Cryptographic Proof of Authenticity

Trust What
You See.

The world's first verification-first camera. Every image captured with ColiCam carries a cryptographic proof of its origin and is permanently registered onchain.

Capture → Proof → Register → Verify

The Problem

Digital images can no longer be trusted.

Three fundamental failures have made visual truth unreliable at scale. The consequences compound daily.

Cubist illustration of people confused by manipulated images
01
SYNTHETIC

AI-Generated Content

Generative AI can produce photorealistic images of events that never occurred, people who do not exist, and places that were never visited.

02
ALTERED

Image Manipulation

Post-processing tools make it trivial to alter context, remove subjects, or fabricate evidence. Detection is unreliable. Trust is broken.

03
UNVERIFIED

Missing Provenance

Most images carry no verifiable origin. Metadata is easily stripped or forged. There is no standard mechanism to prove when, where, or who.

90%of people cannot distinguish AI images from real ones
increase in synthetic media detections since 2022
0universal standards exist for image authenticity today
Cubist illustration of photographs transforming into cryptographic fingerprints

The Solution

Verification embedded at capture.

ColiCam makes authenticity a property of the image itself — not a downstream check that can be bypassed.

01

Capture

Open ColiCam and take a photo. At the hardware level, device attestation data is bound to the image at the moment of capture.

02

Proof

A cryptographic hash of the raw image data, combined with device identity, timestamp, and GPS coordinates, is computed on-device.

03

Register

The proof is submitted to a decentralized registry. The resulting onchain record is immutable, timestamped, and publicly queryable.

04

Verify

Anyone can independently verify any image against the onchain registry. No servers, no intermediaries, no trust required.

Features

Built for infrastructure, not just convenience.

Every design decision in ColiCam prioritizes verifiability, privacy, and long-term trust.

CAPTURE_SPEED

Fast Native Camera

Zero shutter lag. ColiCam uses the full native camera pipeline — no quality compromises, no processing delays.

REGISTRY

Onchain Registration

Every image proof is permanently anchored to a public, immutable ledger within seconds of capture.

TRUSTLESS

Independent Verification

Any third party can verify any ColiCam image without contacting our servers or trusting our infrastructure.

PRIVATE

Privacy-First Architecture

Images never leave your device unless you explicitly share them. Only the cryptographic proof is registered onchain.

HARDWARE

Hardware Attestation

Device-level keys bound to each proof ensure the image was taken by a real device, not synthesized.

OPEN

Open Verification Protocol

Our proof format is an open standard. Any developer can build independent verification tooling on top.

How It Works

Four steps from capture to verified truth.

Step 01

Open the camera

Launch ColiCam. The interface is minimal by design: frame your shot and capture. No settings to configure for verification — it is always on.

Native iOS & Android camera pipeline

Trust Model

Trustless by design.

ColiCam is not asking you to trust us. We have built a system where trust is unnecessary because verification is independent.

01

No server trust required

ColiCam's verification is mathematically grounded. Checking an image's authenticity doesn't require you to trust our servers, our company, or our continued operation. The onchain record speaks for itself.

02

Hashes, metadata & ISIX

The proof combines a Media Hash (SHA-256 over the raw pixels) and a Metadata Hash over capture data — together they bind exact image bytes and context. ISIX adds an Image Similarity Index — it can still recognize the capture after rescaling, re-encoding, or light edits, so verification is not limited to bit-identical files. Watermarks and loose metadata alone cannot offer that pairing of strict integrity and robust identity.

03

Device attestation

Each proof is signed by a hardware-backed key unique to the capture device. This ties the image to a real physical device, preventing server-side fabrication of proofs.

Verification chain

From capture to registry — then verify from anywhere.

When a photo is taken, fingerprints are computed immediately — Media Hash (pixels), Metadata Hash (capture context), and ISIX (perceptual similarity). That bundle is written to a blockchain registry. Later, anyone can drop an image into verification and see whether it matches a registered proof — without trusting a central server.

Capture

The image is created on the device.

Fingerprint

Media Hash, Metadata Hash, and ISIX are derived in one pass.

Media HashMetadata HashISIX

Registry

The proof is recorded on-chain in the ColiCam registry.

Verify

Compare any file against the registry to confirm or refute a match.

Powered by Colibri

Verified data. No trusted middleman.

ColiCam registers every proof onchain — but how do you know the chain data you read back is real? That is where Colibri comes in — a stateless, fully verifying light client that validates blockchain state with cryptographic proofs, directly on your device.

Colibri — stateless verifying client illustration from corpus.core

Trustless by default

Every blockchain read is backed by cryptographic proofs. ColiCam never relies on a remote RPC provider to tell the truth — it verifies locally.

Local verification

Proofs run inside the app on your device. Nothing is delegated to third-party infrastructure, so verification works even offline once proofs are fetched.

Privacy-aware

Pragmatic Adaptive Privacy (PAP) limits metadata leakage from blockchain reads. Your queries stay yours — no provider sees what you check or when.

Why this matters

Without local verification, any app that checks proofs against a blockchain is only as trustworthy as its RPC provider. Colibri removes that dependency — consensus proofs anchor chain correctness, execution proofs validate accounts and storage — so when ColiCam tells you an image is verified, that statement is backed by math you ran yourself, not by a server you hope told the truth.

Vision

The standard for image authenticity.

ColiCam begins as a camera app. It is built to become the infrastructure layer for visual truth across the entire media ecosystem.

NowLIVE

Image Authenticity

Cryptographic proof and onchain registration for every still image captured with ColiCam.

Next

Video Verification

Extending the protocol to video — frame-level integrity and a single verifiable proof per recording.

Future

Authenticity Standard

An open protocol for any camera manufacturer or application to embed and verify cryptographic proof of origin.

Join the photographers, journalists, and developers building on verified truth.

Built by

corpus.core

corpus.core builds core verification infrastructure for blockchains and digital media. ColiCam and the Colibri Stateless Client are developed and maintained by the corpus.core team.