@unpublished{young2026media, author = {Young, Jessica and Vaughan, Sam and Jenks, Andrew and Malvar, Henrique and Paquin, Christian and England, Paul and PhD, Thomas Roca, and Lavista Ferres, Juan M. and Poursabzi, Forough and Coles, Neil and Archer, Ken and Horvitz, Eric}, title = {Media Integrity and Authentication: Status, Directions, and Futures}, year = {2026}, month = {January}, abstract = {We provide background on emerging challenges and future directions with media integrity and authentication methods, focusing on distinguishing AI-generated media from authentic content captured by cameras and microphones. We evaluate several approaches, including provenance, watermarking, and fingerprinting. After defining each method, we analyze three representative technologies: cryptographically secured provenance, imperceptible watermarking, and soft-hash fingerprinting. We analyze how these tools operate across modalities and evaluate relevant threat models, attack categories, and real-world workflows spanning capture, editing, distribution, and verification. We consider sociotechnical “reversal” attacks that can invert integrity signals, making authentic content appear synthetic and vice versa, highlighting the value of verification systems that are resilient to both technical and psychosocial manipulation. Finally, we outline techniques for delivering high-confidence provenance authentication, including directions for strengthening edge-device security using secure enclaves.}, url = {http://approjects.co.za/?big=en-us/research/publication/media-integrity-and-authentication-status-directions-and-futures/}, }