Detecting Digital Injection To Counter Deepfake Biometric Fraud 

As deepfakes have become more realistic and easier to produce, injection attacks are an increasingly common method used to spoof biometrics and it is predicted that in 2023, 20 percent of successful account takeover attacks will leverage deepfakes.

Now, in response to this threat ID R&D has introduced IDLive® Face Plus to address the growing security threat posed to institutions and consumers by deepfakes and digital injection attacks.  

ID R&D’s innovation arrives at the same time as new survey data from the company shows 91 percent of businesses acknowledge that they or their customers are concerned about deepfake fraud, with 42 percent having encountered deepfake attacks. 

Furthermore, 84 percent of the same respondents express similar concern about injection attacks, with 37 percent having firsthand exposure. More than half (51 percent) state that chatbot-enabled fraud is on their radar as a credible threat. 
  
IDLive Face Plus adds detection of digital injection attacks, where fraudsters use hardware and software hacks to substitute a biometric capture with fake digital imagery. 

It is the first known product to help ensure a proper selfie capture on both desktops and mobile devices with a frictionless approach that eliminates user abandonments caused by complicated security checks.  
“ID R&D’s innovative approach to combating deepfakes will help us stay ahead of the increasing realism of digitally-created faces without burdening people with security tasks,” commented Alexey Khitrov, CEO and Co-Founder of ID R&D. “We are laser-focused on helping our customers and partners leverage biometrics to their full potential to make their digital identity solutions not only more secure, but easy to use.”  

How It Works   

Identity verification and authentication techniques that use facial recognition rely on liveness detection to ensure that a live human face is in front of the camera during biometric capture. While presentation attacks involve “presenting” non-live imagery to the camera, such as photos on paper or digital screens, injection attacks use hardware and software hacks to bypass the camera altogether. 

Without countermeasures, fraudsters can “inject” digital facial imagery into a capture device in a way that defeats certain liveness detection measures.   

ID R&D’s “frictionless first” approach to fighting fraud continues to yield innovative solutions for their partners that avoid the pitfalls of techniques that inconvenience people and cause abandonments during onboarding and login. 
IDLive Face Plus draws upon a wealth of data and expertise in computer vision and deep neural networks while advancing the mission of making security transparent to users.  

You Might Also Read: 

Airlines Think Biometrics Will Improve Passengers' Experience:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Are Quick To Use ChatGPT 
The Dark Side Of AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Wavenet

Wavenet

Wavenet has grown from simple beginnings to become one of the UK’s market leaders in unified communications, business telephony, and Cyber Security solutions.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.