What Is C2PA Metadata? Content Provenance and Authenticity Explained

Apr 4, 2026

The proliferation of AI-generated content has created an urgent need for reliable ways to verify where an image came from and how it was created. C2PA — the Coalition for Content Provenance and Authenticity — has emerged as the leading technical standard for addressing this challenge. This guide explains what C2PA is, how it works under the hood, which tools use it, and what it means for privacy and content creators.

What Is C2PA?

C2PA stands for the Coalition for Content Provenance and Authenticity. It is a joint development foundation founded by Adobe, Microsoft, BBC, Intel, Truepic, and Arm in 2021, hosted under the Linux Foundation's Joint Development Foundation.

The C2PA specification defines a technical standard for embedding provenance information — essentially a verified history of where a piece of content came from and what has happened to it — directly within the content file itself.

The Problem C2PA Solves

In an era where AI can generate photorealistic images in seconds, the traditional assumption that "seeing is believing" no longer holds. The challenges include:

  • Misinformation — AI-generated images used to spread false information
  • Copyright disputes — Difficulty proving ownership or origin of digital content
  • Deepfake detection — Need for reliable methods to distinguish real from synthetic content
  • Supply chain transparency — Understanding the origin and modifications of media assets

C2PA addresses these by creating a tamper-evident chain of provenance that travels with the content.

Content Credentials

C2PA's consumer-facing brand is Content Credentials. When you see a "CR" symbol on an image or video, it indicates that C2PA provenance data is attached. Content Credentials can include:

  • The tool or device that created the content
  • The date and time of creation
  • Any AI tools used in the creation process
  • Edit history and modifications
  • Cryptographic proof of authenticity

How C2PA Works Technically

C2PA's technical architecture is built on several established standards and data structures. Understanding these helps clarify what C2PA metadata actually is and how it functions.

JUMBF Boxes

C2PA stores its data using JUMBF (JPEG Universal Metadata Box Format). JUMBF is an ISO standard (ISO 19566) that defines a generic container format for embedding metadata in JPEG, PNG, WebP, and other image file formats.

A JUMBF box is a structured data container that can hold various types of metadata. In the C2PA context, JUMBF boxes hold the provenance manifests. The structure looks like this:

File Structure:
├── Image Data (pixels)
├── Standard Metadata (EXIF, XMP, etc.)
└── JUMBF Box
    └── C2PA Manifest
        ├── Claim (what happened)
        ├── Assertion(s) (details about tools, actions)
        └── Signature (cryptographic proof)

Manifests and Assertions

A C2PA manifest is the core data structure that captures provenance information. Each manifest contains:

Claims

A claim describes a specific action or assertion about the content. For example:

  • "This image was created by Adobe Firefly on 2026-03-15"
  • "This image was cropped to 800x600 on 2026-03-16"
  • "This image was generated using AI model version 3.0"

Assertions

Assertions provide the detailed data behind claims. C2PA defines several standard assertion types:

  • Creative Work — Identifies the software or device used
  • Actions — Lists operations performed on the content
  • AI Generated — Specifically marks content as AI-generated
  • Digital Source Type — Categorizes the content origin

Ingredients

When content is derived from other content (for example, an edited photo), the manifest can reference "ingredient" manifests from the source material, creating a chain of provenance.

Certificate Chains and Digital Signatures

C2PA uses public key cryptography to ensure the integrity and authenticity of provenance data.

How Signing Works

  1. The content creator (or their tool) generates a manifest with claims and assertions
  2. The manifest is cryptographically signed using the creator's private key
  3. The signature is embedded alongside the manifest in the JUMBF box
  4. Verification tools use the corresponding public key (from a certificate) to validate the signature

Certificate Chain

The certificate used for signing is part of a chain that traces back to a trusted root certificate authority. This chain provides:

  • Identity verification — Confirms who signed the manifest
  • Trust establishment — Links the signer to a trusted authority
  • Tamper evidence — Any modification to the manifest invalidates the signature

What Happens When Content Is Modified

When C2PA-signed content is edited:

  • The original manifest remains (as an ingredient)
  • A new manifest is added describing the modification
  • The new manifest is signed by whoever performed the edit
  • This creates a chain of provenance from creation through all modifications

If someone strips a manifest or modifies the content without adding a new manifest, the provenance chain breaks and verification tools will flag the content as having incomplete or invalid provenance.

Which AI Tools Use C2PA?

C2PA adoption is growing across the AI and content creation industry. Here are the major tools and platforms that currently embed C2PA metadata.

Adobe Firefly

Adobe was a founding member of the C2PA and Firefly (Adobe's AI image generator) was one of the first tools to embed C2PA Content Credentials. Every image generated by Adobe Firefly includes:

  • Generator identification (Adobe Firefly)
  • Model version information
  • Timestamp of generation
  • AI-generated content assertion

Microsoft Designer and Bing Image Creator

Microsoft, another C2PA founder, embeds C2PA metadata in images generated through Microsoft Designer (which uses DALL-E under the hood). This provides provenance tracking for images created through Microsoft's AI tools.

OpenAI DALL-E

OpenAI has begun integrating C2PA metadata into DALL-E outputs. The rollout has been progressive, with newer generations more likely to include C2PA data than older ones.

Leica Cameras

In an interesting hardware application, Leica has integrated C2PA Content Credentials directly into their M11-P camera. Photos taken with this camera are signed at the point of capture, providing hardware-level proof that an image is a real photograph rather than AI-generated.

Other Adopters

Additional C2PA adopters include:

  • Truepic — Camera and verification tools
  • BBC — For news content provenance
  • Getty Images — For stock photography verification
  • Various news organizations — Implementing Content Credentials for editorial content

How to Check if an Image Has C2PA Data

There are several ways to check for C2PA metadata in images.

Using Our Detection Tool

The AI watermark detector checks for C2PA manifests as part of its comprehensive analysis. Upload your image and the tool will report:

  • Whether C2PA data is present
  • The signer and certificate chain
  • The claims and assertions in the manifest
  • Whether the signature is valid

Using c2patool

The C2PA project provides an open-source command-line tool:

# Install c2patool
npm install -g c2patool

# Check an image for C2PA data
c2patool your_image.jpg

# Output detailed manifest information
c2patool your_image.jpg --detailed

Using Content Credentials Website

Adobe operates contentcredentials.org where you can drag and drop images to check for C2PA provenance data. This provides a user-friendly interface for verifying Content Credentials.

Browser Extensions

Several browser extensions can detect and display C2PA data when you encounter signed images while browsing the web.

Privacy Implications

C2PA raises important privacy considerations that content creators and consumers should understand.

What Information Is Revealed

C2PA metadata can potentially reveal:

  • Identity information — The certificate used for signing may contain organizational details
  • Timestamps — When content was created and modified
  • Tool information — What software and hardware was used
  • Edit history — What modifications were made to the content

Privacy Concerns

  • Unintended disclosure — Creators may not realize how much information they are embedding
  • Tracking potential — C2PA could theoretically be used to track content distribution
  • Metadata persistence — C2PA data is designed to be difficult to remove, which is a double-edged sword
  • Consent — Subjects in photographs may not consent to having provenance data attached to their image

Privacy Best Practices

If you are creating content with C2PA-enabled tools:

  • Review what provenance data your tools embed before publishing
  • Consider whether the identity information in your signing certificate is appropriate for the context
  • Be aware that C2PA data may persist through sharing and redistribution
  • Understand your tool's options for controlling what information is included

The legal landscape around C2PA metadata removal is evolving and varies by jurisdiction.

As of 2026, there is no universal legal prohibition against removing C2PA metadata. However:

  • EU AI Act — The European Union's AI Act includes provisions requiring disclosure of AI-generated content, which may effectively require preserving C2PA data in certain contexts
  • US state laws — Some US states are considering legislation related to AI content disclosure
  • Platform policies — Individual platforms may require C2PA data to be preserved as a condition of use

Technically, C2PA metadata can be removed by:

  • Stripping all metadata from the file using tools like ExifTool or ImageMagick
  • Converting the image to a format that does not support JUMBF boxes
  • Re-encoding the image data without the JUMBF container

However, just because metadata can be removed does not mean it is legally or ethically appropriate to do so.

Ethical Guidelines

When considering whether to remove C2PA metadata:

  • Consider the purpose of the removal and whether it serves a legitimate need
  • Understand that removing provenance data may violate the terms of service of the tool that generated the content
  • Be aware that removing AI disclosure metadata could have implications under emerging regulations
  • Weigh the benefits against the broader societal interest in content transparency

For detecting C2PA and other AI markers in images, use the AI watermark detector. For more on AI watermarking approaches, see our guides on SynthID and how to detect AI watermarks.

Frequently Asked Questions

Is C2PA the same as a watermark?

No. C2PA is a provenance standard that stores metadata about content origin and modification history in the file structure. It does not modify the visible pixel data of the image. A watermark, whether visible or invisible, modifies the actual image pixels. C2PA data is stored alongside the pixel data in specialized metadata containers (JUMBF boxes). However, both serve the broader goal of content identification and transparency.

Can C2PA metadata be faked?

Creating a valid C2PA manifest requires a legitimate certificate from a trusted certificate authority. While it is technically possible to create a manifest with false claims, doing so would require either a valid certificate (which authorities issue only to verified organizations) or breaking the cryptographic signatures (which is computationally infeasible with current technology). The certificate chain mechanism makes C2PA significantly more trustworthy than unsigned metadata.

Does every AI image generator use C2PA?

No. C2PA adoption is growing but not universal. As of 2026, Adobe Firefly, Microsoft Designer, and some DALL-E outputs use C2PA. Google Gemini uses SynthID instead of C2PA. Midjourney uses its own metadata approach. Stable Diffusion and many open-source models do not embed any standardized provenance data by default. The industry is moving toward broader adoption, but coverage remains incomplete.

What happens to C2PA data when I edit an image?

When you edit a C2PA-signed image using a C2PA-aware tool (like Adobe Photoshop), the tool preserves the existing manifest and adds a new manifest describing your edit. This creates a provenance chain showing both the original creation and your modification. If you edit the image with a non-C2PA-aware tool, the JUMBF box may be stripped, breaking the provenance chain. Some tools, however, preserve unknown metadata structures even if they do not understand them.

RemoveGeminiWatermark Team

RemoveGeminiWatermark Team