From file to certified truth — in under 3 seconds.
CanonProof transforms digital evidence into cryptographically signed authenticity certificates. Every verification explains why a file is authentic or manipulated — in a format built for journalists, investigators, and the courts.
Typical verification time: < 3 seconds · No install, fully browser-based.
Instant Certification Example
This is the type of JSON you receive via the API or UI after a verification.
{
"label": "AUTHENTIC",
"score": 98,
"confidence": 0.97,
"sha256": "e5c1…a4bd",
"mediaType": "image/jpeg",
"certificateId": "CP1-9QF2-7K2M-1A0X",
"verifyUrl": "/certificates/CP1-9QF2-7K2M-1A0X"
}
Verify a File Now
No credit card required to start verifying.
Why CanonProof exists
In a world where deepfakes, AI-generated media, and digital manipulation are accelerating, trust in evidence has collapsed. Screenshots can be faked, images edited, and documents forged — often indistinguishably.
CanonProof was created to restore that trust. We act as a neutral, cryptographic authority that certifies digital authenticity with transparency, ensuring that truth can still be proven in the digital age.
- ✔️ Independent verification — not owned by Big Tech
- ✔️ Legal-grade evidence reports (ES256-signed)
- ✔️ Public verification links for radical transparency
- ✔️ Built to integrate into your existing workflows and tools
The problem in one chart
AI-generated content is rising exponentially. Yet the majority of digital evidence in disputes, journalism, and claims is still submitted without any integrity checks.
The 4-Step CanonProof Process
Every verification follows a rigorous, auditable, and repeatable workflow.
1. Upload & Identify
Upload your file — image, video, audio, or PDF. CanonProof fingerprints it using SHA-256 and detects media type instantly.
2. Analyze & Detect
Our forensic engine extracts metadata, compression patterns, EXIF plausibility, and AI-generation indicators to assess integrity and tampering risk.
3. Score & Classify
Weighted scoring assigns one of four labels — AUTHENTIC, LIKELY AUTHENTIC, INDETERMINATE, MANIPULATED, along with a confidence level.
4. Sign & Certify
The results are ES256-signed into a tamper-proof JWS certificate with a public verification URL and cryptographic fingerprint.
The technology behind CanonProof
Under the hood, CanonProof combines forensic analysis, AI-based detection, and modern cryptography to deliver results you can stand behind in court, in print, or in front of a regulator.
Forensic Analysis Engine
CanonProof runs a battery of low-level checks on each file, including:
- EXIF and metadata plausibility
- Thumbnail vs full-image similarity
- Compression artifacts and re-encoding patterns
- Noise and edge consistency across regions
AI Manipulation Detection
Our models look for signatures of synthetic generation and heavy editing — from GAN-like patterns to speech synthesis artefacts and frame-level inconsistencies.
The result is an AI-likelihood score you can use to challenge or corroborate claims around deepfakes, voice clones, and synthetic imagery.
Cryptographic Certificates
Every verification produces a signed JSON Web Signature (JWS) object, using ES256 and CanonProof’s root keys.
- Public JWKS endpoint for independent validation
- Immutable signature over score, label, and file hash
- Designed to align with legal evidence standards
Public verification as a first-class feature
Every certificate includes a public verification URL (for example: /certificates/CP1-9QF2-7K2M-1A0X)
where anyone can confirm the authenticity and see the signed result.
- ✅ Readers and counterparties can check your evidence without logging in
- ✅ Judges and regulators can independently validate certificates via the JWKS
- ✅ You maintain control — you decide which certificates are shared
GET /certificates/CP1-9QF2-7K2M-1A0X → status: AUTHENTIC → signedJws: <compact JWS> → indicators: [...]
Why it matters
CanonProof provides the missing trust layer for the world’s digital evidence.
🧾 Legal Admissibility
Each certificate is cryptographically signed and timestamped, providing verifiable authenticity for courts, regulators, and internal investigations.
🔗 Public Transparency
Anyone can independently confirm the integrity of a CanonProof certificate via its unique verification URL and signature — no black box, no trust-me claims.
🤖 AI-Ready Validation
CanonProof’s authenticity score can serve as a trust signal for AI moderation systems, provenance tagging, and content governance pipelines.
What you get with every verification
Whether you upload one file or one million, each verification includes:
Signed authenticity label
A clear classification (e.g. AUTHENTIC or MANIPULATED) with a numeric score and confidence level.
Explainable reasons
Human-readable indicators showing which forensic checks passed, failed, or raised suspicion — ready to paste into a report.
Cryptographic fingerprint
A SHA-256 hash that uniquely identifies the file so you can prove the exact bytes that were verified.
Public verify URL
An optional public verification page you can share in filings, reports, or articles for independent confirmation.
Designed for your role
CanonProof adapts to the way you work — not the other way around.
For investigators & legal teams
Use CanonProof as a standard step in your evidence intake.
- Attach certificates to case files and briefs
- Demonstrate due diligence to courts and clients
- Quickly triage large volumes of digital evidence
For insurers & compliance teams
Automatically verify photos, documents, and uploads at the point of claim.
- Flag suspicious submissions in real time
- Reduce manual review time and fraud losses
- Prove that your process checks evidence integrity
For media & platforms
Build CanonProof into your publishing or moderation workflow.
- Pre-flight verification for sensitive stories
- Evidence links you can share with your readers
- Signals you can feed into AI moderation tools
Manual forensics vs CanonProof
Traditionally, verifying authenticity required specialist tools, training, and hours of manual work. CanonProof brings that capability to every investigator, journalist, and analyst — in seconds.
You don’t need to be a forensic expert to get forensic-grade answers.
The old way
- Multiple tools and formats
- Hours of specialist analysis
- Hard to explain to non-experts
- No standard certificate output
With CanonProof
- Single upload or API call
- Result in seconds, at scale
- Plain-language reasons and indicators
- Signed certificate + public verify link
Industries We Serve
CanonProof is trusted wherever authenticity, compliance, and truth are critical.
| Sector | Need | Example Use | CanonProof Value |
|---|---|---|---|
| Law Enforcement & Forensics | Digital evidence chain of custody | Verify mobile uploads or CCTV footage | Tamper detection + court-admissible certificate |
| Insurance & Claims | Fraud prevention | Verify accident or damage photos | Authenticity scoring prevents staged claims |
| Media & Journalism | Deepfake & misinformation defense | Verify source footage before publishing | Fast authenticity check for edited or AI-generated media |
| Legal & Compliance | Regulatory integrity | Certify attachments in filings | Immutable audit record & signed proof bundle |
| Finance & KYC | Digital identity verification | Verify selfies & ID documents | Prove originality of uploaded documents |
| AI Detection & Governance | Synthetic media classification | Detect AI-generated content | CanonProof score = trust input for AI pipelines |
| Healthcare & Science | Clinical data integrity | Verify authenticity of lab images or scans | Tamper-proof archival certification |
| Education & Research | Academic integrity | Validate research photos & datasets | CanonProof citation integration |
| Intellectual Property / NFTs | Originality certification | Verify digital art provenance | CanonProof = authenticity attestation |
| General Public | Fact-checking & transparency | Verify viral videos or claims | Free public verification portal |
Frequently Asked Questions
A few quick answers before you start.
Do you store my files?
CanonProof is built with privacy in mind. Files are processed for analysis and certificate generation, and we retain only what’s necessary for verification — such as hashes, indicators, and signed results.
Can CanonProof prove that content is true?
No. CanonProof verifies authenticity, not truth. We certify whether a file is original or manipulated and whether it shows signs of AI generation. What the content means is still up to investigators, journalists, and courts.
Restore trust in digital evidence.
Issue your first CanonProof certificate in minutes.