Detecting Digital Injection To Counter Deepfake Biometric Fraud 

As deepfakes have become more realistic and easier to produce, injection attacks are an increasingly common method used to spoof biometrics and it is predicted that in 2023, 20 percent of successful account takeover attacks will leverage deepfakes.

Now, in response to this threat ID R&D has introduced IDLive® Face Plus to address the growing security threat posed to institutions and consumers by deepfakes and digital injection attacks.  

ID R&D’s innovation arrives at the same time as new survey data from the company shows 91 percent of businesses acknowledge that they or their customers are concerned about deepfake fraud, with 42 percent having encountered deepfake attacks. 

Furthermore, 84 percent of the same respondents express similar concern about injection attacks, with 37 percent having firsthand exposure. More than half (51 percent) state that chatbot-enabled fraud is on their radar as a credible threat. 
  
IDLive Face Plus adds detection of digital injection attacks, where fraudsters use hardware and software hacks to substitute a biometric capture with fake digital imagery. 

It is the first known product to help ensure a proper selfie capture on both desktops and mobile devices with a frictionless approach that eliminates user abandonments caused by complicated security checks.  
“ID R&D’s innovative approach to combating deepfakes will help us stay ahead of the increasing realism of digitally-created faces without burdening people with security tasks,” commented Alexey Khitrov, CEO and Co-Founder of ID R&D. “We are laser-focused on helping our customers and partners leverage biometrics to their full potential to make their digital identity solutions not only more secure, but easy to use.”  

How It Works   

Identity verification and authentication techniques that use facial recognition rely on liveness detection to ensure that a live human face is in front of the camera during biometric capture. While presentation attacks involve “presenting” non-live imagery to the camera, such as photos on paper or digital screens, injection attacks use hardware and software hacks to bypass the camera altogether. 

Without countermeasures, fraudsters can “inject” digital facial imagery into a capture device in a way that defeats certain liveness detection measures.   

ID R&D’s “frictionless first” approach to fighting fraud continues to yield innovative solutions for their partners that avoid the pitfalls of techniques that inconvenience people and cause abandonments during onboarding and login. 
IDLive Face Plus draws upon a wealth of data and expertise in computer vision and deep neural networks while advancing the mission of making security transparent to users.  

You Might Also Read: 

Airlines Think Biometrics Will Improve Passengers' Experience:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Criminals Are Quick To Use ChatGPT 
The Dark Side Of AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.