Microsoft published a technical blueprint and evaluation of media-authentication methods that recommended combining provenance manifests, invisible watermarks, and cryptographic signatures, but concluded no single approach was reliably effective and warned of real-world limitations for deployment.