Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DETECTION OF DEEP FAKE VIDEOS BASED ON DIGITAL SIGNATURE
Document Type and Number:
WIPO Patent Application WO/2020/197547
Kind Code:
A1
Abstract:
Technologies are generally described to provide authenticity for a video signal. Audio and video components of the video signal may be captured along with a verification signal distinct from the audio and video components of the video signal and transmitted by a physical device on or near a speaker captured in the video signal. The audio and/or the video component of the video signal may be signed with the verification signal prior to transmission to provide authenticity of the video signal. An authentication accessory device on or near the speaker may detect an audio or video component of the video signal, generate an audio or video verification signal based on the detected component, and transmit the audio or video verification signal to be captured with the video signal. At the receiver side, the verification signal may be decoded and the received video signal authenticated based on the decoded verification signal.

Inventors:
CHEN XIAOQI (US)
XIAO ZHEN (CN)
Application Number:
PCT/US2019/024190
Publication Date:
October 01, 2020
Filing Date:
March 27, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
XINOVA LLC (US)
International Classes:
H04B10/50; H01Q5/22; H04B10/90; H04L9/30; H04N21/2347; H04N21/4408
Domestic Patent References:
WO2018138729A12018-08-02
Foreign References:
US20180220189A12018-08-02
US20160127327A12016-05-05
US20160078869A12016-03-17
Attorney, Agent or Firm:
TURK, Carl, K. (US)
Download PDF:
Claims:
CLAIMS

WHAT IS CLAIMED IS:

1. A method to provide authenticity for a video signal, the method comprising:

capturing the video signal, wherein the video signal includes an audio component and a video component;

capturing a verification signal transmitted by a physical device on or near a person captured in the video signal, wherein the verification signal is

distinct from the audio component and the video component of the video signal, and

captured at a time of capture of the video signal;

signing one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and

transmitting the signed video signal.

2. The method of claim 1, wherein capturing the verification signal comprises:

capturing one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal.

3. The method of claim 2, wherein capturing the supra- audible verification signal comprises:

capturing an ultra-sonic signal.

4. The method of claim 2, wherein capturing the invisible video verification signal comprises:

capturing an ultraviolet signal or an infrared signal.

5. The method of claim 2, wherein capturing the visible video verification signal comprises: capturing a stationary image or a dynamically changing image.

6 The method of claim 2, wherein capturing the visible video verification signal comprises: capturing one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray-tones or colors.

7. The method of claim 2, wherein capturing the audible verification signal comprises: capturing a speech by the person captured in the video signal; and

generating the verification signal based on one or more of a timing, a tonality, a speed, or a content of speech in the captured video signal.

8. The method of claim 1, wherein capturing the verification signal comprises:

capturing the verification signal from an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person.

9. The method of claim 1, wherein signing one or more of the audio component or the video component of the video signal with the verification signal comprises:

including the verification signal in the one or more of the audio component or the video component of the transmitted video signal.

10. The method of claim 1, wherein signing one or more of the audio component or the video component of the video signal with the verification signal comprises:

generating a private key for a public/private key pair to verify the authenticity of the video signal; and

digitally signing the video signal with the private key before transmitting.

11. The method of claim 1, further comprising:

including metadata associated with the captured video signal in the transmitted video signal.

12. The method of claim 11, wherein including the metadata associated with the captured video signal in the transmitted video signal comprises: transmitting one or more of a time of capture, a location of capture, or a hash value of the verification signal.

13. The method of claim 1, further comprising:

verifying authenticity of a secondary channel for the transmitted video signal by endorsing a private key associated with the secondary channel.

14. The method of claim 13, wherein the secondary channel is an audio channel or a video channel to present a translation of speech in the captured video signal.

15. The method of claim 13, further comprising:

imposing a time limitation on the endorsement.

16. The method of claim 13, further comprising:

allowing a single endorsement associated with the speech in the captured video signal.

17. The method of claim 13, wherein endorsing the private key associated with the secondary channel comprises:

endorsing the private key associated with the secondary channel through one or more of a near field wireless interaction or storage of the endorsement at a server.

18. The method of claim 1, wherein transmitting the signed video signal comprises:

transmitting the captured video signal and the verification signal together to a recipient; or

transmitting the captured video signal to the recipient and the verification signal to a verification service.

19. A method to confirm authenticity of a video signal, the method comprising:

receiving an audio component and a video component of the video signal;

receiving a verification signal transmitted by a physical device on or near a person captured in the video signal, wherein the verification signal is distinct from the audio component and the video component of the video signal, and

captured at a time of capture of the video signal;

decoding the verification signal; and

confirming an authenticity of the video signal based on the decoded verification signal.

20. The method of claim 19, wherein receiving the verification signal comprises:

receiving the verification signal included in one or more of the audio component or the video component of the video signal.

21. The method of claim 19, wherein receiving the verification signal comprises:

receiving the verification signal from a verification service separately from the video signal.

22. The method of claim 19, wherein receiving the verification signal comprises:

receiving one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal.

23. The method of claim 22, wherein receiving the supra- audible verification signal comprises:

receiving an ultra-sonic signal.

24. The method of claim 22, wherein receiving the invisible video verification signal comprises:

receiving an ultraviolet signal or an infrared signal.

25. The method of claim 22, wherein receiving the visible video verification signal comprises:

receiving a stationary image or a dynamically changing image.

26. The method of claim 22, wherein receiving the visible video verification signal comprises:

receiving one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray-tones or colors.

27. The method of claim 22, wherein receiving the audible verification signal comprises: receiving the verification signal generated based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal.

28. The method of claim 19, wherein receiving the verification signal comprises:

receiving the verification signal by an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of a speaker.

29. The method of claim 19, wherein receiving the verification signal comprises:

receiving a public key for a public/private key pair generated based on the verification signal; and

decoding the digitally signed video signal with the public key to verify that the video signal was signed with a private key of the public/private key pair.

30. The method of claim 19, further comprising:

receiving metadata associated with the video signal.

31. The method of claim 30, wherein receiving the metadata associated with the video signal comprises:

receiving one or more of a time of capture, a location of capture, or a hash value of the verification signal along with the video signal.

32. The method of claim 19, further comprising:

verifying authenticity of a secondary channel for the received video signal by receiving an endorsement of a private key associated with the secondary channel.

33. The method of claim 32, wherein the secondary channel is an audio channel or a video channel to present a translation of speech in the video signal.

34. The method of claim 32, wherein receiving the endorsement of the private key associated with the secondary channel comprises:

receiving the endorsement of the private key associated with the secondary channel through one or more of a near field wireless interaction or retrieval of the endorsement from a server.

35. A method to provide a verification signal for confirmation of authenticity of a video signal, the method comprising:

detecting an audio component or a video component of a video signal being captured; generating an audio verification signal or a video verification signal based on the detected audio component or video component; and

transmitting the audio verification signal or the video verification signal by a physical device on or near a person captured in the video signal, wherein the audio verification signal and the video verification signal are distinct from the audio component and the video component of the video signal, respectively, and are captured in the video signal at a time of capture of the video signal.

36. The method of claim 35, wherein generating the audio verification signal or the video verification signal comprises:

generating one or more of an audible verification signal, a supra-audible verification signal, a visible video verification signal, or an invisible video verification signal.

37. The method of claim 36, wherein generating the supra-audible verification signal comprises:

generating an ultra-sonic signal.

38. The method of claim 36, wherein generating the invisible video verification signal comprises:

generating an ultraviolet signal or an infrared signal.

39. The method of claim 36, wherein generating the visible video verification signal comprises:

generating a stationary image or a dynamically changing image.

40. The method of claim 36, wherein generating the visible video verification signal comprises:

generating one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray-tones or colors.

41. The method of claim 36, wherein generating the audible verification signal comprises: generating the audio verification signal or the video verification signal based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal.

42. The method of claim 35, wherein transmitting the audio verification signal or the video verification signal comprises:

transmitting the audio verification signal or the video verification signal by an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person.

43. An apparatus to provide authenticity for a video signal, the apparatus comprising: a capture device configured to:

capture an audio component and a video component of the video signal; and capture a verification signal transmitted by a physical device on or near a person captured in the video signal, wherein the verification signal is

distinct from the audio component and the video component of the video signal, and

captured at a time of capture of the video signal; a processor coupled to the capture device, wherein the processor is configured to:

sign one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and a communication device coupled to the processor, wherein the communication device is configured to:

transmit the signed video signal.

44. The apparatus of claim 43, wherein, to capture the verification signal, the capture device is further configured to:

capture one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal.

45. The apparatus of claim 44, wherein the supra- audible verification signal comprises an ultra-sonic signal.

46. The apparatus of claim 44, wherein the invisible video verification signal comprises an ultraviolet signal or an infrared signal.

47. The apparatus of claim 44, wherein the visible video verification signal comprises a stationary image or a dynamically changing image.

48. The apparatus of claim 44, wherein the visible video verification signal comprises one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors.

49. The apparatus of claim 44, wherein, to capture the audible verification signal, the capture device is further configured to:

capture a speech by the person captured in the video signal; and

generate the verification signal based on one or more of a timing, a tonality, a speed, or a content of speech in the captured video signal.

50. The apparatus of claim 43, wherein the capture device is configured to capture the verification signal from an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person.

51. The apparatus of claim 43, wherein the processor is configured to sign one or more of the audio component or the video component of the video signal with the verification signal through inclusion of the verification signal in the one or more of the audio component or the video component of the transmitted video signal.

52. The apparatus of claim 43, wherein, to sign one or more of the audio component or the video component of the video signal with the verification signal, the processor is configured to: generate a private key for a public/private key pair based on the verification signal; and digitally sign the video signal with the private key before transmission.

53. The apparatus of claim 43, wherein the processor is further configured to:

include metadata associated with the captured video signal in the transmitted video signal.

54. The apparatus of claim 53, wherein the metadata comprises one or more of a time of capture, a location of capture, or a hash value of the verification signal.

55. The apparatus of claim 43, wherein the processor is further configured to:

verify authenticity of a secondary channel for the transmitted video signal through endorsement of a private key associated with the secondary channel.

56. The apparatus of claim 55, wherein the secondary channel is an audio channel or a video channel to present a translation of speech in the captured video signal.

57. The apparatus of claim 55, wherein the processor is further configured to:

impose a time limitation on the endorsement.

58. The apparatus of claim 55, wherein the processor is further configured to: allow a single endorsement associated with the speech in the captured video signal.

59. The apparatus of claim 55, wherein, to endorse the private key associated with the secondary channel, the processor is configured to:

endorse the private key associated with the secondary channel through one or more of a near field wireless interaction or storage of the endorsement at a server.

60. The apparatus of claim 43, wherein the communication device is configured to:

transmit the captured video signal and the verification signal together to a recipient; or transmit the captured video signal to the recipient and the verification signal to a verification service.

61. An authentication accessory to provide a verification signal for confirmation of authenticity of a video signal, the authentication accessory comprising:

a detection component configured to detect an audio component or a video component of the video signal as the video signal is captured;

a processor coupled to the detection component, wherein the processor is configured to generate an audio verification signal or a video verification signal based on the detected audio component or video component, wherein the audio verification signal and the video verification signal are distinct from the audio component and the video component of the video signal, respectively; and

a transmission component coupled to the processor, wherein the transmission component is a physical device on or near a person captured in the video signal and configured to transmit the audio verification signal or the video verification signal.

62. The authentication accessory of claim 61, wherein the processor is configured to:

generate one or more of an audible verification signal, a supra-audible verification signal, a visible video verification signal, or an invisible video verification signal.

63. The authentication accessory of claim 62, wherein the supra-audible verification signal comprises an ultra-sonic signal.

64. The authentication accessory of claim 62, wherein the invisible video verification signal comprises an ultraviolet signal or an infrared signal.

65. The authentication accessory of claim 62, wherein the visible video verification signal comprises a stationary image or a dynamically changing image.

66. The authentication accessory of claim 62, wherein the visible video verification signal comprises one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors.

67. The authentication accessory of claim 62, wherein the processor is configured to generate the audible verification signal based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal.

68. The authentication accessory of claim 61, wherein the authentication accessory is one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person.

69. A system to confirm authenticity of a video signal, the system comprising:

a first component configured to receive an audio component and a video component of the video signal;

a second component configured to:

receive a verification signal transmitted by a physical device on or near a person captured in the video signal, wherein the verification signal is

distinct from the audio component and the video component of the video signal, and

captured at a time of capture of the video signal;

decode the verification signal; and confirm an authenticity of the video signal based on the decoded verification signal; and

a third component configured to present the video signal with the confirmed authenticity to a user.

70. The system of claim 69, wherein the first component is further configured to:

receive the verification signal included in one or more of the audio component or the video component of the video signal;

separate the verification signal from the one or more of the audio component or the video component of the video signal; and

provide the verification signal to the second component.

71. The system of claim 69, wherein the second component is configured to receive the verification signal from a verification service separately from the video signal.

72. The system of claim 69, wherein the first component and the second component are integrated.

73. The system of claim 69, wherein the verification signal comprises one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal.

74. The system of claim 73, wherein the supra- audible verification signal comprises an ultra sonic signal.

75. The system of claim 73, wherein the invisible video verification signal comprises an ultraviolet signal or an infrared signal.

76. The system of claim 73, wherein the visible video verification signal comprises a stationary image or a dynamically changing image.

77. The system of claim 73, wherein the visible video verification signal comprises one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors.

78. The system of claim 73, wherein the verification signal is generated based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal.

79. The system of claim 69, wherein the physical device is an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of a speaker.

80. The system of claim 69, wherein the second component is further configured to:

receive a public key for a public/private key pair generated based on the verification signal; and

decode the digitally signed video signal with the public key to verify that the video signal was signed with a private key of the public/private key pair.

81. The system of claim 69, wherein the second component is further configured to:

receive metadata associated with the video signal.

82. The system of claim 81, wherein the metadata associated with the video signal comprises one or more of a time of capture, a location of capture, or a hash value of the verification signal along with the video signal.

83. The system of claim 69, wherein the second component is further configured to:

verify authenticity of a secondary channel for the received video signal through receipt of an endorsement of a private key associated with the secondary channel.

84. The system of claim 83, wherein the secondary channel is an audio channel or a video channel to present a translation of speech in the video signal.

85. The system of claim 83, wherein the endorsement of the private key associated with the secondary channel is received through one or more of a near field wireless interaction or retrieval of the endorsement from a server.

86. The system of claim 69, wherein one or more of the first component, the second component, and the third component are a server, a personal computing device, a wearable computing device, or a special purpose computing device.

Description:
DETECTION OF DEEP FAKE VIDEOS BASED ON DIGITAL SIGNATURE

BACKGROUND

[0001] Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.

[0002] Video forgery algorithms, such as deep fake algorithm, are becoming increasingly sophisticated. By generating a fake face through a deep learning neural network, such algorithms are able to replace a real face with a fake face in real time. Increased use of forgery algorithms makes the Internet and valuable resources within the Internet suspicious resulting in a disturbing social phenomenon. With existing technologies, digital watermarks may be added to images, videos, and audio files or streams to ensure the authenticity of distributed media. However, the use of such technologies is typically controlled by producers of the media rather than by a speaker within a video. For example, a media source, such as a TV station, can forge an interview video using the deep fake algorithm after interviewing a public figure and then add digital watermarks into the fake video thus produced.

SUMMARY

[0003] The present disclosure generally describes techniques for detection of deep fake videos based on digital signature.

[0004] According to some examples, a method to provide authenticity for a video signal is described. The method may include capturing the video signal, where the video signal includes an audio component and a video component; capturing a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal; signing one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and transmitting the signed video signal.

[0005] According to other examples, a method to confirm authenticity of a video signal is described. The method may include receiving an audio component and a video component of the video signal; receiving a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal; decoding the verification signal; and confirming an authenticity of the video signal based on the decoded verification signal.

[0006] According to further examples, a method to provide a verification signal for confirmation of authenticity of a video signal is described. The method may include detecting an audio component or a video component of a video signal being captured; generating an audio verification signal or a video verification signal based on the detected audio component or video component; and transmitting the audio verification signal or the video verification signal by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured in the video signal at a time of capture of the video signal.

[0007] According to some examples, an apparatus to provide authenticity for a video signal is described. The apparatus may include a capture device configured to capture an audio component and a video component of the video signal; and capture a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal. The apparatus may also include a processor coupled to the capture device and configured to sign one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal. The apparatus may further include a communication device coupled to the processor and configured to transmit the signed video signal.

[0008] According to other examples, an authentication accessory to provide a verification signal for confirmation of authenticity of a video signal is described. The authentication accessory may include a detection component configured to detect an audio component or a video component of the video signal as the video signal is captured, and a processor coupled to the detection component. The processor may be configured to generate an audio verification signal or a video verification signal based on the detected audio component or video component, where the audio verification signal and the video verification signal are distinct from the audio component and the video component of the video signal, respectively. The authentication accessory may also include a transmission component coupled to the processor, where the transmission component is a physical device on or near a person captured in the video signal and configured to transmit the audio verification signal or the video verification signal.

[0009] According to further examples, a system to confirm authenticity of a video signal is described. The system may include a first component configured to receive an audio component and a video component of the video signal. The system may also include a second component configured to receive a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal and captured at a time of capture of the video signal. The second component may also decode the verification signal and confirm an authenticity of the video signal based on the decoded verification signal. The system may further include a third component configured to present the video signal with the confirmed authenticity to a user.

[0010] The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

[0011] The foregoing and other features of this disclosure will become more fully apparent from the following description and appended claims, taken in conjunction with the

accompanying drawings. Understanding that these drawings depict only several embodiments in accordance with the disclosure and are, therefore, not to be considered limiting of its scope, the disclosure will be described with additional specificity and detail through use of the

accompanying drawings, in which:

FIG. 1 includes a conceptual illustration of a system, where deep fake videos may be disseminated;

FIG. 2A includes examples of audio or visual verification information that may be used to confirm authenticity of a captured video; FIG. 2B includes examples of the captured video of FIG. 2A being displayed to a user along with the audio or visual verification information to confirm authenticity of the captured video;

FIG. 3 includes example messages that may be displayed along with a video indicating whether an authenticity of the video has been confirmed or not;

FIG. 4 includes a conceptual illustration of speech contained in a captured video being authenticated using a digital signature;

FIG. 5 includes a conceptual illustration of confirmation of authenticity of a captured video using a digital signature in a multi-channel environment;

FIG. 6 illustrates a computing device, which may be used to provide authenticity of video signal based on signature;

FIG. 7 is a flow diagram illustrating an example method for confirmation of authenticity of a video signal based on a signature that may be performed by a computing device such as the computing device in FIG. 6; and

FIG. 8 illustrates a block diagram of an example computer program product,

some of which are arranged in accordance with at least some embodiments described herein.

DETAILED DESCRIPTION

[0012] In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. The aspects of the present disclosure, as generally described herein, and illustrated in the Figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.

[0013] This disclosure is generally drawn, inter alia , to methods, apparatus, systems, devices, and/or computer program products related to detection of deep fake videos based on digital signature. [0014] Briefly stated, technologies are generally described to provide authenticity for a video signal. Audio and video components of the video signal may be captured along with a verification signal distinct from the audio and video components of the video signal and transmitted by a physical device on or near a speaker captured in the video signal. The audio and/or the video component of the video signal may be signed with the verification signal prior to transmission to provide authenticity of the video signal. An authentication accessory device on or near the speaker may detect an audio or video component of the video signal, generate an audio or video verification signal based on the detected component, and transmit the audio or video verification signal to be captured with the video signal. At the receiver side, the

verification signal may be decoded and the received video signal authenticated based on the decoded verification signal.

[0015] FIG. 1 includes a conceptual illustration of a system, where deep fake videos may be disseminated.

[0016] Diagram 100 shows capture and distribution of captured video signals. For example, a person 102 speaking may be captured by a video camera 104 or similar device. The video camera 104 may transmit the video signal 106 to a network 110, for example, a server 108 at the network 110. The video signal may be processed at one or more components of the network, for example, enhanced, encrypted, stored, or otherwise handled. Users 124, 125, and 126 are example recipients of the video signal who may receive the video signal through their respective client devices 121, 122, and 123, and watch the captured video.

[0017] In an example scenario, a malicious actor 112 may intercept the video signal 106 and create a deep fake video 114. The malicious actor 112 may upload the deep fake video 114 to the network 110, which may result in some or all of the users 124, 125, 126 watching the deep fake video 114 instead of the captured video.

[0018] Alteration of video footage has been known for some time, but such alterations typically take time, skilled artists, and cost highly. Deep fake technology, which is a recent development is already changing the landscape. Video dissemination through the Internet has become a major aspect of communication. News, advertising, instructions, and personal communications are some of the communications heavily relying on Internet distributed videos. As deep fake technologies develop and proliferate, anyone may have the ability to make a convincing fake video, including some people who may seek to“weaponize” the technology for political or other malicious purposes. Advances in artificial intelligence may soon make creation of convincing fake audio and video - known as“deep fakes” - relatively easy. Making a person appear to say or do something they did not has the potential to take disinformation to a whole new level.

[0019] For example, some people already question the facts around events that

unquestionably happened, like the Holocaust, the moon landing, and 9/11, despite video proof. If deep fake videos make people believe they cannot trust video, misinformation, conspiracy theories, and resulting social problems may get worse. While deep fake technology may not yet be sophisticated enough to fake large-scale historical events or conflicts, doubt sown by a single convincing deep fake video may alter public’s trust in audio and video.

[0020] According to some embodiments, authenticity for a video signal may be provided by capturing a video signal with an audio component and a video component, capturing a verification signal transmitted by a physical device on or near the person captured in the video signal, signing the audio component or the video component of the video signal with the verification signal, and transmitting the signed video signal. On the receive side, the authenticity of the video signal may be confirmed by receiving the video signal with the audio component and the video component, as well as, the verification signal, decoding the verification signal, and confirming an authenticity of the video signal based on the decoded verification signal. The verification signal may be provided by detecting the audio component or the video component of the video signal being captured, generating an audio verification signal or a video verification signal based on the detected audio component or video component, and transmitting the audio verification signal or the video verification signal by a physical device on or near a person captured in the video signal.

[0021] FIG. 2A includes examples of audio or visual verification information that may be used to confirm authenticity of a captured video, arranged in accordance with at least some embodiments described herein.

[0022] One of the example scenarios in diagram 200 A includes a video camera 210 capturing a person 202 speaking (204) and transmitting the captured video signal to a server 220. The person 202 may have a body -worn authenticity accessory 206 transmitting a verification signal 208 also captured by the video camera 210. The verification signal 208 may have an audio component and/or a video component. For example, the verification signal 208 may include an audible sound, a supra-audible sound, a flash signal that switches between light and dark gray- tones or colors, or similar ones. Another example scenario includes person 212 whose speech 214 is captured by the video camera 210 and transmitted to the server 220. Person 212 may hold a handheld device 216 (e.g., a smart phone) that transmits verification signal 218. Verification signal 218 may also include an audio component and/or a video component. For example, verification signal 218 may include a dot matrix, a QR code 217, a color image, an audible sound, or a supra-audible sound. A further example scenario may include person 222 whose speech 224 is captured by the video camera 210 and transmitted to the server 220. A display device 226 may be positioned behind person 222 and transmit 228 verification signal 227. The verification signal 227 may include an audible sound, a supra-audible sound, a flash signal that switches between light and dark gray-tones or colors, or similar ones.

[0023] A yet another example scenario may include person 232 whose speech 234 is captured by the video camera 210 and transmitted to the server 220. A display device 236 may be positioned behind person 232 and transmit 238 verification signal 237. The verification signal 237 may include a dot matrix, a QR code, a color image, an audible sound, or a supra-audible sound. The verification signal 238 may also include a dynamically changing image or an invisible video signal such as an ultraviolet signal or an infrared signal. A yet further example scenario in diagram 200 A includes a video camera 210 capturing a person 242 speaking (244) and transmitting the captured video signal to a server 220. The person 242 may have a body- worn authenticity accessory 247 transmitting a verification signal 248 also captured by the video camera 210. The verification signal 248 may be an audio signal and include an audible sound or a supra-audible sound such as an ultra-sonic signal.

[0024] Examples of body -worn authentication accessories may include a necklace, an earring, glasses, a badge, a watch, or a bracelet. Other authentication accessories may include a handheld device or a stationary device in the background of the person such as a display, an electronic picture frame, a computer display, or similar ones.

[0025] The verification signal may be generated by detecting an audio component or a video component of the video signal as the video signal is captured and generating an audio verification signal or a video verification signal based on the detected audio component or video component. For example, the verification signal may be generated based on a timing, a tonality, a speed, and/or a content of speech captured in the video signal. The audio verification signal and the video verification signal may be distinct from the audio component and the video component of the video signal, respectively.

[0026] The audio component and/or the video component of the video signal may be signed with the verification signal by including the verification signal in the audio component and/or the video component of the transmitted video signal, for example. In another example, a private key for a public/private key pair may be generated to verify a speaker in the video signal to confirm authenticity of the video signal and the video signal digitally signed with the private key before transmitting. In some examples, the digital signature may be applied to every sentence that the person says by using accessories worn by the person, and the digitally signed information may be displayed in the form of images or audio so as to be captured by the camera. Thus, when watching the captured video, a viewer can verify the authenticity of the speech in the video using the signed information included in the video.

[0027] FIG. 2B includes examples of the captured video of FIG. 2A being displayed to a user along with the audio or visual verification information to confirm authenticity of the captured video, arranged in accordance with at least some embodiments described herein.

[0028] Example scenarios in diagram 200B include example scenario 252, where person 202 speaking 204 is displayed with verification signal 208 from a video signal received from server 220. Example scenario 254 shows person 212 with speech 214 and verification signal 218. Example scenario 256 shows person 222 with speech 224 and verification signal 228. Example scenario 258 shows person 232 with speech 234 and verification signal 237. Example scenario 260 shows person 242 speaking 244 and body-worn authenticity accessory 247.

[0029] Authenticity of the video signal may be confirmed at the receive side by decoding the verification signal upon receipt of an audio component and a video component of the video signal, and the verification signal, which is distinct from the audio component and the video component of the video signal and captured at a time of capture of the video signal. The authenticity of the video signal may be confirmed based on the decoded verification signal. The verification signal may be included in the audio component and/or the video component of the video signal. Alternatively, the verification signal may be received from a verification service separately from the video signal.

[0030] In some examples, when a viewer watches the video or listens to the audio using a client device, the client device may decode the associated signals to reconstruct the sentences spoken by the speaker at the time when the video was captured and compare those sentences with the sentences spoken by the speaker in the video content. Thus, whether the speaker did say sentences that appear in the watched video when video was captured can be verified. If the video is fake, the decoding of the additional signals may not be possible, or the speech content in the signals may not match with that in the video content. In such case, the client device may warn the viewer that the authenticity of the video is in doubt. Even if the video has been cut, the decoder may still be able to reconstruct the specific context of each sentence in the video so that the client device may check the granularity of the video editing to determine that the video has been maliciously edited or leave the viewer to judge whether the editing is reasonable. In extreme circumstances, even if the fake video is produced by stitching every word in the actual videomaking, the client device may still be able to show complete sentences to which each word belongs.

[0031] FIG. 3 includes example messages that may be displayed along with a video indicating whether an authenticity of the video has been confirmed or not, arranged in accordance with at least some embodiments described herein.

[0032] Diagram 300 shows a video 302 of a person 306 speaking (304) with an indication 310 stating that the video’s authenticity is confirmed. The video 302 also includes verification signal 308 being transmitted by an authenticity accessory worn by the person 306. Video 312 in diagram 300 includes person 316 speaking (314) and indication 320 stating that the authenticity of the video is not confirmed - that is, the video may be fake. The video 312 also includes verification signal 318 being transmitted by an authenticity accessory worn by the person 316.

[0033] To confirm the authenticity of a received video signal, an audio component and a video component of the video signal may be received along with the verification signal transmitted by the authenticity accessory, a physical device, on or near the person captured in the video signal. The verification signal is distinct from the audio component and the video component of the video signal and is captured at a time of capture of the video signal. The verification signal may be decoded, and an authenticity of the video signal may be confirmed based on the decoded verification signal.

[0034] In some examples, a client device displaying the video may be configured to decode the verification signal and include the indication about authenticity in the displayed video. In other examples, a verification service may receive the verification signal (and the video) and provide confirmation to the client device regarding the video’s authenticity. In further examples, a special purpose device (e.g., a plug-in module) may perform the verification for a client device. Whether the video is confirmed authentic or not may be indicated through a textual, graphic, color, or similar scheme. For example, a message may be displayed periodically or continuously with the video. In another example, a green graphic displayed periodically or continuously may indicate confirmed authenticity, whereas a red graphic may indicate the opposite. Audio indication or comparable ones may also be used.

[0035] In some implementations, confirmation of the authenticity of a video signal may be performed in multiple steps. In a preliminary screening, a person in the video may be detected and confirmed that he/she has joined a verification plan based on face or voiceprint recognition and a signature verification mode enabled. In a signature detection step, a verification signal may be extracted. The verification signal may be in audio or video form, for example, ultrasonic frequency band of an audio, a flash point, a dot matrix, or a QR code. From the verification signal, signature information may be obtained, for example, signature information of each spoken sentence in the video. If the obtained signature information is incomplete (hash), the client device (or other device performing the confirmation) may connect to a cloud service and download complete signature information therefrom. In a comparison step, original sentences confirmed through the signature may be compared to the spoken sentences in the video. In some examples, original sentences contained in the signatures may be displayed to the user in the form of subtitles to allow the user to perform a comparison. Alternatively, speech recognition may be performed on the video to obtain sentences spoken by the speaker while the video is being played, those sentences automatically compared with the sentences in the signatures, and an indication displayed as to whether there is a match with the signature information (whether the video has been forged/altered). If the speaker is speaking in the video while no signature signal is detected, a warning may be displayed to the user indicating no confirmation was possible.

[0036] The authentication accessories worn, carried, or in a background of the speaker may include a detection component to detect an audio component or a video component of the video signal as the video signal is captured and a processor coupled to the detection component. In some examples, the processor may collect (e.g., using speech recognition technologies) sentences spoken by the speaker in real time. The processor may employ a public and private key encryption system to digitally sign each of the sentences spoken by the speaker with a private key and provide the signed verification information using a public key of the speaker to a transmission component. The detection component, the processor, and the transmission component may be implemented as an integrated accessory. Alternatively, the processor (and the detection component) may be implemented using the user’s portable device, such as a cell phone or a smart watch. The transmission component may be implemented as an accessory worn by the speaker, in some cases, which may be communicatively coupled to the processor in a wired or wireless manner. The transmission component may emit the verification signal in a variety of ways according to commands from the processor, and thereby allow a camera or a voice recorder capturing the video signal to capture the verification signal as well.

[0037] As discussed previously, the authentication accessory may display the signed verification information (verification signal) in the form of a dot matrix, a QR code, a color image, or similar visuals. The transmitted visual verification signal may be collected by a camera when video containing the speaker is captured. Alternatively, the speaker may also hold a cell phone, a smart watch, or a similar device to display the screen of the cell phone, the smart watch, or device as an image. In some cases, the authentication accessory may transmit ultrasonic waves with a frequency close to human voice, and the ultrasonic waves may be collected by a voice recorder when the video is captured. Unless intentionally filtered, ordinary editing may not remove the ultrasonic information, and therefore the ultrasonic signature information may still be contained in a version that is finally watched or listened by the viewer. In yet other examples, the accessories may only emit a flash point (to transmit signals by continuously switching between light and dark or colors). Due to limited transmission bandwidth of this approach, information of complete sentences may not be transmitted, but a centralized storage service may be employed to carry out the verification of the video.

[0038] When the transmission bandwidth for the verification signal is insufficient (e.g., when using ultrasonic waves or flash point), the authentication accessory may transmit limited information. In such cases, the authentication accessory may select and transmit a portion of the information (e.g., metadata such as time, location, or hash values of signed data) while uploading and storing the complete sentences and signature information remotely onto a cloud verification service. When a user verifies the authenticity of the video or audio, the user may download the sentences stored in the cloud verification service based on the hash values and compare them with the video. If the transmission bandwidth of the authentication accessory is sufficient (e.g., using images toward the camera), the sentences spoken by the speaker may be signed and directly transmitted along with information such as time and location, such that the client device may directly obtain information of complete sentences without the need to download from a cloud verification service.

[0039] FIG. 4 includes a conceptual illustration of speech contained in a captured video being authenticated using a digital signature, arranged in accordance with at least some embodiments described herein.

[0040] Diagram 400 shows a captured video 402 of a speaker 404 speaking (406) and wearing an authentication accessory 408. The spoken sentences 412 of the speaker 404 may be captured as audio 410 and converted to text through a speech-to-text conversion. A digital signature 416 may then be generated based on the sentences 412 through an encryption or digital signing process 414. Subsequently, the signature may be transmitted by the authentication accessory 408 as verification signal 418. In some examples, the verification signal 418 may be a limited bandwidth signal such as a flash point and include limited information directing a viewer to a cloud verification service.

[0041] The digital signature may be generated based on a timing, a tonality, a speed, and/or a content of speech captured in the video signal. In other examples, metadata associated with the captured video signal may be included in the transmitted video signal. The metadata may include a time of capture, a location of capture, a hash value of the verification signal, or a combination thereof.

[0042] FIG. 5 includes a conceptual illustration of confirmation of authenticity of a captured video using a digital signature in a multi-channel environment, arranged in accordance with at least some embodiments described herein.

[0043] Diagram 500 shows a captured video 502 of a speaker 506 speaking (504) and wearing an authentication accessory 508. The captured video 502 and its content may be transmitted through a first channel 510 with a signature 512 to a client device 514 to be viewed by a user 516 as described herein. In some embodiments, content 522 associated with the captured video 502 may be transmitted through a second channel 526 to the client device 532 to be viewed (and/or listened to) by user 534. For example, the content 522 for the second channel 526 may be a translation of the speech in the captured video 502. The translation may be machine translation or translation by a person 528 (e.g., sign language). A server 530 may manage generation, storage, transmission of the second channel contents. To ensure authenticity of the content of the second channel 526, a signature or endorsement 524 may be provided for the second channel 526.

[0044] The authenticity of the second channel 526 may be verified by endorsing a private key associated with the secondary channel, for example. In some implementations, a time limitation may be imposed on the endorsement. A single endorsement associated with the speech in the captured video signal may be allowed for further security. In other implementations, the private key associated with the secondary channel may be endorsed through one or more of a near field wireless interaction or storage of the endorsement at a server (e.g., server 530). The captured video signal and the verification signal may be transmitted together to a user, or the captured video signal may be transmitted to the user and the verification signal may be transmitted to a verification service.

[0045] FIG. 6 illustrates a computing device, which may be used to provide authenticity of video signal based on signature, arranged in accordance with at least some embodiments described herein.

[0046] In an example basic configuration 602, the computing device 600 may include one or more processors 604 and a system memory 606. A memory bus 608 may be used to communicate between the processor 604 and the system memory 606. The basic configuration 602 is illustrated in FIG. 6 by those components within the inner dashed line.

[0047] Depending on the desired configuration, the processor 604 may be of any type, including but not limited to a microprocessor (mR), a microcontroller (pC), a digital signal processor (DSP), or any combination thereof. The processor 604 may include one or more levels of caching, such as a cache memory 612, a processor core 614, and registers 616. The example processor core 614 may include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP core), or any combination thereof. An example memory controller 618 may also be used with the processor 604, or in some implementations, the memory controller 618 may be an internal part of the processor 604.

[0048] Depending on the desired configuration, the system memory 606 may be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. The system memory 606 may include an operating system 620, a security management application 622, and program data 624. The security management application 622 may include an authentication module 626. The authentication module 626, in conjunction with the security management application 622 may be configured to receive a captured video signal, where the video signal includes an audio component and a video component; receive a captured verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal and captured at a time of capture of the video signal; sign one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and transmit the signed video signal. The program data 624 may include verification data 628, among other data, as described herein.

[0049] The computing device 600 may have additional features or functionality, and additional interfaces to facilitate communications between the basic configuration 602 and any desired devices and interfaces. For example, a bus/interface controller 630 may be used to facilitate communications between the basic configuration 602 and one or more data storage devices 632 via a storage interface bus 634. The data storage devices 632 may be one or more removable storage devices 636, one or more non-removable storage devices 638, or a combination thereof. Examples of the removable storage and the non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDDs), optical disk drives such as compact disc (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSDs), and tape drives to name a few. Example computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.

[0050] The system memory 606, the removable storage devices 636 and the non-removable storage devices 638 are examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD- ROM, digital versatile disks (DVDs), solid state drives (SSDs), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to store the desired information and which may be accessed by the computing device 600. Any such computer storage media may be part of the computing device 600. [0051] The computing device 600 may also include an interface bus 640 for facilitating communication from various interface devices (e.g., one or more output devices 642, one or more peripheral interfaces 650, and one or more communication devices 660) to the basic configuration 602 via the bus/interface controller 630. Some of the example output devices 642 include a graphics processing unit 644 and an audio processing unit 646, which may be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 648. One or more example peripheral interfaces 650 may include a serial interface controller 654 or a parallel interface controller 656, which may be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 658. An example communication device 660 includes a network controller 662, which may be arranged to facilitate communications with one or more other computing devices 666 over a network communication link via one or more communication ports 664. The one or more other computing devices 666 may include servers at a datacenter, customer equipment, and comparable devices.

[0052] The network communication link may be one example of a communication media. Communication media may be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media. A“modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media. The term computer readable media as used herein may include non- transitory storage media.

[0053] The computing device 600 may be implemented as a part of a specialized server, mainframe, or similar computer that includes any of the above functions. The computing device 600 may also be implemented as a personal computer including both laptop computer and non laptop computer configurations.

[0054] FIG. 7 is a flow diagram illustrating an example method for confirmation of authenticity of a video signal based on a signature that may be performed by a computing device such as the computing device in FIG. 6, arranged in accordance with at least some embodiments described herein.

[0055] Example methods may include one or more operations, functions, or actions as illustrated by one or more of blocks 722, 724, 726, and 728 may in some embodiments be performed by a computing device such as the computing device 710 in FIG. 7. Such operations, functions, or actions in FIG. 7 and in the other figures, in some embodiments, may be combined, eliminated, modified, and/or supplemented with other operations, functions or actions, and need not necessarily be performed in the exact sequence as shown. The operations described in the blocks 722-728 may be implemented through execution of computer-executable instructions stored in a computer-readable medium such as a computer-readable medium 720 of a computing device 710.

[0056] An example process for confirmation of authenticity of a video signal may begin with block 722,“CAPTURE A VIDEO SIGNAL WITH AN AUDIO COMPONENT AND A VIDEO COMPONENT”, where a video may be captured by a camera or similar device. The captured video may include a person speaking. To prevent a forgery of the video from being disseminated, an authenticity of the video and its contents such as the speech by the person in the video, an audio and/or a video component of the video may be signed through a verification signal.

[0057] Block 722 may be followed by block 724,“CAPTURE A VERIFICATION

SIGNAL TRANSMITTED BY A PHYSICAL DEVICE ON OR NEAR A PERSON CAPTURED IN THE VIDEO SIGNAL, THE VERIFICATION SIGNAL DISTINCT FROM THE AUDIO COMPONENT AND THE VIDEO COMPONENT OF THE VIDEO SIGNAL AND CAPTURED AT A TIME OF CAPTURE OF THE VIDEO SIGNAL”, where a verification signal transmitted by a physical device (authentication accessory) on or near a person speaking in the video may be captured. The verification signal may be generated based on contents of an audio or video component of the video and captured at the time of capture of the video.

[0058] Block 724 may be followed by block 726,“SIGN THE AUDIO COMPONENT AND/OR THE VIDEO COMPONENT OF THE VIDEO SIGNAL WITH THE

VERIFICATION SIGNAL TO PROVIDE THE AUTHENTICITY OF THE VIDEO SIGNAL”, where the audio component and/or the video component may be signed with the verification signal. The verification signal may be an audio or video signal transmitted by an authentication accessory. The verification signal may include, for example, an audible verification signal, a supra-audible verification signal, a visible video verification signal, and/or an invisible video verification signal. Example verification signals may further include an ultra-sonic signal, an ultraviolet signal, an infrared signal, a stationary image, a dynamically changing image, a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray- tones or colors. The verification signal may be generated based on a timing, a tonality, a speed, and/or a content of speech captured in the video signal.

[0059] Block 726 may be followed by block 728,“TRANSMIT THE SIGNED VIDEO SIGNAL”, where the captured video along with the verification signal (signature) may be transmitted directly to a user or through a dissemination service.

[0060] The operations included in the process described above are for illustration purposes. Confirmation of authenticity of a video signal based on a signature may be implemented by similar processes with fewer or additional operations, as well as in different order of operations using the principles described herein. The operations described herein may be executed by one or more processors operated on one or more computing devices, one or more processor cores, and/or specialized processing devices, among other examples.

[0061] FIG. 8 illustrates a block diagram of an example computer program product, arranged in accordance with at least some embodiments described herein.

[0062] In some examples, as shown in FIG. 8, a computer program product 800 may include a signal bearing medium 802 that may also include one or more machine readable instructions 804 that, in response to execution by, for example, a processor may provide the functionality described herein. Thus, for example, referring to the processor 604 in FIG. 6, the security management application 622 may perform or control performance of one or more of the tasks shown in FIG. 8 in response to the instructions 804 conveyed to the processor 604 by the signal bearing medium 802 to perform actions associated with the confirmation of authenticity of a video signal as described herein. Some of those instructions may include, for example, capture the video signal, where the video signal includes an audio component and a video component; capture a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal; sign one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and transmit the signed video signal, according to some embodiments described herein.

[0063] In some implementations, the signal bearing medium 802 depicted in FIG. 8 may encompass computer-readable medium 806, such as, but not limited to, a hard disk drive (HDD), a solid state drive (SSD), a compact disc (CD), a digital versatile disk (DVD), a digital tape, memory, and comparable non-transitory computer-readable storage media. In some

implementations, the signal bearing medium 802 may encompass recordable medium 808, such as, but not limited to, memory, read/write (R/W) CDs, R/W DVDs, etc. In some

implementations, the signal bearing medium 802 may encompass communications medium 810, such as, but not limited to, a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communication link, a wireless communication link, etc.). Thus, for example, the computer program product 800 may be conveyed to one or more modules of the processor 604 by an RF signal bearing medium, where the signal bearing medium 802 is conveyed by the communications medium 810 (e.g., a wireless communications medium conforming with the IEEE 802.11 standard).

[0064] According to some examples, a method to provide authenticity for a video signal is described. The method may include capturing the video signal, where the video signal includes an audio component and a video component; capturing a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal; signing one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal; and transmitting the signed video signal.

[0065] According to other examples, capturing the verification signal may include capturing one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal. Capturing the supra- audible verification signal may include capturing an ultra-sonic signal. Capturing the invisible video verification signal may include capturing an ultraviolet signal or an infrared signal.

Capturing the visible video verification signal may include capturing a stationary image or a dynamically changing image. Capturing the visible video verification signal may include capturing one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors. Capturing the audible verification signal may include capturing a speech by the person captured in the video signal; and generating the verification signal based on one or more of a timing, a tonality, a speed, or a content of speech in the captured video signal.

[0066] According to further examples, capturing the verification signal may include capturing the verification signal from an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person. Signing one or more of the audio component or the video component of the video signal with the verification signal may comprise including the verification signal in the one or more of the audio component or the video component of the transmitted video signal. Signing one or more of the audio component or the video component of the video signal with the verification signal may include generating a private key for a public/private key pair to verify the authenticity of the video signal; and digitally signing the video signal with the private key before transmitting.

[0067] According to some examples, the method may also include including metadata associated with the captured video signal in the transmitted video signal. Including the metadata associated with the captured video signal in the transmitted video signal may comprise transmitting one or more of a time of capture, a location of capture, or a hash value of the verification signal. The method may also include verifying authenticity of a secondary channel for the transmitted video signal by endorsing a private key associated with the secondary channel. The secondary channel may be an audio channel or a video channel to present a translation of speech in the captured video signal. The method may further include imposing a time limitation on the endorsement or allowing a single endorsement associated with the speech in the captured video signal. Endorsing the private key associated with the secondary channel may include endorsing the private key associated with the secondary channel through one or more of a near field wireless interaction or storage of the endorsement at a server. Transmitting the signed video signal may include transmitting the captured video signal and the verification signal together to a recipient; or transmitting the captured video signal to the recipient and the verification signal to a verification service. [0068] According to other examples, a method to confirm authenticity of a video signal is described. The method may include receiving an audio component and a video component of the video signal; receiving a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal; decoding the verification signal; and confirming an authenticity of the video signal based on the decoded verification signal.

[0069] According to further examples, receiving the verification signal may include receiving the verification signal included in one or more of the audio component or the video component of the video signal. Receiving the verification signal may also include receiving the verification signal from a verification service separately from the video signal. Receiving the verification signal may include receiving one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal. Receiving the supra- audible verification signal may include receiving an ultra-sonic signal. Receiving the invisible video verification signal may include receiving an ultraviolet signal or an infrared signal. Receiving the visible video verification signal may include receiving a stationary image or a dynamically changing image.

[0070] According to some examples, receiving the visible video verification signal may include receiving one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors. Receiving the audible verification signal may include receiving the verification signal generated based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal. Receiving the verification signal may include receiving the verification signal by an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of a speaker. Receiving the verification signal may also include receiving a public key for a public/private key pair generated based on the verification signal; and decoding the digitally signed video signal with the public key to verify that the video signal was signed with a private key of the public/private key pair.

[0071] According to other examples, the method may also include receiving metadata associated with the video signal. Receiving the metadata associated with the video signal may include receiving one or more of a time of capture, a location of capture, or a hash value of the verification signal along with the video signal. The method may further include verifying authenticity of a secondary channel for the received video signal by receiving an endorsement of a private key associated with the secondary channel. The secondary channel may be an audio channel or a video channel to present a translation of speech in the video signal. Receiving the endorsement of the private key associated with the secondary channel may include receiving the endorsement of the private key associated with the secondary channel through one or more of a near field wireless interaction or retrieval of the endorsement from a server.

[0072] According to further examples, a method to provide a verification signal for confirmation of authenticity of a video signal is described. The method may include detecting an audio component or a video component of a video signal being captured; generating an audio verification signal or a video verification signal based on the detected audio component or video component; and transmitting the audio verification signal or the video verification signal by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured in the video signal at a time of capture of the video signal.

[0073] According to some examples, generating the audio verification signal or the video verification signal may include generating one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal. Generating the supra-audible verification signal may include generating an ultra-sonic signal. Generating the invisible video verification signal may include generating an ultraviolet signal or an infrared signal. Generating the visible video verification signal may include generating a stationary image or a dynamically changing image. Generating the visible video verification signal may include generating one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray-tones or colors. Generating the audible verification signal may include generating the audio verification signal or the video verification signal based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal. Transmitting the audio verification signal or the video verification signal may include transmitting the audio verification signal or the video verification signal by an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person. [0074] According to some examples, an apparatus to provide authenticity for a video signal is described. The apparatus may include a capture device configured to capture an audio component and a video component of the video signal; and capture a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal, and captured at a time of capture of the video signal. The apparatus may also include a processor coupled to the capture device and configured to sign one or more of the audio component or the video component of the video signal with the verification signal to provide the authenticity of the video signal. The apparatus may further include a communication device coupled to the processor and configured to transmit the signed video signal.

[0075] According to other examples, to capture the verification signal, the capture device may be further configured to capture one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal. The supra- audible verification signal may include an ultra-sonic signal. The invisible video verification signal may include an ultraviolet signal or an infrared signal. The visible video verification signal may include a stationary image or a dynamically changing image. The visible video verification signal may include one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray-tones or colors. To capture the audible verification signal, the capture device may be further configured to capture a speech by the person captured in the video signal; and generate the verification signal based on one or more of a timing, a tonality, a speed, or a content of speech in the captured video signal.

[0076] According to further examples, the capture device may be configured to capture the verification signal from an authentication accessory comprising one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person. The processor may be configured to sign one or more of the audio component or the video component of the video signal with the verification signal through inclusion of the verification signal in the one or more of the audio component or the video component of the transmitted video signal. To sign one or more of the audio component or the video component of the video signal with the verification signal, the processor may be configured to generate a private key for a public/private key pair based on the verification signal; and digitally sign the video signal with the private key before transmission. The processor may be further configured to include metadata associated with the captured video signal in the transmitted video signal. The metadata may include one or more of a time of capture, a location of capture, or a hash value of the verification signal.

[0077] According to some examples, the processor may be further configured to verify authenticity of a secondary channel for the transmitted video signal through endorsement of a private key associated with the secondary channel. The secondary channel may be an audio channel or a video channel to present a translation of speech in the captured video signal. The processor may be further configured to impose a time limitation on the endorsement or allow a single endorsement associated with the speech in the captured video signal. To endorse the private key associated with the secondary channel, the processor may be configured to endorse the private key associated with the secondary channel through one or more of a near field wireless interaction or storage of the endorsement at a server. The communication device may be configured to transmit the captured video signal and the verification signal together to a recipient; or transmit the captured video signal to the recipient and the verification signal to a verification service.

[0078] According to other examples, an authentication accessory to provide a verification signal for confirmation of authenticity of a video signal is described. The authentication accessory may include a detection component configured to detect an audio component or a video component of the video signal as the video signal is captured, and a processor coupled to the detection component. The processor may be configured to generate an audio verification signal or a video verification signal based on the detected audio component or video component, where the audio verification signal and the video verification signal are distinct from the audio component and the video component of the video signal, respectively. The authentication accessory may also include a transmission component coupled to the processor, where the transmission component is a physical device on or near a person captured in the video signal and configured to transmit the audio verification signal or the video verification signal.

[0079] According to further examples, the processor may be configured to generate one or more of an audible verification signal, a supra-audible verification signal, a visible video verification signal, or an invisible video verification signal. The supra- audible verification signal may include an ultra-sonic signal. The invisible video verification signal may include an ultraviolet signal or an infrared signal. The visible video verification signal may include a stationary image or a dynamically changing image. The visible video verification signal may include one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray -tones or colors. The processor may be configured to generate the audible verification signal based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal. The authentication accessory may be one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of the person.

[0080] According to further examples, a system to confirm authenticity of a video signal is described. The system may include a first component configured to receive an audio component and a video component of the video signal. The system may also include a second component configured to receive a verification signal transmitted by a physical device on or near a person captured in the video signal, where the verification signal is distinct from the audio component and the video component of the video signal and captured at a time of capture of the video signal. The second component may also decode the verification signal and confirm an authenticity of the video signal based on the decoded verification signal. The system may further include a third component configured to present the video signal with the confirmed authenticity to a user.

[0081] According to some examples, the first component may be further configured to receive the verification signal included in one or more of the audio component or the video component of the video signal; separate the verification signal from the one or more of the audio component or the video component of the video signal; and provide the verification signal to the second component. The second component may be configured to receive the verification signal from a verification service separately from the video signal. The first component and the second component may be integrated. The verification signal may include one or more of an audible verification signal, a supra- audible verification signal, a visible video verification signal, or an invisible video verification signal. The supra- audible verification signal may include an ultra sonic signal. The invisible video verification signal may include an ultraviolet signal or an infrared signal. The visible video verification signal may include a stationary image or a dynamically changing image. The visible video verification signal may include one or more of a dot matrix, a QR code, a color image, or a flash signal that switches between light and dark gray- tones or colors. [0082] According to other examples, the verification signal may be generated based on one or more of a timing, a tonality, a speed, or a content of speech captured in the video signal. The physical device may be an authentication accessory and may include one or more of a necklace, an earring, glasses, a badge, a watch, a bracelet, a handheld device, or a stationary device in a background of a speaker. The second component may be further configured to receive a public key for a public/private key pair generated based on the verification signal; and decode the digitally signed video signal with the public key to verify that the video signal was signed with a private key of the public/private key pair. The second component may be further configured to receive metadata associated with the video signal. The metadata associated with the video signal may include one or more of a time of capture, a location of capture, or a hash value of the verification signal along with the video signal.

[0083] According to further examples, the second component may be further configured to verify authenticity of a secondary channel for the received video signal through receipt of an endorsement of a private key associated with the secondary channel. The secondary channel may be an audio channel or a video channel to present a translation of speech in the video signal. The endorsement of the private key associated with the secondary channel may be received through one or more of a near field wireless interaction or retrieval of the endorsement from a server.

One or more of the first component, the second component, and the third component may include a server, a personal computing device, a wearable computing device, or a special purpose computing device.

[0084] There are various vehicles by which processes and/or systems and/or other technologies described herein may be affected (e.g., hardware, software, and/or firmware), and the preferred vehicle will vary with the context in which the processes and/or systems and/or other technologies are deployed. For example, if an implementer determines that speed and accuracy are paramount, the implementer may opt for mainly hardware and/or firmware vehicle; if flexibility is paramount, the implementer may opt for mainly software implementation; or, yet again alternatively, the implementer may opt for some combination of hardware, software, and/or firmware.

[0085] The foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of block diagrams, flowcharts, and/or examples. Insofar as such block diagrams, flowcharts, and/or examples contain one or more functions and/or operations, each function and/or operation within such block diagrams, flowcharts, or examples may be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one embodiment, several portions of the subject matter described herein may be implemented via application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other integrated formats. However, t some aspects of the embodiments disclosed herein, in whole or in part, may be equivalently implemented in integrated circuits, as one or more computer programs executing on one or more computers (e.g., as one or more programs executing on one or more computer systems), as one or more programs executing on one or more processors (e.g., as one or more programs executing on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and/or firmware are possible in light of this disclosure.

[0086] The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope.

Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, are possible from the foregoing descriptions. Such modifications and variations are intended to fall within the scope of the appended claims. The present disclosure is to be limited only by the terms of the appended claims, along with the full scope of equivalents to which such claims are entitled. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting.

[0087] In addition, the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies regardless of the particular type of signal bearing medium used to actually carry out the distribution. Examples of a signal bearing medium include, but are not limited to, the following: a recordable type medium such as a floppy disk, a hard disk drive (HDD), a compact disc (CD), a digital versatile disk (DVD), a digital tape, a computer memory, a solid state drive (SSD), etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communication link, a wireless communication link, etc.). [0088] It is common within the art to describe devices and/or processes in the fashion set forth herein, and thereafter use engineering practices to integrate such described devices and/or processes into data processing systems. That is, at least a portion of the devices and/or processes described herein may be integrated into a data processing system via a reasonable amount of experimentation. A data processing system may include one or more of a system unit housing, a video display device, a memory such as volatile and non-volatile memory, processors such as microprocessors and digital signal processors, computational entities such as operating systems, drivers, graphical user interfaces, and applications programs, one or more interaction devices, such as a touch pad or screen, and/or control systems including feedback loops and control motors.

[0089] A data processing system may be implemented utilizing any suitable commercially available components, such as those found in data computing/communication and/or network computing/communication systems. The herein described subject matter sometimes illustrates different components contained within, or connected with, different other components. Such depicted architectures are merely exemplary, and in fact, many other architectures may be implemented which achieve the same functionality. In a conceptual sense, any arrangement of components to achieve the same functionality is effectively "associated" such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality may be seen as "associated with" each other such that the desired functionality is achieved, irrespective of architectures or intermediate components. Likewise, any two components so associated may also be viewed as being "operably connected", or "operably coupled", to each other to achieve the desired functionality, and any two components capable of being so associated may also be viewed as being "operably couplable", to each other to achieve the desired functionality. Specific examples of operably couplable include but are not limited to physically connectable and/or physically interacting components and/or wirelessly interactable and/or wirelessly interacting components and/or logically interacting and/or logically interactable components.

[0090] With respect to the use of substantially any plural and/or singular terms herein, those having skill in the art can translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity. [0091] In general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as“open” terms (e.g., the term“including” should be interpreted as“including but not limited to,” the term“having” should be interpreted as “having at least,” the term“includes” should be interpreted as“includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation, no such intent is present. For example, as an aid to

understanding, the following appended claims may contain usage of the introductory phrases "at least one" and "one or more" to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles "a" or "an" limits any particular claim containing such introduced claim recitation to embodiments containing only one such recitation, even when the same claim includes the introductory phrases "one or more" or "at least one" and indefinite articles such as "a" or "an" (e.g.,“a” and/or“an” should be interpreted to mean“at least one” or“one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should be interpreted to mean at least the recited number (e.g., the bare recitation of "two recitations," without other modifiers, means at least two recitations, or two or more recitations).

[0092] Furthermore, in those instances where a convention analogous to“at least one of A, B, and C, etc.” is used, in general, such a construction is intended in the sense one having skill in the art would understand the convention (e.g.,“a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase“A or B” will be understood to include the possibilities of “A” or“B” or“A and B.”

[0093] For any and all purposes, such as in terms of providing a written description, all ranges disclosed herein also encompass any and all possible subranges and combinations of subranges thereof. Any listed range can be easily recognized as sufficiently describing and enabling the same range being broken down into at least equal halves, thirds, quarters, fifths, tenths, etc. As a non-limiting example, each range discussed herein can be readily broken down into a lower third, middle third and upper third, etc. As will also be understood by one skilled in the art all language such as“up to,”“at least,”“greater than,”“less than,” and the like include the number recited and refer to ranges which can be subsequently broken down into subranges as discussed above. Finally, a range includes each individual member. Thus, for example, a group having 1-3 cells refers to groups having 1, 2, or 3 cells. Similarly, a group having 1-5 cells refers to groups having 1, 2, 3, 4, or 5 cells, and so forth.

[0094] While various aspects and embodiments have been disclosed herein, other aspects and embodiments are possible. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.