How It Works

From file to certified truth — in under 3 seconds.

CanonProof transforms digital evidence into cryptographically signed authenticity certificates. Every verification explains why a file is authentic or manipulated — in a format built for journalists, investigators, and the courts.

Neutral Authority Legal-grade Certificates Explainable Forensics API-first Platform

Typical verification time: < 3 seconds · No install, fully browser-based.

Instant Certification Example

This is the type of JSON you receive via the API or UI after a verification.

{
  "label": "AUTHENTIC",
  "score": 98,
  "confidence": 0.97,
  "sha256": "e5c1…a4bd",
  "mediaType": "image/jpeg",
  "certificateId": "CP1-9QF2-7K2M-1A0X",
  "verifyUrl": "/certificates/CP1-9QF2-7K2M-1A0X"
}
Verify a File Now

No credit card required to start verifying.

Why CanonProof exists

In a world where deepfakes, AI-generated media, and digital manipulation are accelerating, trust in evidence has collapsed. Screenshots can be faked, images edited, and documents forged — often indistinguishably.

CanonProof was created to restore that trust. We act as a neutral, cryptographic authority that certifies digital authenticity with transparency, ensuring that truth can still be proven in the digital age.

  • ✔️ Independent verification — not owned by Big Tech
  • ✔️ Legal-grade evidence reports (ES256-signed)
  • ✔️ Public verification links for radical transparency
  • ✔️ Built to integrate into your existing workflows and tools
Join CanonProof
The problem in one chart

AI-generated content is rising exponentially. Yet the majority of digital evidence in disputes, journalism, and claims is still submitted without any integrity checks.

AI Manipulation Likelihood by Media Type Image Video Audio PDF Composite 45% 68% 60% 30% 72% Based on CanonProof internal model outputs (synthetic vs authentic sample sets)
CanonProof AI manipulation likelihood distribution — higher bars indicate media types where synthetic alteration is most frequently detected.

The 4-Step CanonProof Process

Every verification follows a rigorous, auditable, and repeatable workflow.

📤
1. Upload & Identify

Upload your file — image, video, audio, or PDF. CanonProof fingerprints it using SHA-256 and detects media type instantly.

🔬
2. Analyze & Detect

Our forensic engine extracts metadata, compression patterns, EXIF plausibility, and AI-generation indicators to assess integrity and tampering risk.

⚖️
3. Score & Classify

Weighted scoring assigns one of four labels — AUTHENTIC, LIKELY AUTHENTIC, INDETERMINATE, MANIPULATED, along with a confidence level.

🔏
4. Sign & Certify

The results are ES256-signed into a tamper-proof JWS certificate with a public verification URL and cryptographic fingerprint.

The technology behind CanonProof

Under the hood, CanonProof combines forensic analysis, AI-based detection, and modern cryptography to deliver results you can stand behind in court, in print, or in front of a regulator.

Forensic Analysis Engine

CanonProof runs a battery of low-level checks on each file, including:

  • EXIF and metadata plausibility
  • Thumbnail vs full-image similarity
  • Compression artifacts and re-encoding patterns
  • Noise and edge consistency across regions
AI Manipulation Detection

Our models look for signatures of synthetic generation and heavy editing — from GAN-like patterns to speech synthesis artefacts and frame-level inconsistencies.

The result is an AI-likelihood score you can use to challenge or corroborate claims around deepfakes, voice clones, and synthetic imagery.

Cryptographic Certificates

Every verification produces a signed JSON Web Signature (JWS) object, using ES256 and CanonProof’s root keys.

  • Public JWKS endpoint for independent validation
  • Immutable signature over score, label, and file hash
  • Designed to align with legal evidence standards

Public verification as a first-class feature

Every certificate includes a public verification URL (for example: /certificates/CP1-9QF2-7K2M-1A0X) where anyone can confirm the authenticity and see the signed result.

  • ✅ Readers and counterparties can check your evidence without logging in
  • ✅ Judges and regulators can independently validate certificates via the JWKS
  • ✅ You maintain control — you decide which certificates are shared
See a verification example
GET /certificates/CP1-9QF2-7K2M-1A0X

→ status: AUTHENTIC
→ signedJws: <compact JWS>
→ indicators: [...]

Why it matters

CanonProof provides the missing trust layer for the world’s digital evidence.

🧾 Legal Admissibility

Each certificate is cryptographically signed and timestamped, providing verifiable authenticity for courts, regulators, and internal investigations.

🔗 Public Transparency

Anyone can independently confirm the integrity of a CanonProof certificate via its unique verification URL and signature — no black box, no trust-me claims.

🤖 AI-Ready Validation

CanonProof’s authenticity score can serve as a trust signal for AI moderation systems, provenance tagging, and content governance pipelines.

What you get with every verification

Whether you upload one file or one million, each verification includes:

Signed authenticity label

A clear classification (e.g. AUTHENTIC or MANIPULATED) with a numeric score and confidence level.

Explainable reasons

Human-readable indicators showing which forensic checks passed, failed, or raised suspicion — ready to paste into a report.

Cryptographic fingerprint

A SHA-256 hash that uniquely identifies the file so you can prove the exact bytes that were verified.

Public verify URL

An optional public verification page you can share in filings, reports, or articles for independent confirmation.

Designed for your role

CanonProof adapts to the way you work — not the other way around.

For investigators & legal teams

Use CanonProof as a standard step in your evidence intake.

  • Attach certificates to case files and briefs
  • Demonstrate due diligence to courts and clients
  • Quickly triage large volumes of digital evidence
For insurers & compliance teams

Automatically verify photos, documents, and uploads at the point of claim.

  • Flag suspicious submissions in real time
  • Reduce manual review time and fraud losses
  • Prove that your process checks evidence integrity
For media & platforms

Build CanonProof into your publishing or moderation workflow.

  • Pre-flight verification for sensitive stories
  • Evidence links you can share with your readers
  • Signals you can feed into AI moderation tools

Manual forensics vs CanonProof

Traditionally, verifying authenticity required specialist tools, training, and hours of manual work. CanonProof brings that capability to every investigator, journalist, and analyst — in seconds.

You don’t need to be a forensic expert to get forensic-grade answers.

The old way
  • Multiple tools and formats
  • Hours of specialist analysis
  • Hard to explain to non-experts
  • No standard certificate output
With CanonProof
  • Single upload or API call
  • Result in seconds, at scale
  • Plain-language reasons and indicators
  • Signed certificate + public verify link

Industries We Serve

CanonProof is trusted wherever authenticity, compliance, and truth are critical.

Sector Need Example Use CanonProof Value
Law Enforcement & ForensicsDigital evidence chain of custodyVerify mobile uploads or CCTV footageTamper detection + court-admissible certificate
Insurance & ClaimsFraud preventionVerify accident or damage photosAuthenticity scoring prevents staged claims
Media & JournalismDeepfake & misinformation defenseVerify source footage before publishingFast authenticity check for edited or AI-generated media
Legal & ComplianceRegulatory integrityCertify attachments in filingsImmutable audit record & signed proof bundle
Finance & KYCDigital identity verificationVerify selfies & ID documentsProve originality of uploaded documents
AI Detection & GovernanceSynthetic media classificationDetect AI-generated contentCanonProof score = trust input for AI pipelines
Healthcare & ScienceClinical data integrityVerify authenticity of lab images or scansTamper-proof archival certification
Education & ResearchAcademic integrityValidate research photos & datasetsCanonProof citation integration
Intellectual Property / NFTsOriginality certificationVerify digital art provenanceCanonProof = authenticity attestation
General PublicFact-checking & transparencyVerify viral videos or claimsFree public verification portal

Frequently Asked Questions

A few quick answers before you start.

Do you store my files?

CanonProof is built with privacy in mind. Files are processed for analysis and certificate generation, and we retain only what’s necessary for verification — such as hashes, indicators, and signed results.

Can CanonProof prove that content is true?

No. CanonProof verifies authenticity, not truth. We certify whether a file is original or manipulated and whether it shows signs of AI generation. What the content means is still up to investigators, journalists, and courts.

Restore trust in digital evidence.

Issue your first CanonProof certificate in minutes.