Tamperproof videos via steganography.WorldID,ENS&Self Protocol ensure authenticity across platforms.
Deep Truth creates tamper-proof video content secured through a multi-layered verification system built on World Chain. The platform leverages three key technologies to establish unquestionable authenticity:
ENS Identity Verification Each user receives a non-transferable, tamper-resistant ENS subname directly tied to their verified real identity. This subname is minted after rigorous passport verification through Self Protocol, creating an immutable link between the person's legal identity(Name) and their on-chain presence. This subname becomes the foundation of their verified digital identity.
World ID Integration The World Ecosystem provides the core verification infrastructure, ensuring that each video creator is a unique human through their Proof of Humanity verification. As a World Mini App, Deep Truth users benefit from the World ecosystem's full suite of advantages, including sponsored gas fees for transactions and various rewards designed specifically for verified humans.
Advanced Video Steganography The technical core of Deep Truth is our proprietary video steganography system that embeds cryptographic verification markers within the video data itself. These markers contain hashed identity information linked to the creator's ENS subname and World ID, creating an unbreakable chain of authentication. The steganographic technology is platform-agnostic, allowing videos to maintain their verification data even when shared across Warpcast, Twitter, Instagram, or other social platforms. When a Deep Truth video is created, the app securely records video while simultaneously encoding verification data linked to the user's World ID and ENS identity. This creates a three-part verification chain: the creator's biometric World ID verification, their legally-verified ENS subname, and the cryptographic signatures embedded in the video itself. The result is a system where anyone can verify that a video was created by a specific, verified human – effectively fighting deepfakes and misinformation while maintaining privacy and cross-platform compatibility.
The foundation of Deep Truth is built upon integration of Web3 protocols to establish video authenticity: World ID as Identity Layer World ID provided our essential identity verification infrastructure. We leveraged their Proof of Humanity system to ensure each video creator is a unique human, not an AI or duplicate account. This required custom implementation with their verification protocol to bind each creator's biometric verification to our steganographic markers. The World ID SDK became our trust anchor, particularly when we needed to work around their rate limiting during development.
ENS Subname Architecture Our non-transferable ENS subnames were perhaps the trickiest integration. We modified the ENS resolver contracts to restrict transferability based on identity verification status, requiring several iterations to get right. ENS provides the human-readable identity layer that makes verification accessible to regular users, while our extensions added the tamper-resistant properties needed for authentication.
Self Protocol Integration Self Protocol's decentralized identity verification became our KYC backbone. We built custom verification flows to extract passport verification attestations and bind them to both ENS records and our video output. The encrypted connections between these verifiable credentials and the video content created the chain of trust we needed.
Technical Challenges Overcome Our video steganography system initially struggled with compression artifacts breaking verification markers. After several failed approaches using traditional methods, we developed a dual-layer embedding technique that distributes verification data across both sequential frames and spatial regions of each frame. This redundancy ensures our markers survive even aggressive compression algorithms. The Python processing server presented bandwidth challenges when deployed via ngrok. We solved this by implementing adaptive bitrate negotiation - when bandwidth constraints were detected, the server dynamically adjusted its encoding parameters to fit within available throughput without compromising verification integrity. We hit an unexpected roadblock trying to manage World ID credentials across device sessions, ultimately solving this by creating a secure session token system that maintains verification state without exposing sensitive biometric verification data.
For video processing, we chose a server-side approach rather than client-side WebAssembly due to the computational complexity of our steganographic algorithms. This trade-off increased server costs but provided better verification reliability across devices. We maintained two video outputs (MOV and MP4) despite the increased storage requirements because our testing showed MP4 compression occasionally corrupted portions of our verification markers. The MOV format preserves our complete data while MP4 provides universal playback compatibility with partial verification. Our work with these Web3 technologies demonstrates that authentic media verification doesn't require centralized authority but can be achieved through cryptographic verification and decentralized identity systems - creating a foundation for trustworthy digital content in an era of increasingly sophisticated deepfakes.