Hi @invoke-ai,
InvokeAI is one of the most polished open-source image generation platforms. I have a project that could add hardware-bound provenance to every image generated.
SiliconSignature — ASIC-Based Image Authentication
We use ASIC miners (Antminer S9 BM1387) to generate proof-of-work nonces, then embed them via Reed-Solomon LSB watermarking.
Proposed Integration: Post-Generation Watermark
New node in InvokeAI pipeline:
[txt2img / img2img] → [VAE Decode] → [SiliconSignature Watermark] → [Gallery]
│
├── ASIC nonce generation
├── Reed-Solomon encoding
├── LSB embedding
└── Metadata JSON
New UI panel:
┌─ SiliconSignature ──────────────────┐
│ ☑️ Sign with ASIC │
│ Device: /dev/ttyUSB0 │
│ Redundancy: 5× │
│ ☑️ Include metadata (prompt, seed) │
└─────────────────────────────────────┘
Verification Flow
# Any user can verify offline
python -m siliconsignature verify output.png
# → ✅ Signed by InvokeAI-ASIC-0x7a3f...
# → 🎨 Metadata: prompt="cyberpunk city", seed=12345, model=SDXL
# → 🔒 Integrity: FULL
Why This Matters
| Threat |
Current |
+ SiliconSignature |
| Fake provenance |
Possible |
ASIC physically required |
| Tampering |
Undetected |
Exact pixel detection |
| Server spoofing |
Possible |
$10,000+ forge cost |
| Offline verify |
Needs API |
Pure math, zero deps |
Technical Details
Author
Francisco Angulo de Lafuente (@Agnuxo1) — independent researcher, 35 years
Would you consider a post-generation watermarking node for hardware-bound image authentication?
— Francisco
Hi @invoke-ai,
InvokeAI is one of the most polished open-source image generation platforms. I have a project that could add hardware-bound provenance to every image generated.
SiliconSignature — ASIC-Based Image Authentication
We use ASIC miners (Antminer S9 BM1387) to generate proof-of-work nonces, then embed them via Reed-Solomon LSB watermarking.
Proposed Integration: Post-Generation Watermark
New node in InvokeAI pipeline:
New UI panel:
Verification Flow
Why This Matters
Technical Details
Author
Francisco Angulo de Lafuente (@Agnuxo1) — independent researcher, 35 years
Would you consider a post-generation watermarking node for hardware-bound image authentication?
— Francisco