Skip to main content

Liveness Verification System

Overview

The Liveness Verification System by Facia ensures the authenticity of a video selfie by performing checks against various attacks such as replay attacks, face mask attacks, and paper attacks. The system employs multiple detection models and an ensemble model to calculate a final liveness score, determining whether the input represents a live and genuine human face.

Liveness Detection Offered By Facia

Currently, Facia provides two types of liveness detection:

Active Liveness Detection

Active Liveness Detection involves the use of specific challenges or stimuli that require a real-time, dynamic response from the user. These challenges are designed to be perceptible to a live person but challenging for automated or fraudulent attempts to replicate. Examples include asking the user to blink, smile, or perform a specific facial movement during the authentication process. The system analyses the response to these challenges to ensure the presence of a live and attentive user, enhancing the security of biometric verification processes.

Passive Liveness Detection

Passive Liveness Detection relies on the continuous monitoring of various biometric indicators without requiring explicit user interaction or response to specific challenges. This method assesses the inherent characteristics of the biometric data being captured, such as facial features, to discern signs of vitality. Passive liveness detection systems employ advanced algorithms to analyse the natural variations and patterns in the biometric data, ensuring that it originates from a living, present individual. This approach is less intrusive and seamless for users, as it does not necessitate specific actions during the authentication process.

Liveness Verification Process

1. Start

The process begins with a video selfie submitted for liveness verification.

2. Extract Frames

The video selfie is broken down into individual frames and then processed through all services in order to check whether the input sample is live or not.

3. Frame Processing

In frame processing, the input request undergoes analysis by various detection services to identify potential spoof attempts or confirm a real identity. The following attacks are checked during the processing of a request:

Paper Mask

"Paper mask" is not a widely recognized term in cybersecurity. However, it could potentially refer to a theoretical or simulated security measure described in a research paper. It's advisable to provide additional context for a more accurate definition.

Replay

"Replay attack" is a type of cyber attack where an attacker intercepts and maliciously retransmits data that was validly captured during a previous communication session. This can lead to unauthorised access, impersonation, or other security breaches.

Silicon Mask

"Silicon mask" typically refers to the physical or logical design of integrated circuits, where a mask is used in the manufacturing process to define the layout of transistors and other components on the silicon wafer. In a cybersecurity context, it might also refer to attacks targeting vulnerabilities at the hardware level.

Screenshot

"Screenshot" is an image capture of the visible content on a computer screen or display at a particular moment in time. In the context of cybersecurity, screenshots may be used for documentation, analysis, or to illustrate specific issues during security assessments.

Deepfake

"Deepfake" is a synthetic media production technique that uses artificial intelligence (AI) to create or alter audio and video content, making it appear as though it is real and unaltered. Deepfakes can be used for malicious purposes, such as spreading disinformation or creating convincing fake identities.

Evasion

"Evasion" refers to the techniques employed by attackers to avoid detection or analysis by security systems. This may involve altering the characteristics of malicious code or network traffic to evade traditional security measures and intrusion detection systems.

3D Animated Face

"3D animated face" refers to the creation of a three-dimensional, computer-generated representation of a human face, possibly for malicious purposes like impersonation or creating deceptive content.

4. Ensemble Model

The outputs from all models/services are collected, and an ensemble model is executed to provide a final liveness score. This score informs the decision regarding spoofing and liveness.

Conclusion

This concludes the technical documentation for the Liveness Verification System by Facia. Developers can integrate these systems into applications requiring robust liveness verification for enhanced security and protection against fraudulent impersonation.

Facial Liveness Accuracy at Facia

  • 0%FAR@<1%FRR