How does SWEAR compare to the ONVIF and C2PA collaboration?
In Short
ONVIF (Open Network Video Interface Forum) and C2PA (Coalition for Content Provenance and Authenticity) are separate initiatives with different origins and scopes, and they have formed a strategic collaboration around digital video trust. In that collaboration, provenance is generally carried with the media asset, while SWEAR anchors proof independently outside the asset.
Detailed comparison
1. Embedded provenance vs. independent chain of custody
In the ONVIF and C2PA collaboration model, provenance is primarily attached to the asset and tied to the signer. ONVIF describes signatures as embedded directly in the video, and C2PA states that its trust model is based on the identity associated with the cryptographic signing key used to sign the claim. C2PA also notes that its manifests can be removed from assets, even though unauthorized tampering can still be detected when the manifests remain present.
SWEAR takes a different approach with our patented Digital DNA Mapping technology. Our framework creates cryptographic hashes in real time but preserves the hashes remotely on blockchain to establish an independent chain of custody outside the asset itself. In other words, we do not ask the evidence to be its own sole witness. We establish proof outside the file and outside the control of the party holding the footage. That separation creates a stronger evidentiary posture, both technically and legally, because the creator or custodian of the content is not the only party asserting its authenticity.
Summary: The ONVIF and C2PA collaboration carries provenance with the asset. SWEAR creates independent proof outside the asset.
2. Ecosystem-dependent deployment vs. platform-independent deployment
ONVIF and C2PA are both fundamentally provenance standards. C2PA describes adoption as opt-in and says its effectiveness depends on broad adoption and user awareness. ONVIF’s announcement also centers on camera-based media signing and standards alignment across digital video platforms.
SWEAR’s approach is different. We are platform independent and can operate across existing environments, including at the VMS level. Our framework does not require every camera in the system to be replaced, upgraded, or individually provisioned to maintain downstream provenance.
Summary: The ONVIF and C2PA collaboration depends on ecosystem-wide support. SWEAR is built to protect footage across existing infrastructure and is platform independent.
3. Signer-based trust vs. independently anchored trust
C2PA trust decisions rely on signing keys, certificate chains, and trust lists. That model requires robust key lifecycle controls, including protection, rotation, and revocation.
SWEAR does not rely only on trust in a signing key that lives in the originating device or workflow. Its proof is anchored independently, reducing dependence on the same device, vendor, or custodian that created the asset.
Summary: The ONVIF and C2PA collaboration relies on signer and framework trust. SWEAR relies on independently anchored proof.
Bottom line
Self-protection techniques and provenance attached to an asset are not the same thing as an independent evidentiary architecture built to withstand advances of AI and adversarial scrutiny.
Asset-attached provenance and independent evidentiary architecture are related but different approaches. The ONVIF and C2PA collaboration is a meaningful industry effort, but that approach does not provide the same level of evidentiary separation that SWEAR provides. With that said, the approaches are not mutually exclusive, and SWEAR does not interfere with ONVIF or C2PA efforts. SWEAR protection runs independently.