Chain of custody
for media content

Content distributed across organizations loses its provenance in transit. Metadata is stripped by CMSes, re-encoding, and platform processing. Attribution, licensing terms, and chain of custody disappear.

Diker makes provenance recoverable — regardless of what happens to the file.


The problem

Metadata doesn't survive the content supply chain

A single image loses its provenance at every handoff. By the time it reaches the public, there is no record of who created it, who received it, or what terms applied.

Today

1

Wire service

WS_20260312_berlin_summit.jpg

8 / 8
2

Publisher

berlin-summit-hero.jpg

6 / 8
3

Syndication partner

img_28491.jpg

2 / 8
4

Social media

photo.jpg

0 / 8

Creator, copyright, license, source, contact — all gone. No proof of origin. No proof of terms.

Our solution

With Diker, provenance is always recoverable

The metadata is still stripped — that's reality. But Diker ensures provenance can be recovered at every stage through three independent mechanisms.

1

Wire service

WS_20260312_berlin_summit.jpg

8 / 8
2

Publisher

berlin-summit-hero.jpg

6 / 8
3

Syndication partner

img_28491.jpg

2 / 8
4

Social media

photo.jpg

0 / 8

Metadata still degrades. But provenance — origin, chain of custody, licensing terms — is always recoverable from the Diker registry.


What you get

Every handoff produces a verifiable record

Signed handoff receipts

Each content transfer generates a signed, timestamped credential recording sender, receiver, and agreed terms. The record is cryptographically verifiable and cannot be altered after the fact.

Machine-readable licensing

Usage rights — editorial only, web, 12 months — are embedded directly in the provenance credential. If content is used beyond the agreed scope, the signed terms provide an authoritative reference.

Content lookup

Submit any suspect image. Diker matches it against the registry via fingerprint and watermark, returning the full chain of custody: origin, every handoff, and the applicable license terms.

Mutual attestation

The receiving organization confirms receipt, creating a shared record of the transfer. Both parties hold the same signed credential — eliminating disputes over what was delivered and when.


Why now

Content provenance is becoming infrastructure

The ecosystem for verifiable content is materializing. Major platforms, hardware manufacturers, and standards bodies are converging on content credentials as the foundation for digital trust. Organizations that distribute content across boundaries need the orchestration layer to participate.

6,000+

organizations in the Content Authenticity Initiative, including Adobe, Microsoft, BBC, and Reuters

Top 10

Gartner named Digital Provenance a top-10 strategic technology trend for 2026

Aug 2026

EU AI Act and California AI Transparency Act introduce the first mandatory provenance requirements for AI-generated content


Who it's for

For organizations that distribute content across boundaries

Wire services

Distribute thousands of images daily to hundreds of subscribers. Require verifiable proof of delivery and licensing compliance across the entire subscriber network.

News publishers

Receive content from wire services, agencies, and freelancers. Need to verify provenance on ingestion and demonstrate licensing compliance on publication.

Photo agencies

Represent photographers whose work is routinely distributed without attribution. Require persistent ownership proof that survives metadata stripping.

Museums & archives

License high-resolution images for reproduction and exhibition. Need to track which institutions received which assets and under what reproduction terms.

Broadcasters

Share footage across networks and national borders. Require tamper-evident provenance to satisfy emerging content authenticity regulations.

Corporate communications

Distribute brand assets to agencies and media partners. Need assurance that approved versions are used within agreed scope and duration.


Built on open standards

C2PA 2.3 — Content credentials (Adobe, Microsoft, BBC) ISCC — Content fingerprinting (ISO 24138) IPTC — News metadata (RightsML, Photo Metadata)

Book a demo

See Diker in action with your actual content workflow. We'll walk through a handoff, show the provenance chain, and run a live lookup.