Using AI, it analyzes facial features to assess the authenticity of faces against different attack vectors.
The firm, IQSEC, present its anti-spoofing system to validate the real presence of people through biometric verification of their face.
This is a solution that usesartificial intelligence(AI), which analyzes facial features and detects fraud, through various attack vectors.
Successfully pass the tests
Which pass the iBeta presentation attack detection test.
Complying with the requirements of ISO 30107-3, ensuring that it is able to effectively identify counterfeiting attempts, preventing identity theft.
“ Our anti-spoofing solution is a technology design to analyze distinctive facial features and assess the authenticity of faces.
“In order to identify signs of fraud through different attack vectors ,” explain Sergio Martínez, director of Research and Development at the firm.
You may be interest in reading: Stress and Cyberattacks: The challenge for cybersecurity kuwait whatsapp number data teams in Mexico
The standard, ISO 30107-3, is also endors by the National Voluntary Laboratory Accritation Program of the U.S. National Institute of Standards and Technology.
Which focuses on evaluating its efficiency against cyberattacks with high-resolution digital and paper photos, high-definition challenge/response videos, and paper masks.
Reject 900 attempts with no false positives
“ Complying with this international standard ensures that our system is able to effectively identify real biometric data from fraudulent ones.
“ The test includ around 900 phishing attack attempts, spread across six attack vectors, none of which were successful ,” the executive explain.
The cyber attack vectors includ in the tests were:
Photo print in 2D ink on white paper.
2D inkjet print photo on white paper present on a curv surface.
2D paper mask with space for real eyes.
Photo captur from a smartphone.
3D Inkjet Handmade Layer Mask – Photos.
Video present from a laptop.
“We even manag to achieve a 0% percentage of false acceptances, guaranteeing the effectiveness and precision of the system,” said Martínez.
Integrates with any surveillance system
One of the advantages of the solution is that it has the capacity to be integrat into any system make sure that contact information where user authentication is requir.
In addition, it is highly compatible with a wide range of image capture devices.
Such as security bz lists cameras, webcams, and document scanners, among others.