{"id":1162092,"date":"2026-02-19T08:00:51","date_gmt":"2026-02-19T16:00:51","guid":{"rendered":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/?p=1162092"},"modified":"2026-02-19T08:00:53","modified_gmt":"2026-02-19T16:00:53","slug":"media-authenticity-methods-in-practice-capabilities-limitations-and-directions","status":"publish","type":"post","link":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/blog\/media-authenticity-methods-in-practice-capabilities-limitations-and-directions\/","title":{"rendered":"Media Authenticity Methods in Practice: Capabilities, Limitations, and Directions"},"content":{"rendered":"\n<p><em><em>Insights from Microsoft\u2019s Media Integrity and Authentication: Status, Directions, and Futures report<\/em><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"788\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1.jpg\" alt=\"three white outline icons on a blue-to-pink gradient background: an image with a copyright \u201cCR\u201d badge, an image overlaid with fingerprint-like lines, and an image framed by a cropping grid.\" class=\"wp-image-1162625\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1.jpg 1400w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-300x169.jpg 300w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1024x576.jpg 1024w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-768x432.jpg 768w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1066x600.jpg 1066w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-655x368.jpg 655w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-240x135.jpg 240w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-640x360.jpg 640w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-960x540.jpg 960w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1280x720.jpg 1280w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/figure>\n\n\n\n<p>It has become increasingly difficult to distinguish fact from fiction when viewing online images and videos. Resilient, trustworthy technologies can help people determine whether the content they are viewing was captured by a camera or microphone\u2014or generated or modified by AI tools.&nbsp;<\/p>\n\n\n\n<p>We refer to technologies aimed at helping viewers verify the source and history\u2014that is, the provenance\u2014of digital content as <em>media integrity and authentication<\/em> (MIA) methods. This technique, driven by the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/c2pa.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Coalition for Content Provenance and Authenticity<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (C2PA), a standards body dedicated to scaling these capabilities, as well as complementary methods such as watermarks and fingerprinting, have become critically important with the rapid advance of AI systems capable of creating, realistic imagery, video, and audio at scale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-convergence-of-forces\">A convergence of forces<\/h2>\n\n\n\n<p>Our team recognized an inflection point in the evolution of online content integrity, driven by the convergence of four forces:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Growing saturation of synthetic media<\/strong>, driven by proliferation of high-fidelity content-generation tools and the explosion of AI generated or modified media online<\/li>\n\n\n\n<li><strong>Forthcoming legislation<\/strong> both nationally and internationally seeking to define what \u201cverifiable\u201d provenance should mean in practice<\/li>\n\n\n\n<li><strong>Mounting pressure on implementers<\/strong> to ensure authentication signals are clear and helpful, especially as signals increase when legislation goes into effect in 2026<\/li>\n\n\n\n<li><strong>Heightened awareness of&nbsp;potential&nbsp;adversarial attacks<\/strong> that attempt to exploit weaknesses in authenticity systems<\/li>\n<\/ul>\n\n\n\n<p>The usefulness and trustworthiness of provenance signals, whether certifying content as synthetic or as an authentic capture of real-world scenes, will depend not only on advances in technology, but also on how the broader digital ecosystem adopts, implements, and governs these tools. Aligning around implementation choices that promote consistency and clarity is essential to ensure transparency signals strengthen, rather than erode, public confidence.<\/p>\n\n\n\n<p>To address these challenges, we launched a comprehensive evaluation of the real-world limits, edge cases, and emerging \u201cattack surfaces\u201d for MIA methods. Today, we are publishing our findings in the <a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/media-integrity-and-authentication-status-directions-and-futures\/\"><em>Media Integrity & Authentication: Status, Directions & Futures <\/em>report<\/a>. The report distills lessons learned and outlines practical directions for strengthening media integrity in the years ahead.<\/p>\n\n\n\n\t<div class=\"border-bottom border-top border-gray-300 mt-5 mb-5 msr-promo text-center text-md-left alignwide\" data-bi-aN=\"promo\" data-bi-id=\"1160910\">\n\t\t\n\n\t\t<p class=\"msr-promo__label text-gray-800 text-center text-uppercase\">\n\t\t<span class=\"px-4 bg-white display-inline-block font-weight-semibold small\">video series<\/span>\n\t<\/p>\n\t\n\t<div class=\"row pt-3 pb-4 align-items-center\">\n\t\t\t\t\t\t<div class=\"msr-promo__media col-12 col-md-5\">\n\t\t\t\t<a class=\"bg-gray-300 display-block\" href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/story\/on-second-thought\/\" aria-label=\"On Second Thought\" data-bi-cN=\"On Second Thought\" target=\"_blank\">\n\t\t\t\t\t<img decoding=\"async\" class=\"w-100 display-block\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/01\/MFST_feature_SecondThought_1400x788.jpg\" alt=\"On Second Thought with Sinead Bovell\" \/>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"msr-promo__content p-3 px-5 col-12 col-md\">\n\n\t\t\t\t\t\t\t\t\t<h2 class=\"h4\">On Second Thought<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p id=\"on-second-thought\" class=\"large\">A video series with Sinead Bovell built around the questions everyone\u2019s asking about AI. With expert voices from across Microsoft, we break down the tension and promise of this rapidly changing technology, exploring what\u2019s evolving and what\u2019s possible.<\/p>\n\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"wp-block-buttons justify-content-center justify-content-md-start\">\n\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t\t<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/story\/on-second-thought\/\" aria-describedby=\"on-second-thought\" class=\"btn btn-brand glyph-append glyph-append-chevron-right\" data-bi-cN=\"On Second Thought\" target=\"_blank\">\n\t\t\t\t\t\t\tExplore the series\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div><!--\/.msr-promo__content-->\n\t<\/div><!--\/.msr-promo__inner-wrap-->\n\t<\/div><!--\/.msr-promo-->\n\t\n\n\n<h2 class=\"wp-block-heading\" id=\"findings-and-directions-forward\">Findings and directions forward<\/h2>\n\n\n\n<p>Our research recognizes that different media integrity and authenticity methods serve differing purposes and offer distinct levels of protection. After defining each method in detail, we focused on secure provenance (C2PA), imperceptible watermarking, and soft hash fingerprinting across images, audio, and video.<\/p>\n\n\n\n<p>Grounded in our evaluation of these MIA methods across modalities, attack categories, and real-world workflows, several new findings emerged including two new concepts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>High-Confidence Provenance Authentication<\/strong>: a&nbsp;critical capability for verifying, under defined conditions, whether claims about the origin of and modifications made to an asset can be&nbsp;validated&nbsp;with high certainty.<\/li>\n\n\n\n<li><strong>Sociotechnical Provenance Attacks<\/strong>: attacks aimed at deception and capable of inverting signals, making authentic content appear synthetic, and synthetic content appear authentic.<\/li>\n<\/ul>\n\n\n\n<p>Drawing on our findings, we identified four promising directions for further strengthening media authentication, along with suggestions to support more effective implementation strategies and future decisions. We\u2019ve summarized the findings and directions below, with additional detail available in the report.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Promising directions<\/th><th>High-level findings<\/th><\/tr><\/thead><tbody><tr><td>Delivering high-confidence provenance authentication<\/td><td>&#8211; <strong>Implementation and display choices may affect the reliability of provenance indicators<\/strong> and how they are interpreted by the public. <br><br>&#8211; Using a C2PA provenance manifest for media created and signed in a high security environment <strong>enables high-confidence validation<\/strong>. <br><br>&#8211; High-confidence validation is also possible across a broader volume of images, audio, and video when <strong>an imperceptible watermark is linked to C2PA provenance manifest as an additional layer to recover the provenance information if removed<\/strong>. <br><br>&#8211; Fingerprinting is <strong>not an enabler for high-confidence validation<\/strong> and can involve significant costs when expected at scale. However, it can support manual forensics.<\/td><\/tr><tr><td>Mitigating confusion from sociotechnical provenance attacks<\/td><td>&#8211; <strong>MIA methods are susceptible to sociotechnical attacks on provenance that may mislead the public<\/strong>, resulting in confusion and misplaced trust about an asset\u2019s provenance if there is an overreliance on low-quality signals.<br><br>&#8211; Layering and linking secure provenance and imperceptible watermarking methods to achieve high confidence validation also offers a promising option to <strong>both deter and mitigate the impact of attacks<\/strong>.<br><br>&#8211; Unintended consequences may result from the use of methods lacking authentication, such as the use of perceptible watermarks in the absence of secure provenance. <strong>Perceptible watermarks\u202fmay cause confusion<\/strong> in cases of forgery or\u202fdiscourage people from\u202fconsulting high-confidence\u202fprovenance information\u202fvia a validation tool, if such perceptible disclosures are taken at\u202fface\u202fvalue.<br>\u202f<br>&#8211; <strong>UX design that enables users to explore manifest details<\/strong>\u2014such as where edits occurred&nbsp;or region of interest\u2014has the potential to&nbsp;reduce confusion and&nbsp;support forensics and fact checking efforts.&nbsp;&nbsp;<\/td><\/tr><tr><td>Enabling more trusted provenance on edge devices<\/td><td>&#8211; High-confidence results <strong>aren&#8217;t feasible when provenance is added by a conventional offline device<\/strong> (e.g., camera or recording device without connectivity).<br><br>&#8211; <strong>Implementing a secure enclave<\/strong> within the hardware layer of offline devices is essential to make the provenance of captured images, audio, and video more trustworthy.<\/td><\/tr><tr><td>Investing in ongoing research and policy development<\/td><td>&#8211; All three methods offer organizations&nbsp;<strong>valuable tools for addressing operational challenges<\/strong>&nbsp;such as fraud prevention, risk management, and digital accountability.&nbsp;<br><br>&#8211; <strong>UX and display&nbsp;<\/strong>are promising directions for research. Important directions include in-stream tools that display provenance information where people are&nbsp;and&nbsp;distinguish&nbsp;between&nbsp;high- and lower-confidence&nbsp;provenance signals.<br><br>&#8211; <strong>Stakeholders&nbsp;should&nbsp;conduct ongoing analysis and red teaming<\/strong>&nbsp;to&nbsp;identify&nbsp;and mitigate weaknesses&nbsp;through&nbsp;technical approaches,&nbsp;policies, and&nbsp;laws.&nbsp;&nbsp;&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-journey-continues\">The journey continues<\/h2>\n\n\n\n<p>This report marks the beginning of a new chapter in our <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/02\/22\/deepfakes-disinformation-c2pa-origin-cai\/\">media provenance journey<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, building on years of foundational work, from <a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/amp-authentication-of-media-via-provenance\/\">developing the very first prototype<\/a> in 2019 to co-founding the C2PA in 2021 and helping catalyze an ecosystem that has since grown to more than <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/c2pa.org\/the-c2pa-launches-content-credentials-2-3-and-celebrates-5-years-of-impact-across-the-digital-ecosystem\/\">6,000 members and affiliates<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> supporting C2PA Content Credentials. This research represents the next evolution of that long\u2011standing commitment.<\/p>\n\n\n\n<p>We hope that by sharing our learnings will help others prepare for an important wave, especially as generative technologies accelerate and provenance signals multiply. This work is already underway across our products at Microsoft. Together, these directions highlight opportunities for the ecosystem to align, harden, and innovate, so authentication signals are not merely visible, but robust, meaningful, and resilient throughout the content lifecycle.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As synthetic media grows, verifying what\u2019s real, and the origin of content, matters more than ever. Our latest report explores media integrity and authentication methods, their limits, and practical paths toward trustworthy provenance across images, audio, and video.<\/p>\n","protected":false},"author":43868,"featured_media":1162625,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[{"type":"user_nicename","value":"Eric Horvitz","user_id":"32033"},{"type":"user_nicename","value":"Andrew Jenks","user_id":"42177"},{"type":"user_nicename","value":"Jessica Young","user_id":"43761"}],"msr_hide_image_in_river":0,"footnotes":""},"categories":[1],"tags":[],"research-area":[13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[243984],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-1162092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-blog","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-post-option-blog-homepage-featured"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[1168054],"related-events":[],"related-researchers":[{"type":"user_nicename","value":"Eric Horvitz","user_id":32033,"display_name":"Eric Horvitz","author_link":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/horvitz\/\" aria-label=\"Visit the profile page for Eric Horvitz\">Eric Horvitz<\/a>","is_active":false,"last_first":"Horvitz, Eric","people_section":0,"alias":"horvitz"},{"type":"user_nicename","value":"Andrew Jenks","user_id":42177,"display_name":"Andrew Jenks","author_link":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/ajenks\/\" aria-label=\"Visit the profile page for Andrew Jenks\">Andrew Jenks<\/a>","is_active":false,"last_first":"Jenks, Andrew","people_section":0,"alias":"ajenks"},{"type":"user_nicename","value":"Jessica Young","user_id":43761,"display_name":"Jessica Young","author_link":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/jessicayoung\/\" aria-label=\"Visit the profile page for Jessica Young\">Jessica Young<\/a>","is_active":false,"last_first":"Young, Jessica","people_section":0,"alias":"jessicayoung"}],"msr_type":"Post","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-960x540.jpg\" class=\"img-object-cover\" alt=\"three white outline icons on a blue-to-pink gradient background: an image with a copyright \u201cCR\u201d badge, an image overlaid with fingerprint-like lines, and an image framed by a cropping grid.\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-960x540.jpg 960w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-300x169.jpg 300w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1024x576.jpg 1024w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-768x432.jpg 768w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1066x600.jpg 1066w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-655x368.jpg 655w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-240x135.jpg 240w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-640x360.jpg 640w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1-1280x720.jpg 1280w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2026\/02\/MediaIntegrityReport-BlogHeroFeature-1400x788-1.jpg 1400w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","byline":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/horvitz\/\" title=\"Go to researcher profile for Eric Horvitz\" aria-label=\"Go to researcher profile for Eric Horvitz\" data-bi-type=\"byline author\" data-bi-cN=\"Eric Horvitz\">Eric Horvitz<\/a>, <a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/ajenks\/\" title=\"Go to researcher profile for Andrew Jenks\" aria-label=\"Go to researcher profile for Andrew Jenks\" data-bi-type=\"byline author\" data-bi-cN=\"Andrew Jenks\">Andrew Jenks<\/a>, and <a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/jessicayoung\/\" title=\"Go to researcher profile for Jessica Young\" aria-label=\"Go to researcher profile for Jessica Young\" data-bi-type=\"byline author\" data-bi-cN=\"Jessica Young\">Jessica Young<\/a>","formattedDate":"February 19, 2026","formattedExcerpt":"As synthetic media grows, verifying what\u2019s real, and the origin of content, matters more than ever. Our latest report explores media integrity and authentication methods, their limits, and practical paths toward trustworthy provenance across images, audio, and video.","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/1162092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/users\/43868"}],"replies":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/comments?post=1162092"}],"version-history":[{"count":31,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/1162092\/revisions"}],"predecessor-version":[{"id":1162632,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/1162092\/revisions\/1162632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media\/1162625"}],"wp:attachment":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1162092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/categories?post=1162092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/tags?post=1162092"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1162092"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=1162092"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=1162092"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1162092"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=1162092"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1162092"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=1162092"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=1162092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}