Participation Over Permission

Granite
Under
Sandstone

Compression-amplified provenance signal detection
for digital media.

The signal is not the perturbation.The signal is the system's response
to the perturbation over time.
Pickett after Sempé
A
BC
D
E
F

courier over the city

0.9988marked mean
0.0000clean mean
0.9988gap
50 / 50 State Bcombined harness · 0 false positives
the signal is the subjectPickett after Sempé

What this is

Proves
Participation

A statistical perturbation scheme that embeds provenance signal into digital media. The signal survives aggressive JPEG compression — and strengthens under it. Marked corpus mean: 0.9988. Clean baseline mean: 0.0000. The distributions do not touch.

Not a watermark. Not steganography. Not DRM. Not a certificate authority. The signal proves participation. A matching service proves identity. These are different claims, and the difference matters.

How It Works

1

Embed

At save time, force inter-channel distances at selected pixel positions to prime-valued gaps. Cost: ~0.01 joules. Imperceptible to the human eye.

2

Compress

The codec's block-based quantization penalizes the perturbation's local complexity. Each generation amplifies the variance anomaly at marker positions.

3

Detect

Measure statistical distributions at candidate vs. control positions. The image is its own control group. No reference image needed.

4

Attribute

Positions derived from a 256-bit key via HMAC-SHA512. The position pattern is the fingerprint. C(4000,200) ≈ 10400 possible patterns.

The Fuse

The prime values. Destroyed by the first compression. Engineering: format-specific, replaceable.

The Fire

The variance anomaly. Persists and amplifies. Physics: universal to any partition-transform-quantize system.

Five Detection Layers

Defense in depth. Each layer operates independently in a different domain, with a validated operational range and honestly documented failure modes.

98.6%Sentinel SurvivalLayer E at Q40 — 500 images, >99% any tier
100%Payload RecoveryLayer F at Q40 — 800 images, margin 1.000
0.998Combined GapMarked vs. clean — distributions do not touch
A

DQT Prime Tables

Replace JPEG quantization table entries with nearest primes. The table itself is the provenance signal. O(1) detection — scan 128 bytes without decoding. Operational: G0 only. Dies on any re-encode, which is expected: the absence of Layer A after processing is evidence of processing, not failure.

BC

Compound Frequency Markers

Twin-prime markers at known positions with AND logic. Operational: G0–G2. Frequency signal degrades under aggressive compression — at G4 detection is near zero. This is an honest result: Layer BC is a near-field detector. OR logic was tested and rejected (raised false positive rate to ~22% on controls).

D

Spatial Variance  CORROBORATING

KS test on local variance distributions. Blind — no reference image needed. Two prior versions failed: v1 measured JPEG's own blocking artifact (0.89 FP rate on clean images); v2 measured natural chromatic asymmetry (0.98 FP rate). Architectural constraint: Layer D enters the combined score only when a manifest-mode layer (E or F) has non-zero score. With this constraint, false positive rate collapses to 0%. Without it, Layer D cannot distinguish marked from naturally asymmetric images.

E

Spanning Relational Sentinel

Mersenne-prime anchors (M=31 entry, M=7 exit) with correlated flanking pixels within 8×8 DCT blocks. The differential between positions survives when absolute values do not (intra-block correlation r=0.96 at Q40). Three detection tiers (T24/T16/T8) degrade gracefully. M=127 permanently excluded — 97.6% both-catastrophic rate due to JPEG's chroma gravity well at mid-range values. Operational: G0–G4. 98.6% at Q40, 28.4% tier demotion, >99% effective at any tier. Validated on 500 images. Zero false State D across 250 image-generation combinations.

F

Position-Based Payload

24-bit payload (creator ID, hash fragment, protocol version, flags) encoded in positional offsets from natural section boundaries. 2 bits per section, ~108 sections, ~9 votes per bit position via majority vote. Positions survive JPEG. Values do not. Operational: G0–G4. 800/800 images: 100% recovery on all fields, mean bit margin 1.000 (unanimous), zero uncertain bits at Q40. This is not robustness — it is invariance.

Validated Results

All numbers from the DIV2K corpus through Q95 → Q85 → Q75 → Q60 → Q40 cascade. Codec: Pillow's libjpeg. No other implementations tested.

MetricResultCorpusLayer
Combined score — marked0.998850 imagesAll (combined harness)
Combined score — clean0.000050 imagesAll (combined harness)
False positives0 / 5050 imagesAll (combined harness)
State B rate (800-image)99.5% (796/800)800 imagesAll
FP rate (800-image)0 / 800800 imagesAll
Sentinel T24 intact at Q4098.6%500 imagesE
Effective detection (any tier)>99%500 imagesE
False State D0 / 250 combinations500 imagesE
CID recovery at Q40100% (800/800)800 imagesF
Payload bit margin at Q401.000 (unanimous)800 imagesF
Uncertain bits0800 imagesF
DQT detection at G0100%AllA
Layer BC at G4~0% (near chance)500 imagesBC

Known Limitations

Not Yet Characterized

Geometric transforms (rotation, non-integer scaling, affine). Neural codecs (HEIC, AVIF). Quality below Q10. Codec implementations beyond Pillow's libjpeg (MozJPEG, libjpeg-turbo, hardware encoders).

Honest Scope

50-image FP confidence interval upper bound: 5.8%. 800-image bound: 0.36%. Neither sufficient for production at scale without further validation. Layer D cannot stand alone. Layer BC is not effective past Q75.

Deep Dives

The full technical documentation, design history, and proofs behind every claim on this page.