⚡ CONCEPT DEMONSTRATION This is a proof-of-concept showing how AI content should be: sovereign, secure, and accountable. Use at your own risk. Fork it, improve it, share it.

🔐 Admin Login

Service operator authentication

🔐

elaraSign

BUILD

Content Provenance Standard

"Transparency is not optional"

âŗ Checking forensic status...

đŸ–ŧī¸ Image Signing

Embeds provenance metadata (EXIF/PNG) + sidecar JSON. Survives basic editing (Paint, rename). Screenshot = re-encode = metadata lost (keep sidecar).

đŸ–ŧī¸

Drop image here

PNG, JPG, WebP, GIF, TIFF â€ĸ Max 50MB

đŸŽŦ Video Signing

Creates sidecar JSON with content hash and metadata. Video file unchanged (sidecar approach for lossless compatibility).

đŸŽŦ

Drop video here

MP4, WebM, MOV â€ĸ Max 500MB

đŸŽĩ Audio Signing

Creates sidecar JSON with content hash and metadata. Audio file unchanged (sidecar approach for format compatibility).

đŸŽĩ

Drop audio here

WAV, MP3, FLAC, OGG â€ĸ Max 100MB

📄 Document Signing

Embeds metadata in PDF properties. Creates sidecar for verification.

📄

Drop PDF here

PDF only â€ĸ Max 50MB

🔍 Verify Any File

Check if a file has elaraSign provenance embedded, or validate against a sidecar JSON.

🔍

Drop file here

Images, PDFs, Audio, or Video files

📋 Optional: Validate Against Sidecar

📄

Drop sidecar JSON here

Validates file against provenance data

â„šī¸ About elaraSign

Understanding the content hash system and multi-layer verification.

🔐 Content Hash System

Every file gets a unique cryptographic fingerprint using SHA-256:

  • Content Hash: Full SHA-256 of the raw file bytes (no truncation)
  • Metadata Hash: Full SHA-256 of the JSON metadata (no truncation)
  • 64-bit Timestamp: Millisecond precision, future-proof until year 292 billion

This ensures tamper-proof provenance - any change to the file breaks the signature.

đŸŽ¯ Multi-Location Redundancy (Images)

Images embed signatures in 5 locations for maximum crop resistance:

📍 Top-Left (48×4 pixels)
📍 Top-Right (4×48 pixels)
📍 Bottom-Left (48×4 pixels)
📍 Bottom-Right (4×48 pixels)
📍 Center (48×4 pixels) - hidden in plain sight

Even aggressive cropping leaves at least one signature intact!

📋 Sidecar Validation

Upload a sidecar JSON file to verify any image matches its provenance:

  • Checks content hash against the file
  • Validates metadata integrity
  • Confirms generation method and timestamp

Perfect for verifying downloaded content or shared files.

📄 PDF Digital Signatures

PDFs get industry-standard PKCS#7 signatures that Adobe recognizes:

  • Visible signatures in Adobe Reader
  • Green checkmarks from online validators
  • Legal validity for documents

Combines elaraSign metadata with standard digital certificates.

🔍 Verification Layers

Files are checked through multiple verification layers:

  1. Billboard: Human-readable metadata (EXIF/PNG chunks)
  2. DNA: Hidden steganographic signatures (LSB pixels)
  3. The Spread: DCT watermark (survives JPEG compression)

Each layer provides different resilience to processing and editing.

⚡ Admin Panel

Forensic decryption for legal accountability. Master key required.

🔓 Forensic Decryption

Upload a signed image to decrypt embedded accountability data:

🔐

Drop signed image here

PNG, JPG, WebP, GIF, TIFF â€ĸ Max 50MB

📋 What Gets Decrypted

  • Timestamp: Exact signing time (millisecond precision)
  • User Fingerprint: SHA-256 hash prefix for user lookup
  • IP Address: IPv4 address of the signer
  • Platform: Which service generated the signature

This data is encrypted with the master key and embedded in pixel data. Only the key holder can decrypt it.

âš ī¸ Legal Use Only

Forensic decryption should only be used in response to valid legal requests from authorities. Misuse violates user privacy.