Skip to content
Published on

Synthetic Media Detection & Content Authenticity 2026 — C2PA / Content Credentials / JPEG Trust / TrueMedia.org / Sensity / SynthID / Reality Defender / GPTZero Deep Dive

Authors

Prologue — The Year "Is It Real?" Became Infrastructure

Until 2024, "is this photo real?" was a gossip-bar question. By 2026 it is infrastructure. Newsrooms verify provenance metadata before buying a photo. Insurers check the camera signature on damage-claim images. Universities run text detectors before accepting essays. Courts demand watermark analysis on video evidence. Platforms read SynthID codes at upload time.

A culture of asking has been built. And what holds it up is not one set of eyes but a four-part system: standards, tools, policy, and academic research. This article maps that system on a single page — which standards became real infrastructure, which tools earned a place in production, which policies failed, and which research will define the next round.

The big picture first. The synthetic media problem splits into two:

  1. Provenance — "Where did this content come from? How was it made? Has it been changed?" Cameras, editors, and AI generators answer with metadata. C2PA, Content Credentials, JPEG Trust, SynthID, Truepic, Project Origin.
  2. Detection — "Is this content synthetic? Was it made by a person?" Models answer with classification. TrueMedia.org, Sensity, Reality Defender, DeepMedia, Hive, Optic, Microsoft Video Authenticator, GPTZero, Originality.ai, Copyleaks, TurnItIn.

Provenance is proactive — sign at creation time. Detection is reactive — classify after the fact. You need both. Provenance alone cannot handle unsigned content. Detection alone chases an ever-shrinking error margin forever.


1. The 2026 Map — A Four-Field Lattice

Vocabulary first. Too many people use the same words to mean different things.

FieldMajor playersRoleOutput
StandardsC2PA, JPEG Trust (ISO 21617), CAI, Project OriginMetadata + crypto-signature specsSpec docs + libraries
WatermarkingGoogle SynthID, OpenAI Sora, AnthropicInvisible signals embedded in generationsDecoder + license
Provenance toolsAdobe Content Credentials, Truepic, Microsoft DesignerC2PA integration in cameras, editors, AIProducts
Detection SaaSSensity, Reality Defender, DeepMedia, Hive, Optic, TrueMedia.orgImage/video/audio classification APIsScores + reports
Text detectionGPTZero, Originality.ai, Copyleaks, TurnItInLLM-generated text classificationProbability + highlights
Video detectionMicrosoft Video Authenticator, Sensity, DeepMediaVideo synthesis classificationPer-frame scores
AcademicKAIST, NICT, AISI Japan, MIT Media Lab, Berkeley CITRISNew models, new attacks, new defencesPapers + datasets

Key insight one: the 2026 answer is not a single solution. For any one piece of content, provenance metadata + watermark + classifier + human review work in layers. One layer alone always misleads. The first step in learning this field is not "which tool is most accurate" but which layer is responsible for what.

Key insight two: the big 2024-25 shift was watermarking moving from "interesting research" to "default option". OpenAI Sora videos ship with watermarks. Google Imagen/Veo carry SynthID. Anthropic has essentially adopted its own watermarking pipeline. Synthetic content without watermarks is becoming the suspicious case, not the normal one.


2. C2PA — The Standard of Standards (Adobe + Microsoft + BBC + IPTC + ARM + Intel + Sony + Truepic, 2021)

Almost every road in this field leads to C2PA. The Coalition for Content Provenance and Authenticity was founded in 2021 by Adobe, Microsoft, BBC, Intel, Truepic, Arm, Sony, IPTC, and others. It publishes the C2PA Specification and an open-source SDK (c2patool, c2pa-rs).

The core idea is simple — attach a cryptographically signed manifest to the content. The manifest records "who, when, how" the content was made, and every subsequent edit as a chain. JPEG, PNG, WebP, MP4, WAV — almost every common format can carry it inline, and sidecar files are supported too.

# C2PA SDK example — sign an image
c2patool input.jpg --manifest manifest.json --output signed.jpg

# Read the manifest
c2patool signed.jpg --info

# Key fields:
# claim.signature -> X.509 certificate chain
# claim.assertions[*].kind -> "c2pa.actions" | "c2pa.thumbnail" | "c2pa.training-mining" | ...
# claim.ingredients[*] -> what other content was used as input

What C2PA answers:

  • Who made this file? (signer's certificate)
  • Which camera/software? (c2pa.actions)
  • Did AI touch it? (c2pa.actions plus AI labels)
  • What edits since? (the action chain)
  • Permission for AI training? (c2pa.training-mining)

The clear limit: C2PA does not enforce verification. Strip the manifest, re-save, and you have a normal file ("strip and redistribute"). So C2PA guarantees "if a manifest exists you can trust its content", not "files without a manifest are fake". People constantly confuse the two.

As of 2026 the C2PA 1.4 spec is stable, and adoption spans cameras (Sony, Nikon, Canon, Leica), software (Photoshop, Lightroom, Premiere, Microsoft Designer), and platforms (LinkedIn, TikTok, Meta — partial display rollouts). The spec is agreed; the adoption curve is mid-stage.


3. Content Credentials (Adobe) — The Flagship C2PA Implementation

Adobe Content Credentials is the largest production implementation of C2PA. It is integrated across Photoshop, Lightroom, Premiere Pro, Firefly, and Adobe Stock. Edit a file and Photoshop attaches the manifest automatically.

What it actually records:

  • Who edited (Adobe account or anonymous)
  • When and with what tool (Photoshop 25.x, 2024-10-30T...)
  • Which actions were applied (crop, color, composite, AI fill, etc.)
  • Whether AI generation (Firefly, Generative Fill) was used
  • Original thumbnail (so viewers can see the starting point)

The UI is the CR badge at the top-right of an image. Click and it opens verify.contentauthenticity.org with the full manifest chain.

[Sample Content Credential manifest]
File: nyt-front-page-photo.jpg
Issuer: Adobe Inc.
Created: 2026-04-15T10:23:11Z by Photoshop 25.6 (jdoe@nytimes.com)
Actions:
  - c2pa.opened (DSC_0023.NEF from Sony α7 IV)
  - c2pa.color_adjustments (Lightroom 13.5)
  - c2pa.cropped
  - c2pa.published
AI: None detected
Edits: 3 non-destructive

What this means: a newsroom can confirm "where this image came from and whether AI touched it" in one glance. AP, BBC, Reuters, and the New York Times are rolling it out.

The limit: it works best inside the Adobe ecosystem. Once a file passes through other tools the chain can break. And tools that strip Content Credentials metadata already exist (ironically, generic metadata-cleaning tools). Only content whose metadata is left intact is protected.


4. JPEG Trust (ISO 21617, 2024-25) — Authenticity Joins the JPEG Standard

JPEG Trust is ISO/IEC 21617, an official international standard developed by the JPEG committee. C2PA is a consortium spec; JPEG Trust is an ISO standard. That matters: government procurement, courtroom evidence, and international trade often demand an ISO number when the phrase "follows the standard" appears.

JPEG Trust does not compete with C2PA — it embraces it. Part 1 (published 2024) defines the trust framework concepts; Part 2 covers general verification profiles; Part 3 handles media asset watermarking tokens. Inside a JPEG container there is now a clearly defined slot for a C2PA manifest.

Why a separate ISO standard at all:

  • C2PA is "how to sign"; JPEG Trust is "how to embed that into JPEG plus what to verify".
  • Being ISO makes it easier for governments and standards bodies to adopt.
  • It draws a multi-layered trust framework that unifies watermarking, metadata, and crypto signatures.

2025-26 status: Parts 1 and 2 are published; Part 3 is partly out, the rest in progress. Korean, Japanese, and EU standards adoption is likely to accelerate through JPEG Trust. The world is moving toward a state where people who have never heard of "C2PA" will still know "ISO 21617".


5. TrueMedia.org — Oren Etzioni's Non-Profit Detector (and Its Fate)

TrueMedia.org was launched in 2024 by Oren Etzioni, former AI2 CEO, as a non-profit deepfake detector. Its core promise: free detection for political deepfakes during election cycles.

How it works: it ensembles multiple detection models (including some from Sensity, Reality Defender, and others) into a single score. Civilians paste a suspicious video URL; journalists and researchers get an API.

It played a meaningful role in the 2024-25 US election cycle and others, by multiple reports. But by late 2025 financial sustainability became an open issue and some operations had to scale back. The deeper question hangs in the air: can a free non-profit model sustain synthetic media detection? Each call costs GPU compute, model updates need data collection, and a non-profit has no revenue engine.

2026 lesson: non-profits are an excellent shape for truth-supporting work, but if they don't solve sustainability they may vanish at the decisive moment. TrueMedia.org survived in part, and its model influenced similar EU and UN-adjacent non-profit projects. But one organisation cannot carry the whole load.


6. Sensity AI — The Israeli Commercial Detector

Sensity, formerly Deeptrace, is an Israel-based synthetic media detection company. Founded in 2017 just as "deepfake" was entering the vocabulary, it is one of the oldest commercial detection vendors.

Product line:

  • Image detection — face manipulation, full synthesis, generative AI classification
  • Video detection — face swap, lip-sync, full synthesis, lip-dub
  • Audio detection — voice cloning detection
  • Document detection — forged IDs, synthetic identity documents
  • API + dashboard + compliance reports

Customers: finance (KYC document forgery), insurance (damage claims), media, government. Strong in European markets — viewed as GDPR-friendly and aligned with EU AI Act compliance obligations.

Technical differentiator: not a single model but an ensemble. Face-manipulation, whole-image-synthesis, compression-artifact, and metadata models combine into one score. The pitch is fewer single-mode weaknesses ("good against GANs, bad against diffusion") than mono-model competitors.

The limit is shared with every detector: when a new generative model ships, accuracy drops for days to weeks until training data catches up. And compression, resize, and filters weaken every signal. Sensity itself frames its output as "a risk signal", not "the single truth".


7. Microsoft Video Authenticator + Microsoft Designer Credentials

Microsoft enters the field through two paths.

Microsoft Video Authenticator (announced 2020) scores video synthesis probability frame by frame. It started as a private programme with AP, BBC, and other news partners, then was opened more widely in 2024-25. Its core use is election-related video verification.

How: it watches for sub-pixel anomalies at face boundaries, compression inconsistencies, and details that synthesis models still get wrong (hair, teeth, pupils). Output is a 0-100 percent synthesis probability.

Microsoft Designer + Bing Image Creator Credentials: AI images Microsoft makes carry C2PA-based Content Credentials automatically. So Microsoft is on the provenance side too — labelling its own AI output and scoring others' synthetic output.

The lesson: a single company is doing "label what we make + detect what others make". Google, OpenAI, and Adobe are moving the same way. The generator-as-authenticator-as-detector trinity has settled inside the big platforms.


8. Sora Watermarks (OpenAI) + Anthropic Watermarking

Right after OpenAI Sora went public in late 2024 / early 2025, every generated video shipped with both visible and invisible watermarks. The visible one is the floating Sora logo at the corner. The invisible one is a pixel-embedded signal identifiable by OpenAI's detector.

Sora watermark notes:

  • Not optional — applied to all output by default (with some API tier exceptions).
  • Robust to a degree — designed to survive compression, cropping, and some filters.
  • Still breakable by a sufficiently sophisticated adversary — re-synthesizing pixels degrades the signal.

Anthropic watermarking: Anthropic has reportedly experimented with statistical watermarks in some Claude text output as part of its Constitutional AI framework. Text watermarks work by introducing a slight statistical bias in token selection — meaning is preserved, but a decoder can use a statistical test to detect the bias.

The structural difficulty of text watermarks:

  • Short text (tweet length) has too little statistics — the signal is weak.
  • They break under rewriting (paraphrase, translate, summarize).
  • They trade off against output diversity — stronger watermark, worse text quality.

So text watermarks are not as powerful as image and video watermarks. But across many models and many calls, even partial residual signal is useful for forensic analysis after the fact.


9. Google SynthID (DeepMind) — Text + Image + Audio

Google DeepMind's SynthID launched for images in 2023 and expanded to text and audio in 2024. It is the most ambitious multimodal watermarking system in production.

SynthID-Image: pixel-distribution watermark embedded in images generated by Imagen and Veo. Visually invisible, designed to survive cropping, compression, and colour adjustments.

SynthID-Audio: waveform-level watermark in audio produced by Lyria, Google's music/audio model. Trained for robustness to compression and re-encoding.

SynthID-Text: a statistical watermark in Gemini text output. Conceptually similar to Anthropic's and OpenAI's work, but released as open source so other organisations can apply it to their own models.

# SynthID-Text detector usage pattern (conceptual example)
from synthid_text import detector

text = "This text may have been generated by Gemini..."
result = detector.detect(text, model_id="gemini-1.5-pro")
print(result.score)         # 0..1 watermark strength
print(result.confidence)    # statistical significance

Why SynthID matters: Google moved from "watermark our models" to open standardisation. With SynthID-Text in the open, Hugging Face, Anthropic, OpenAI, and others can adopt compatible watermarks. It is the closest thing to shared infrastructure for synthetic media detection.

The limit: watermarks only matter when model providers cooperate. If open-source models like Llama, Mistral, and Qwen do not embed a watermark, their output is not visible to a SynthID detector. And text watermarks remain weak against rewriting attacks.


10. Reality Defender — Enterprise Detection

Reality Defender is a US-based enterprise synthetic-media detector. Founded in 2022, Series A and B funded. Its targets are banks, governments, insurers, and media — similar positioning to Sensity but stronger in North American markets.

Product features:

  • Multi-model ensemble — multiple models score one piece of content and combine into a single signal.
  • Real-time API — voice-clone detection during call-centre calls is one example.
  • Compliance reports — evidence packages for financial regulation and insurance investigation.

Representative use cases:

  • Call-centre and executive impersonation voice fraud
  • Synthetic identity (KYC) fraud
  • Political-ad verification by broadcasters
  • Insurance damage-claim image and video verification

Technical angle: like Sensity, an ensemble of domain-specific models rather than one monolith. The differentiation is greater investment in real-time streaming inference — scores updated every five seconds during a live call, for example.


11. DeepMedia — Defence and Government

DeepMedia is a US-based synthetic media detection company that explicitly targets the defence, intelligence, and government markets. It openly highlights contracts with US military and intelligence community customers.

Differentiators:

  • Threat intelligence — tracking which adversary groups use which synthesis techniques
  • Government-grade security (FedRAMP, IL tiers)
  • Trained on multilingual and multicultural faces and voices, including global conflict zones
  • Cross-video extrapolation — if one frame is synthetic, what does that imply for other videos of the same person

Public information is limited in this segment. But it signals that synthetic media detection is being treated as national-security infrastructure — a market segment where civilian SaaS is not sufficient.

Implication: synthetic media detection is no longer just "catch a fake selfie" — it's a defence and intelligence supply chain. Pressure to build domestic capacity is rising in Korea, Japan, and the EU too.


12. Truepic — The Cryptographic-Proof Camera

Truepic is a C2PA founding member and the company most focused on signing at the moment of creation. Its core thesis: provenance starts at the camera.

Products:

  • Truepic Vision — a mobile SDK. Integrated into apps, it signs each photo at capture time, embedding GPS, timestamp, device fingerprint, and image hash into a C2PA manifest.
  • Truepic Lens — Truepic's own camera app for insurance, logistics, and government workflows.
  • Verification services — cryptographic checks to confirm received content has not been altered.

Use cases:

  • Insurance damage claims — photos signed by Truepic carry verified time, place, and device, reducing fraud.
  • Humanitarian investigation — Amnesty and Human Rights Watch use it for conflict-zone evidence.
  • Real-estate verification — listing photos with timestamp and location proof.
  • Supply chain verification — proving where a product was manufactured.

The limit is adoption. Consumer cameras (default iPhone Camera, Google Photos) do not include it automatically. Only people using Truepic's SDK are protected. The C2PA-capable cameras now shipping from Sony, Nikon, and Canon are an attempt to break this limit.


13. Hive Moderation API + Optic — Twitter/X Use Cases

Hive Moderation is a US-based content moderation API company. It bundles AI-generated image, video, audio, and text detection alongside category moderation. NSFW, violence, hate speech, and AI-generation labelling — one API call covers them all, which is its sales pitch.

# Hive AI-generated content API example
curl -X POST https://api.thehive.ai/api/v2/task/sync \
  -H "Authorization: Token <key>" \
  -F "media=@suspicious.jpg"

# Response includes ai_generated_score and ai_generated_classes

Optic: originally Twitter (now X) used Optic to detect NFT image plagiarism. It later expanded into AI-generated content detection. It is reportedly used in some synthetic-labelling features inside the X platform.

Why this matters: platform companies face a big decision — build an internal detection team (Meta, YouTube), outsource to an external API (many small and mid-size platforms), or both. As outsourcing grows, the leverage of companies like Hive and Optic grows with it.


14. GPTZero — The Face of Text Detection

GPTZero was created in late 2022 by Princeton student Edward Tian right after ChatGPT launched. It quickly became a viral story. As of 2026 it is the best-known free and paid AI text detector.

How it works:

  • Perplexity — how "surprised" a model is by the text. LLM-generated text tends to have lower perplexity.
  • Burstiness — variance in sentence length and complexity. Human writing is bursty; LLM writing tends to be more uniform.
  • These two signals plus a learned classifier.

Where it is used: schools, universities, publishers. Student-assignment verification is the largest market. An API is also provided.

Criticism / limits:

  • Non-trivial false-positive rate — calling human writing AI-generated. Especially common for ESL writers, whose more uniform sentence structures can be misclassified.
  • Each model update resets accuracy. Patterns that worked against GPT-3.5 are weaker against GPT-4 and Claude.
  • OpenAI itself launched a GPT text detector in 2023 and pulled it later over accuracy issues. A signal that text detection is structurally hard.

Reasonable use: treat GPTZero as a "risk signal" only. Never punish a student on a single detector result. Schools are advised to use it as an interview trigger, not a verdict.


15. Originality.ai + Copyleaks + TurnItIn AI — The Academic and Plagiarism Market

In the academic market, plagiarism and AI detection have merged into a single product.

Originality.ai: Canada-based. Targets academia, blogging, and content marketing in parallel. Combines AI detection, fact-checking, and plagiarism detection. Its simple credit-based pricing model is well-received.

Copyleaks: Israeli/US. Reaches enterprise content, legal, and academic users. Strong multilingual support. Combines AI detection, plagiarism detection, and code plagiarism (GitHub-indexed).

TurnItIn AI Detection: TurnItIn is the global leader in academic plagiarism detection. It added AI detection in 2023. Largest institutional sales force. Also the most criticised — academic studies repeatedly show that its false-positive rate disproportionately affects ESL students.

TurnItIn lesson: when a classifier with mid-to-high-80s accuracy is applied to millions of students simultaneously, the absolute number of false-positive students is very large. And that rate is biased by demographics. The question of who is responsible has surfaced between schools, software vendors, and researchers.

ToolPrimary marketStrengthWeakness
GPTZeroK-12 and universitiesFree tier, simple UIESL false positives, accuracy drift
Originality.aiContent / SEOPricing and feature bundleWeak institutional sales
CopyleaksEnterprise + multilingualMultilingual, code coverageExpensive
TurnItIn AIK-12 and universitiesMarket share, integrationESL false-positive criticism

16. Project Origin (BBC + CBC + NYT + Microsoft)

Project Origin is a news-authenticity project run jointly by BBC, CBC, The New York Times, and Microsoft. It began around 2019 and influenced the formation of C2PA.

Goal: a workflow standard guaranteeing that news content travels from publisher to viewer without tampering, with clear provenance.

What it actually does:

  • Automatically attaches C2PA manifests to news video and article photos
  • Asserts the publisher's identity
  • Indicates tampering or AI synthesis
  • Pressures platforms (social, news aggregators) to preserve manifests

Why it matters: if C2PA is the general technical standard, Project Origin is its news-industry application. When a paper posts a photo to social media and someone screenshots, alters, and re-posts it, the original manifest is broken. Project Origin designs the workflow to track where the chain broke and surface that to viewers.

2026 status: NYT, BBC, and CBC are showing Content Credentials on their own sites and in some social experiments. Meta and LinkedIn are piloting manifest preservation. There is a long road ahead, but this is the first serious attempt at news-authenticity infrastructure.


17. Korea — KAIST Deepfake Detection + AI Open Innovation Hub

Korea is active on the academic and policy sides of synthetic media detection.

KAIST deepfake detection research: multiple labs at KAIST's School of Computing and Department of Electrical Engineering make core academic contributions to deepfake detection. They are particularly strong in face-synthesis and lip-dub temporal inconsistencies, spectral anomalies in synthetic speech, and Korean-language speech-synthesis detection — filling gaps that English-centric global tools struggle with.

AI Open Innovation Hub (Ministry of Science and ICT / NIA): a government hub for synthetic media detection and authenticity standards. It provides guidelines and pilot programmes for Korean companies adopting C2PA and JPEG Trust.

Korean context:

  • The Nth Room incident and deepfake sexual exploitation material — Korea was one of the first societies where deepfakes became a major social problem. Detection and law enforcement evolved together.
  • Elections — the 2022 and 2024 Korean elections involved some political deepfake controversies. The National Election Commission, media fact-checkers, and academia collaborated.
  • KCC/MSIT guidelines — discussion of mandatory labelling for generative AI content advanced in 2024-25.

Companies: there are Korean-grown synthetic media detection startups, and platforms like Naver and Kakao operate in-house moderation teams running their own detection pipelines.


18. Japan — NICT + NTT DATA + AISI Japan

Japan approaches synthetic media detection through a different angle — government research institutions and large system integrators.

NICT (National Institute of Information and Communications Technology): Japan's government communications and information research institute. Works on synthetic media detection, provenance, and anomaly detection. Strong in Japanese-language speech synthesis and detection. Combines academic authority with the government supply chain.

NTT DATA: the system-integrator arm of the NTT group. Packages synthetic media detection as part of integrated solutions for enterprise customers in finance, telecom, and government. Often it integrates global tools like Sensity and Reality Defender into NTT's security operations centres.

AISI Japan (Japan AI Safety Institute): Japan's AI safety institute, founded in 2024. Coordinates a government-level position on AI risk including synthetic media. Cooperates with UK AISI and US AISI.

Japanese context:

  • The TV and newspaper industries remain influential and accelerate adoption of authenticity standards.
  • High social awareness of voice and video fraud — "ore-ore" scams (phone voice impersonation) have been a chronic social problem, and voice cloning is feared as an amplifier.
  • A government + large enterprise + research triangle drives rapid pilot deployments.

19. Who Should Learn Synthetic Media Detection — Four Kinds of Learners

LearnerPriority areasTools to go deep on
Media / newsroomC2PA, Content Credentials, Project OriginAdobe CC, Truepic, Sensity, Microsoft Video Authenticator
Security / fraudVoice cloning, synthetic ID, real-time detectionReality Defender, Sensity, Hive, in-house models
Policy / regulationEU AI Act, US digital advertising rules, Korean KCCC2PA, JPEG Trust, Project Origin, CAI
AcademicNew attacks, new defences, evaluationPapers (KAIST, NICT, MIT), SynthID open source
Education / schoolsLimits of text detection, policy designGPTZero, TurnItIn, Originality.ai (and their limits)
General citizen"Ask where this content came from" as a habitBrowser extensions (Content Credentials), verification sites for suspicious videos

Common to all: do not place blind faith in any single tool. Do not stake a person's reputation or legal liability on a single number. Think in layered defences: provenance + watermark + detector + human review.


20. After 2026 — Where This Goes

What is locked in:

  1. C2PA and JPEG Trust become standard infrastructure. Cameras, software, and platforms increasingly create and preserve manifests automatically.
  2. Watermarks become the default option in big-tech generative models. Synthetic content without watermarks gets classified as "open source or deliberately stripped".
  3. Detection SaaS settles inside the enterprise security stack. KYC, call centres, insurance, and media adopt fastest.
  4. School-level text detection is rebuilt as a policy + interview + tool combination. The view "tools alone do not work" has consolidated.

Open questions:

  • Will the open-source model ecosystem adopt watermarks? Hard to do voluntarily — regulation may have to push.
  • What happens when adversaries can reliably strip watermarks? Watermarks may settle as "time-buying tools", not permanent guarantees.
  • Can authenticity standards adopt faster than synthetic content can scale? Honestly, the answer is unclear — both sides are accelerating.
  • Who carries the responsibility of trust? Platforms? Generators? Publishers? Viewers? How law fills this box is the major theme of the next five years.

What individuals can do:

  • Install a Content Credentials browser extension.
  • Run suspicious images and videos through a free detector or TrueMedia.org (never as sole evidence).
  • Attach provenance manifests to content you make when possible (default if you use Photoshop or Lightroom).
  • Share the limits of AI detection tools at your school or workplace — help reduce harm to people hit by false positives.

The era in which "is this real" became infrastructure. That infrastructure is not one company, one tool, or one standard. It is the ensemble of multiple layers. This article was the map of that ensemble.


References