Skip to Main Content
How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials
["How can teachers and students use AI?", "What are the newest features in Chrome?", "How can I learn new AI skills?"]

Security

How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials



Comparison of two photos of a woman in a car showing "Content Credentials" labels, detailing whether the image was captured with a camera or edited with AI tools.
Android Device Trust Diagram Infographic detailing a five-step security process to guarantee content authenticity:  1. Hardware Trust: Ensures integrity from power-on.  2. Genuine Device and Software: Verifies that the device and operating system are genuine.  3. Genuine Application: Confirms the legitimacy of installed applications.  4. Verify then Provision: Issues security certificates to registered applications.  5. Tamper-Resistant Key Storage: Securely stores signing keys in Android StrongBox.
The infographic illustrates a workflow. First, it shows a scenario where all images are rejected (top row). Then, it shows a successful scenario (bottom row) where the same images are accepted and categorized into three distinct categories (represented by the colors green, yellow, and blue), demonstrating that they have passed a proper moderation or tagging process.