Peripheral Literature for C2PA

C2PA use case

C2PA implementation

Image metadata

Phone keystore security