“…Attribution is the focus of cross-industry coalitions (e.g., CAI [43], Origin [1]) and emerging standards (e.g., C2PA [11]). A robust identifier may be embedded via metadata, watermarking [13,2], steganography [56,53]) or obtained via perceptual hash of content (fingerprinting [40,57,4]). The identifier serves as a key to lookup provenance information in a database operated by a trusted source [1] or in a decentralized trusted database such as a blockchain [12,7].…”