Proteus
AI Data Provenance
Danny Bessonov, Aayush Gupta, Rohan Sanjay
Agenda
1
3
2
4
5
6
Motivation
Proteus V1 + Demo
Existing techniques
Privacy
Proteus V2
Extensions
Motivation
X
Provenance is important
Provenance is important
Existing techniques
X
Image watermarking
C2PA
Proteus V1
X
Decoupling the process
Track content regardless of modification
Prove that modified content came from the original
Perceptual hashes
A potpourri of algorithms ensures robustness to common adversarial attacks.
Content Generation Phase
Content Consumption Phase
Bayes Optimization
Privacy
X
Privacy
Privacy
Image registry
Private image
Private image
Private image
Public, modified image
Proof
this image exists + can be re-created through transformation
Privacy cont.
Public
Private
Crop: [x=0, y=500, w=400, h=600]
Signature on original image from X
Circuit
1. �phash(transform(original)) ==�phash(modified image)
2.�signature of phash exists for org. X
Organization X PK
signature appears on-chain at timestamp Y
Demo
X
Proteus V2
X
Content Generation Phase
Probability Bounds
Content Consumption Phase
Appendix
X
Ideal, real-world scheme