{"id":3610,"date":"2025-03-27T21:04:53","date_gmt":"2025-03-27T21:04:53","guid":{"rendered":"https:\/\/www.onvif.org\/blog\/?p=3610"},"modified":"2025-06-18T19:02:00","modified_gmt":"2025-06-18T19:02:00","slug":"deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity","status":"publish","type":"post","link":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/","title":{"rendered":"Deepfakes and Digital Trust: Why we need Authentication Technology for Video Integrity"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The rise of generative AI is expected to revolutionize the ways we use our security systems along with the information that these systems will be able to provide. These promises of new levels of efficiency, accuracy and creativity using artificial intelligence also come with great risks, thanks to the growing prevalence of tools to manipulate or create <a href=\"https:\/\/www.youtube.com\/playlist?list=PLxgMOEESA8vgmkkQM_jsD94AZfH9Ve2Vd\">\u201cdeepfake\u201d videos<\/a>.<\/p>\n\n\n\n<p>While some instances of deepfakes or manipulated video are easier to spot &#8211; think a dinosaur wandering around an office lobby &#8211; other alterations to video can be seamless to the viewer because they don\u2019t involve obvious changes in the video footage. For example, <strong>altering the timestamp of a video clip<\/strong> to a different day or time can provide incorrect information about when the event occurred. <strong>Taking out specific frames of a video clip<\/strong> from an event can remove the event or person of interest in the video,\u00a0 causing the clip to inaccurately portray an event.\u00a0<\/p>\n\n\n\n<p>This ability to alter video can ultimately pose <strong>significant challenges to organizational trust in video<\/strong> evidence and the industry\u2019s ability to maintain the authenticity of surveillance footage. This can have severe consequences in many areas, including criminal investigations, court proceedings, and internal corporate security investigations. As these threats continue to grow, traditional forensic techniques to safeguard video footage will not be enough to protect against generative AI\u2019s ability to covertly and overtly alter surveillance video. This growing need for new solutions highlights the importance for industry collaboration and a <strong>standardized way to preserve the integrity of video<\/strong> and institutional trust in the footage as an accurate view of a situation.<\/p>\n\n\n\n<p>As a global standards organization, <strong>ONVIF is working on a method of video authentication called media signing<\/strong> that provides proof that the video has not been altered since it has left the specific camera sensor that captured the video. Securing the video at its earliest point, when the sensor in the camera captures the video, is key to ensuring the authenticity and trustworthiness of the video footage from camera to court. <\/p>\n\n\n\n<p>Standardizing video authentication using ONVIF enables a common way to verify the authenticity of the video it has received. By <strong>securing the video right from the specific camera that captured it<\/strong>, there\u2019s no need to prove the chain of custody for the video. You can verify the video authenticity at every step \u2014 from the camera to a person viewing the exported recording. With authentication provided at the point of capture, the video can be traced back to the device that recorded it.<\/p>\n\n\n\n<p>Standardizing this process for the security industry and others that rely on camera footage for other uses will provide consistency and reliability in the authenticity of video. ONVIF believes that video authentication at the source (from the camera) through video signing will provide the assurances needed to preserve trust in surveillance video.&nbsp;<\/p>\n\n\n\n<p><em><strong>ONVIF chairman Leo Levit will be leading a <a href=\"https:\/\/www.discoverisc.com\/west\/en-us\/seminars\/2025-education-schedule\/session-details.3979.232301.can-security-video-survive-generative-ai.html\">presentation on video integrity at ISC West 2025<\/a> on Wednesday, April 2 at 3:30pm PDT, Room Venetian 203, Venetian Expo, Las Vegas. Please join us for this important discussion!<\/strong><\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of generative AI is expected to revolutionize the ways we use our security systems along with the information that these systems will be able to provide. These promises of new levels of efficiency, accuracy and creativity using artificial intelligence also come with great risks, thanks to the growing prevalence of tools to manipulate&#8230;<\/p>\n","protected":false},"author":10,"featured_media":3613,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[202,245,206,456],"class_list":["post-3610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-interoperability","tag-open-standards","tag-security","tag-videoauthenticity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence<\/title>\n<meta name=\"description\" content=\"Why we need to secure video evidence with authentication technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence\" \/>\n<meta property=\"og:description\" content=\"Why we need to secure video evidence with authentication technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\" \/>\n<meta property=\"og:site_name\" content=\"ONVIF Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T21:04:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T19:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ONVIF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ONVIF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\"},\"author\":{\"name\":\"ONVIF\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"headline\":\"Deepfakes and Digital Trust: Why we need Authentication Technology for Video Integrity\",\"datePublished\":\"2025-03-27T21:04:53+00:00\",\"dateModified\":\"2025-06-18T19:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\"},\"wordCount\":521,\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg\",\"keywords\":[\"interoperability\",\"open standards\",\"security\",\"videoauthenticity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\",\"url\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\",\"name\":\"Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg\",\"datePublished\":\"2025-03-27T21:04:53+00:00\",\"dateModified\":\"2025-06-18T19:02:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"description\":\"Why we need to secure video evidence with authentication technology.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage\",\"url\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg\",\"width\":2560,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.onvif.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepfakes and Digital Trust: Why we need Authentication Technology for Video Integrity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\",\"url\":\"https:\/\/www.onvif.org\/blog\/\",\"name\":\"ONVIF Blog\",\"description\":\"ONVIF Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.onvif.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\",\"name\":\"ONVIF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"caption\":\"ONVIF\"},\"url\":\"https:\/\/www.onvif.org\/blog\/author\/onvif\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence","description":"Why we need to secure video evidence with authentication technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/","og_locale":"en_US","og_type":"article","og_title":"Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence","og_description":"Why we need to secure video evidence with authentication technology.","og_url":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/","og_site_name":"ONVIF Blog","article_published_time":"2025-03-27T21:04:53+00:00","article_modified_time":"2025-06-18T19:02:00+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","type":"image\/jpeg"}],"author":"ONVIF","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ONVIF","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#article","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/"},"author":{"name":"ONVIF","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"headline":"Deepfakes and Digital Trust: Why we need Authentication Technology for Video Integrity","datePublished":"2025-03-27T21:04:53+00:00","dateModified":"2025-06-18T19:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/"},"wordCount":521,"image":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","keywords":["interoperability","open standards","security","videoauthenticity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/","url":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/","name":"Deepfakes and Digital Trust: Why we need Authentication Technology to Secure Video Evidence","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage"},"image":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","datePublished":"2025-03-27T21:04:53+00:00","dateModified":"2025-06-18T19:02:00+00:00","author":{"@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"description":"Why we need to secure video evidence with authentication technology.","breadcrumb":{"@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#primaryimage","url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","contentUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","width":2560,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/www.onvif.org\/blog\/2025\/03\/27\/deepfakes-and-digital-trust-why-we-need-authentication-technology-for-video-integrity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.onvif.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Deepfakes and Digital Trust: Why we need Authentication Technology for Video Integrity"}]},{"@type":"WebSite","@id":"https:\/\/www.onvif.org\/blog\/#website","url":"https:\/\/www.onvif.org\/blog\/","name":"ONVIF Blog","description":"ONVIF Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.onvif.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d","name":"ONVIF","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","caption":"ONVIF"},"url":"https:\/\/www.onvif.org\/blog\/author\/onvif\/"}]}},"jetpack_featured_media_url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2025\/03\/AdobeStock_1015921619-scaled.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/comments?post=3610"}],"version-history":[{"count":11,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3610\/revisions"}],"predecessor-version":[{"id":3645,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3610\/revisions\/3645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media\/3613"}],"wp:attachment":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media?parent=3610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/categories?post=3610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/tags?post=3610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}