Liccium Whitepaper

This is the Liccium whitepaper

Introducing Liccium Trust Engine – a highly innovative, novel application that is deploying state-of-the art technology based on cryptographic premises to reinvent trust and transparency in the digital media space.

Verifiable declarations

With Liccium, content creators and rightsholders can digitally sign their original creative works and make publicly verifiable declarations of their original content. Verifiable declarations of original content create trust in claims, attribution and the authenticity of content.

Declarations of content-derived identifiers establish a persistent link between claims and the digital content without relying on watermarks or embedded metadata.

All declarations are automatically accessible via federated content registries, which allow users or machines to discover, identify, and verify the authenticity and integrity of digital media content and resolve rights, licenses, and other product metadata.

Creator attribution

Utilising the Creator Credentials protocol, a framework for managing digital identities tailored to cultural and creative communities, ensures verifiable attribution of creators and rightsholders and promotes transparency and accountability.


Liccium is based on the International Standard Content Code (ISCC), a content-derived identifier, lightweight fingerprinting, and open identification system for digital media content of all media types (image, video, text, audio), using cryptographic and similarity- preserving hashes to create a unique ID for each digital asset.

The ISCC is on its way to global recognition – after 5 years of work, in Q1/2024, ISCC is scheduled to become a universally approved ISO standard for decentralised digital content identification.

Current status of the ISCC: Draft International Standard ISO/DIS 24138

Using a novel standard for the decentralised identification of content (ISCC), this information is inextricably linked to the content. This allows any user, system or machine with access to the digital asset to independently generate an identical or similar ISCC code that enables the identification, comparison and reconciliation of digital content while assessing its integrity and authenticity.

Thus, ISCC remains dependable, retaining its full range of capabilities even in scenarios where content is altered or manipulated, or when watermarks, steganographic data, or metadata is removed from the media asset.

Last updated