The documented history of origin and chain of custody of a digital asset.

Technology

API
Application Programming Interface — a set of protocols enabling different software applications to communicate.
JSON
JavaScript Object Notation — a lightweight data interchange format.
JWT
JSON Web Token — a compact token format for securely transmitting information between parties.
Latency
The time delay between a request and the corresponding response.
OAuth
An open standard for access delegation, commonly used for token-based authentication.
REST API
A web service architecture that uses HTTP methods to access and manipulate resources.
Rate Limiting
Controlling the number of requests a user can make to an API within a time period.
SDK
Software Development Kit — a collection of tools and libraries for building applications.
Scalability
The ability of a system to handle growing amounts of work or be enlarged to accommodate growth.
Webhook
An HTTP callback that sends real-time notifications when specific events occur.

Verification Tools

Fact-Checking
The process of verifying claims and information for accuracy.
Reverse Image Search
A technique to find the original source and other instances of an image online.