We’re confident that our technology is not spoofable.
For those less familiar with the term, spoofing is a type of presentation attack that aims to manipulate or bypass biometric identification systems. As biometric technology becomes more prevalent, organisations face increasing threats from fraudsters employing methods like presenting photos, videos, or even replay attacks—looped videos designed to mimic real facial behaviours. Robust spoof detection is essential to maintain the integrity of such systems. Â
There are two primary approaches to detecting spoof attempts: cooperative and passive liveness detection. Cooperative or intrusive, liveness detection requires active user participation. For instance, users may be prompted to follow instructions such as looking in specific directions or smiling. While effective, this method can impact user experience and transaction speed. Â
ICU & MyCheckr, our intelligent age verification systems, integrate advanced AI algorithms to offer precise, non-intrusive passive spoof detection. Transforming a standard USB camera into a comprehensive security solution, they give the highest level of accuracy while monitoring for fraud throughout the process. It can identify and reject spoofs involving photos, videos, or mobile devices, ensuring a smooth and secure experience for genuine users. Â
We have built, trained and tuned our own neural networks using an extensive data sample containing millions of images to create an in-house, bespoke Presentation Attack Detection (PAD) technique.
In addition, we use edge technology, meaning the algorithms run locally on specially designed hardware. The processing is done on-device and not on a cloud-based platform, allowing for faster and more efficient identification of malicious activity.
The use of AI-powered biometric technology has transformative potential but must be implemented responsibly. By addressing data protection concerns and enhancing system robustness, technology providers and governing bodies can foster trust and ensure fair usage of this powerful tool.`