v0.2 · INVISIBLE WATERMARK · CYBERSECURITY PROJECT

MAKE TRUTH PROVABLE.

In a world where AI-generated images, filters and editing tools are making reality blurry — TruthLens builds a system where authenticity can be proven, not assumed.

SHA-256 HASH ALGORITHM
3 TRUST LAYERS
0.1 CURRENT VERSION

Built by a curious mind solving a real problem.

Hi — I'm Gouri Krishna, a first-year B.Tech Cybersecurity student. This is my first serious project, and it's focused on one question:

"How do we know if what we're seeing is real?"

TruthLens is my attempt to answer that — starting small, building on solid foundations, and growing into something that matters.

This is just the beginning. More ideas are coming.

SYSTEM PHILOSOPHY
  • Stop editing Detect & expose edits
  • Control the internet Define a trusted ecosystem
  • Prevent copying Make copies unverifiable
  • Stop fake content Make real content provable

Four layers of trust.

Every image processed by TruthLens goes through a multi-layer integrity system.

🔐

SHA-256 Hashing

Every image gets a unique cryptographic fingerprint. Any pixel-level change produces a completely different hash — making tampering mathematically detectable.

LAYER 1 · INTEGRITY
✍️

Digital Signature

RSA/ECDSA signatures bind each capture to a specific device and identity. No one can fake an image as coming from you without your private key.

LAYER 2 · IDENTITY
👁️

Invisible Watermark

Using LSB steganography, a unique ID and reference hash are hidden inside the pixel data — invisible to the human eye, readable by TruthLens.

LAYER 3 · TRACEABILITY
🔖

Visible Stamp

A visible "TruthLens Verified" overlay provides public-facing proof and awareness that an image passed through the system.

LAYER 4 · AWARENESS
📍

Metadata Record

Every capture stores timestamp, device ID, GPS coordinates (optional), and chain-of-custody history. The full story of an image, locked in.

LAYER 5 · HISTORY

Instant Verification

Upload any image and get a verdict in seconds — AUTHENTIC, TAMPERED, or UNVERIFIED. No accounts, no delays, no ambiguity.

LAYER 6 · VERIFY

How TruthLens works.

01

Capture or Upload

Use your device camera directly in the browser or upload an existing image. Both paths feed into the same verification pipeline.

02

Hash Generation

A SHA-256 hash is computed from the raw image bytes. This 64-character fingerprint is unique to the exact pixel data — one changed byte produces a completely different hash.

sha256(imageBytes) → "a7f3e6d1b5e8…92ab34f0c"
03

Watermark Check

The system attempts to extract an invisible LSB watermark from the image. If found, it retrieves the original record from the registry.

if watermark_found → lookup_registry(watermark_id)
else → status = "UNVERIFIED"
04

Comparison & Verdict

The current hash is compared to the stored original. Signature validity is checked. The result is definitive.

hash_match && sig_valid → "AUTHENTIC"
hash_mismatch || sig_broken → "TAMPERED"
no_watermark → "UNVERIFIED"
05

Result & Metadata

Full details returned: status, hash value, timestamp, source, device ID, and chain-of-custody history.

Verify an image.

Choose how you want to provide the image. Both options run through the same verification engine.

📁

Upload Image

Select an existing image from your device to verify its authenticity.

📷

Use Camera

Capture a new image directly from your browser camera.

Analyzing image…

The full TruthLens app.

These mockups show the intended mobile application — in development as a Flutter app.

REC
🖼
🔄
Camera — Capture & Sign
Gallery — Signed Media
Detection Result
sunset_24apr.jpg
24 Apr 2024, 10:32 AM
AUTHENTIC
This image is genuine and unaltered.
HASH (SHA-256) a7f3e6…34f0c
CAPTURED ON 24 Apr 2024, 10:32
DEVICE TruthLens Camera
WATERMARK ✓ FOUND
VERIFICATION ID TLV-20240424-2211
VIEW FULL METADATA →
Result — Authentic
Image Details
🗑
AUTHENTIC
Verified by TruthLens
FILENAME IMG_20240423.jpg
TIMESTAMP 23 Apr 2024, 06:45
DEVICE TruthLens Camera
HASH (SHA-256) a3f5e2…c5d6
SIZE 3.24 MB
Image Details
🖼 GALLERY
🔍 DETECT
UPLOAD IMAGE
Tap to upload or drag & drop
Supports: JPG, PNG
— OR —
🖼 SELECT FROM DEVICE
VERIFICATION RESULT
!
TAMPERED
This image has been manipulated
TIMESTAMP 23 Apr 2024, 06:45
HASH (SHA-256) a3f5e2…c5d6
SOURCE External Image
SCAN ANOTHER →
Detect — Upload & Verify
Detection Result
edited_photo.jpg
23 Apr 2024, 08:15 PM
!
TAMPERED
This image appears to be altered.
HASH (SHA-256) f1b2e6…91aa2
REASON Pixel mismatch detected
CAPTURED ON Not from TruthLens
WATERMARK ✕ NOT FOUND
VERIFICATION ID TLV-20240423-1980
VIEW ANALYSIS REPORT →
Result — Tampered

Inside vs Outside the system.

✓ TRUSTED ZONE — INSIDE APP

  • Full cryptographic verification available
  • Hash comparison is exact and definitive
  • Digital signature proof valid
  • Invisible watermark readable
  • Complete metadata accessible

△ UNTRUSTED ZONE — OUTSIDE APP

  • Only the visible image remains
  • No guaranteed authenticity
  • Visible stamp may exist but is not verified
  • Screenshots break watermark traceability
  • Cannot cross-reference original record
⚠️  At this stage, only images captured through TruthLens can be fully verified. External images will show as UNVERIFIED.

What's coming next.

01 / UPGRADE

Robust Watermarking

DCT-based frequency domain watermarks that survive compression, resizing, and filtering.

SOON
02 / UPGRADE

Real Digital Signatures

Full RSA-2048 / ECDSA asymmetric signing to prove origin with mathematical certainty.

SOON
03 / UPGRADE

Blockchain Anchoring

Hash values stored on a public blockchain — immutable, decentralized proof of existence.

PLANNED
04 / UPGRADE

AI Deepfake Detection

ML classifier to flag AI-generated or face-swapped images even without a watermark.

PLANNED
05 / UPGRADE

Chain of Custody

Track every share, edit attempt, and verification event across a distributed audit trail.

PLANNED
06 / UPGRADE

Public Verify Links

Anyone can verify an image via a shareable URL — no app required to check authenticity.

PLANNED

Let's build something real.

This project is independent, open to ideas, feedback, and collaboration. If this problem interests you — whether you're a developer, designer, researcher, or just curious — I'd love to hear from you.

Message received. I'll get back to you soon.