March 2026 · ForensicMark Blog
What are C2PA content credentials? How the standard works
Every day, AI tools generate over 30 million images. Without a reliable way to prove what created them, those images flood the internet with no verifiable origin. C2PA content credentials solve this by attaching a cryptographically signed provenance record directly to a media file. Here's exactly how the standard works, what it protects, and where it falls short without invisible watermarking alongside it.
What is C2PA?
C2PA stands for the Coalition for Content Provenance and Authenticity. It's an open technical standard, governed by a Joint Development Foundation whose steering members include Adobe, BBC, Google, Meta, Microsoft, OpenAI, Sony, and Truepic. The standard defines how to attach a cryptographically signed manifest to any media file — image, video, audio, or document — recording how the content was created, by whom, and what changes it has undergone.
Think of it as a nutrition label for digital content. Anyone with a C2PA-aware viewer can open an image and inspect the full chain of custody: generated by which tool, on which date, by which creator, and later cropped or adjusted in which application. Each step in that chain carries a digital signature, so tampering is detectable.
What C2PA content credentials actually contain
A C2PA manifest is a JSON-LD document embedded in the file's metadata using XMP or the JUMBF container format, depending on file type. The manifest can include:
- Creator identity: The organization or individual who produced the content, optionally verified with a credential certificate.
- Tool and software: The application used to create or edit the file — "Adobe Photoshop 26.0", "DALL-E 3", or "ForensicMark API".
- Timestamp: When the content was created or last modified, anchored to a trusted timestamping authority.
- Actions log: A record of operations performed — "AI generated", "cropped", "color corrected", "transcoded".
- Content hash: A cryptographic hash of the image at signing time. Any pixel-level modification after signing breaks this hash.
- Ingredient manifests: References to source files used in composited images or edited videos, enabling deep provenance chains.
The manifest does not store actual image pixels or any personal data beyond what the signer chooses to include. File size increase is modest — typically a few kilobytes.
How C2PA verification works
Verification runs two independent checks. First, the verifier recomputes a hash of the image content and compares it to the hash in the manifest. If they match, the image hasn't been altered since signing. Second, the verifier validates the digital signature against the signer's X.509 certificate and checks that the certificate chains up to a trusted root on the C2PA Trust List.
This gives you two guarantees at once: the content matches what was signed (integrity), and the signer is who they claim to be (authenticity). If either check fails, the Content Credential shows as invalid rather than silently trusted.
You can verify credentials today at verify.contentauthenticity.org. Upload any file and the tool shows the full manifest if one is present.
C2PA vs. EXIF metadata: why the difference matters
EXIF is the older standard for embedding metadata in image files. It can carry creator name, camera model, GPS coordinates, copyright notices, and dates — but with no integrity protection whatsoever. Any tool can read and rewrite EXIF fields freely. There's no signature and no way to know whether the data was fabricated or modified after the fact.
C2PA solves this directly. The manifest is signed at creation time, and any modification to the manifest or the image content breaks the signature. This makes C2PA useful as technical and legal evidence of provenance. EXIF data alone is merely informational and easily spoofed.
Which tools and platforms support C2PA today
Adoption has grown steadily since the specification reached version 2.0. Current support:
- Adobe Photoshop and Lightroom attach C2PA credentials on export. Adobe's Content Authenticity Initiative provides a public verification interface.
- OpenAI DALL-E 3 attaches C2PA manifests to generated images by default.
- Google DeepMind SynthID embeds invisible watermarks alongside C2PA manifests in Imagen-generated content.
- Leica M11-P was the first camera to sign images with C2PA credentials at capture time, directly in hardware.
- LinkedIn, TikTok, and select Meta properties surface Content Credentials in their interfaces when an uploaded image carries a valid manifest.
- Midjourney has partial C2PA support in development.
The C2PA specification is royalty-free. Any organization or individual can implement it without licensing fees or mandatory membership — though joining the Conformance Program is required if you want your signing certificates listed on the C2PA Trust List.
The C2PA Trust List: what it is and why it matters
The Trust List is a curated registry of Certification Authorities (CAs) authorized to issue C2PA signing certificates. When a verifier checks a manifest, it confirms the signing certificate chains up to a root CA on this list.
Content signed before 2026 using pre-Trust List certificates is flagged as legacy in compliant verifiers — still valid, but clearly distinguished from content signed by a listed CA. Implementations on C2PA 1.x are considered legacy; migration to 2.x is encouraged, though 1.x content remains viewable.
The critical limitation: C2PA credentials can be stripped
C2PA credentials live in file metadata. Any operation that strips metadata destroys the manifest entirely: taking a screenshot, re-encoding through a social media upload, saving as a new file without the metadata layer, or deliberate removal with any number of free tools.
The image continues to exist and circulate, but the provenance record is gone with no trace. This isn't a flaw in the specification — it's a fundamental property of metadata-based systems.
The official C2PA FAQ acknowledges this directly: durable credentials via watermarking can help recover provenance data when metadata is stripped. The solution is to pair C2PA signing with invisible watermarking. The watermark lives in the pixel data itself and survives re-encoding, screenshots, and most common transformations. The C2PA manifest provides cryptographic proof of integrity when it's present; the watermark provides a fallback trace when it's not.
Together, you get a provenance system that's both robust (the watermark survives) and verifiable (the manifest proves integrity on intact files). Neither alone is sufficient for serious provenance work.
C2PA and the EU AI Act: compliance implications
The EU AI Act requires providers of high-risk and general-purpose AI systems to ensure their AI-generated content can be identified as such. C2PA's "AI generated" action flag in the manifest directly addresses this requirement for image and video content.
But strippability is a compliance risk here too. If a user re-encodes or screenshots an AI-generated image and the C2PA manifest is lost, the compliance signal disappears. Pairing C2PA with an invisible watermark that carries an AI-origin flag gives you a second, more durable compliance signal. Our EU AI Act watermarking compliance guide covers what's required and by when.
How to add C2PA content credentials to your images
There are three main implementation paths:
- Adobe tools: Enable Content Credentials in Photoshop or Lightroom settings. Credentials attach automatically on export. No code required.
- Open-source c2pa-rs library: The official Rust library (with Python and Node.js bindings) lets developers sign and verify manifests programmatically. Available on GitHub under the c2pa-org organization.
- API services: ForensicMark's C2PA signing API signs images and adds invisible watermarks in a single call, without managing certificates or libraries yourself. This is the practical path for agencies and content teams generating AI images at scale.
Whichever path you take, you'll need a signing certificate from a CA on the C2PA Trust List for your credentials to show as fully verified in compliant viewers.
Can C2PA prevent copyright infringement?
No. C2PA is a transparency and attribution standard, not a rights management system. It's explicitly not DRM. The manifest records who created the content and how, but it doesn't restrict copying, downloading, or redistribution.
What it does give you is solid, verifiable evidence of authorship. If your content is copied and misattributed, the original C2PA-signed file is timestamped proof that you created it first — meaningful in DMCA takedown requests and licensing disputes. For stronger attribution tracking, pair C2PA with invisible watermarking that survives metadata stripping and lets you trace copies even after re-encoding.
Frequently Asked Questions
What does C2PA stand for?
Coalition for Content Provenance and Authenticity. Its steering members include Adobe, Microsoft, Google, Meta, BBC, OpenAI, Sony, and Truepic, among others.
Are C2PA content credentials the same as metadata?
C2PA credentials are stored in file metadata, but they're cryptographically signed — which ordinary metadata is not. Anyone can edit EXIF data. A C2PA manifest carries a digital signature that breaks if the manifest or the image content is altered after signing.
What happens to C2PA credentials when I upload to social media?
Most platforms strip file metadata on upload, destroying the C2PA manifest. LinkedIn and TikTok are exceptions that have implemented C2PA support and surface credentials in their interfaces. For platforms that strip metadata, invisible watermarking is the only way to preserve a provenance signal through the upload process.
Is C2PA free to use?
Yes. The specification is royalty-free and publicly available. You don't need to join the C2PA organization to implement it. Engaging with the Conformance Program is only required if you want your signing certificates to appear on the official Trust List.
How much does C2PA signing increase file size?
Modestly. A typical C2PA manifest adds a few kilobytes — well under 1% for most images. Ingredient manifests for complex composited images can be larger, but are still unlikely to be noticeable in production workflows.
Can I verify C2PA credentials on any file?
You can verify credentials on any file that carries a C2PA manifest. Upload to verify.contentauthenticity.org or use ForensicMark's C2PA verify tool to inspect the full manifest, check the certificate chain, and see all recorded actions.
What is the difference between C2PA and Content Credentials?
C2PA is the technical specification — the open standard defining how manifests are structured, signed, and verified. "Content Credentials" is the consumer-facing brand name for the resulting artifact: the signed provenance record attached to a file. All Content Credentials are C2PA manifests; the two terms are used interchangeably in most contexts.
Can C2PA work offline?
Yes. Devices can generate C2PA credentials locally without network access, using certificates provisioned in advance. This matters for cameras, drones, and embedded systems in the field. Verification typically requires connectivity to check the certificate chain, though validators can work with pre-downloaded trust root bundles.