FB pixel

Consult Hyperion whitepaper examines deepfake threat to identity verification

Consult Hyperion whitepaper examines deepfake threat to identity verification
 

In the landscape of artificial intelligence (AI) and machine learning, recent advancements are shaking up traditional methods of identity document verification. While conventional solutions have relied on capturing and analyzing static images or videos of physical documents, these methods are facing a formidable challenge from the rise of deepfake injection attacks, a whitepaper by Consult Hyperion reveals.

Consult Hyperion wrote the paper in collaboration with Inverid.

Deepfake technology, which utilizes AI algorithms to manipulate or fabricate images and videos, has become increasingly sophisticated. As a result, identity verification systems that solely depend on visual inspection are now vulnerable to exploitation. This vulnerability has prompted experts to advocate for more robust alternatives, particularly those based on chip-based solutions bolstered by strong cryptography.

In recent years, digital banks have been at the forefront of leveraging digital identity document verification, and the technology has since matured, expanding its applicability beyond banking to various consumer-facing sectors such as financial services, gambling, insurance, and conveyancing.

There has also been an uptake of digital identity document verification solutions. Initially utilized primarily for customer onboarding, identity document verification has become an integral part of the customer due diligence process, often bundled with other background checks. However, the whitepaper reveals its potential extends beyond initial onboarding to various stages of the customer lifecycle, including account recovery and critical event management.

The solution typically requires a remote face biometrics matching and liveness detection process to verify that the individual presenting the document is indeed the rightful owner.

Advocates argue that identity document verification should be decoupled from the onboarding process and offered as a standalone capability. This would allow service providers to deploy it as needed, integrating it into their identity and access management platforms.

The paper also outlines two primary methods of identity document verification: photographic and cryptographic. The cryptographic approach is highlighted as superior in terms of security and user experience optimization. Moreover, it emphasizes that identity document verification requires specialized expertise beyond simple document scanning, suggesting that outsourcing may be the most effective approach for many organizations.

The photographic method involves capturing and analyzing a photographic image or video recording of the document. However, analyzing physical security features from such images can pose challenges, for which the whitepaper claims advancements in cryptographic verification is needed.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Groups reject expiry date for digital ID cards in Kenya as govt defends move

Some civil society organizations in Kenya say they want an explanation from the government with regard to the institution of…

 

Idemia forensic software extracts human faces, tattoos for investigative leads

Even when a facial recognition system is integrated within a state or federal investigative agency, human intervention is necessary. In…

 

Nearly three quarters of U.S. adults worry deepfakes could sway election: Jumio

The hour is ripe for political deepfakes. The U.S. presidential elections are still four months away, and the campaign has…

 

Controversial US privacy bill rewritten again, but path still unclear

The already controversial American Privacy Rights Act of 2024 (APRA), which was originally introduced in April by U.S. Senate Commerce…

 

Selective disclosure and zero-knowledge proofs: Examining the latest revision of ETSI TR 119 476

By Sebastian Elfors, Senior Architect at IDnow In July 2024, the European Telecommunications Standards Institute (ETSI) published an updated revision of…

 

Contractor needed for project to identify civil registration hurdles in Chad

A request for the Expression of Interest (EOI) has been launched for a consultancy firm to identify challenges that stand…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events