Hardware-anchored digital content authentication. Prove authenticity at the moment of capture, fight deepfakes with cryptography, not detection.
One was captured by a camera. One was generated by a model. Hit reveal to see which is which.
Generative AI now produces content that is indistinguishable from reality. Detection lags. Trust erodes faster than tools can catch up.
Move authenticity from detection to origin. A signed manifest is emitted the instant a frame is captured.
End-to-end architecture, capture device, verification backend, immutable on-chain anchor.
A frame from our actual ESP32-CAM. Modest sensor on purpose, the goal is verifiable provenance, not cinema.
Multi-layer cryptographic protection. Deterministic primitives, no AI in the trust path.
Small surface area, standard cryptography, public ledger.
Every layer carries its own guarantee, and a way to detect when it fails.
Private keys never leave the secure element.
Physical sensors trigger key zeroization.
Sequence numbers prevent duplicates.
Anchored on a public ledger, can not be edited.
| Property | Traditional | PleasEye |
|---|---|---|
| Proves origin at capture | ||
| Hardware-backed security | ||
| Immutable record | ||
| Works without AI | ||
| Tamper-resistant |
One primitive, provenance at capture, applied across high-stakes domains.
Verify photos and videos from trusted sources, combat misinformation.
Cryptographically signed evidence with chain-of-custody.
Authentic-capture badges on public feeds.
Authenticate research images and medical documentation.
Software Engineering students at Çankaya University, building a graduation project on the future of digital trust.
Software Engineering Department
SENG 491-492, 2025-2026