📽️
Digital Replicas and Talent ID
  • Digital Replicas & Talent ID: Provenance, Verification and New Automated Workflows
  • Overview
    • Executive Summary
    • The Challenge
    • A Digital Human is "Born"
    • Workflow
      • Asset & Metadata
      • Feature/Episodic Use Case
      • Usage Rights and Authentication Mapping
    • Legitimate Use Cases
    • Nefarious Use Cases
      • Deepfakes: By The Numbers
    • Legal & Ethical
    • Key Participants
      • Champions
        • ETC
        • ITV
        • Paramount Global
        • SMPTE
      • Contributors
        • Technology
          • EZDRM
          • The Scan Truck
          • Videntifier
          • WaveSeven
          • Wild Capture
        • Metadata & Governance
          • EIDR
          • HAND
          • C2PA
    • Additional Resources
Powered by GitBook
On this page
  1. Overview

Workflow

Ensuring an ethical process requires control mechanisms working in harmony. This is an example of how existing technology can be used in the production and distribution process of film and TV.

PreviousA Digital Human is "Born"NextAsset & Metadata

Last updated 8 months ago

It all begins when the studios greenlight a project. In this example, the project included digital replicas of human actors.

Soon after greenlight, the creation and tracking of metadata began. This process continued throughout the lifecycle of content creation, distribution, and archive. The content was registered in , receiving an identifier for each edit that was completed.

The actor was scanned and a digital replica of him was created for use in the production process ().

Meanwhile, the Studio(s) keep track of the rights, working within their established processes and vendors to ensure proper consent was obtained and that actors receive credit and compensation for their work.

A Talent IDs was created for the actor and another was created for his digital replica. These identifiers remain linked together and reference the EIDR identifier(s) for the content in which the actor appears.

As production continued, provided fingerprinting of the content to be used in watermarking. Along the way, traceable artifacts (such as a C2PA hash) were embedded in the content, which allow forensic analysis and detection on various distribution platforms using .

HAND
EZDRM
Videntifier
EIDR
The Scan Truck