Liveness Test
   HOME

TheInfoList



OR:

A liveness test, liveness check or liveness detection is an automated means of checking whether a subject is a real person or part of a
spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
. In a video liveness test, users are typically asked to look into a camera and to move, smile or blink, and features of their moving face may then be compared to that of a still image.
Artificial intelligence Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
is used to counter presentation attacks such as
deepfake ''Deepfakes'' (a portmanteau of and ) are images, videos, or audio that have been edited or generated using artificial intelligence, AI-based tools or AV editing software. They may depict real or fictional people and are considered a form of ...
s or users wearing hyperrealistic
mask A mask is an object normally worn on the face, typically for protection, disguise, performance, or entertainment, and often employed for rituals and rites. Masks have been used since antiquity for both ceremonial and practical purposes, ...
s, or video injection attacks. The technique is used as part of
know your customer Know your customer (KYC) guidelines and regulations in financial services require professionals to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. The procedures fit within the broad ...
checks in financial services and during
facial age estimation Facial age estimation is the use of artificial intelligence to estimate the age of a person based on their facial features. Computer vision techniques are used to analyse the face, facial features in the images of millions of people whose age is kn ...
. Other forms of liveness test include checking for a pulse when using a
fingerprint scanner Fingerprint scanners are a type of biometric security device that identify an individual by identifying the structure of their fingerprints. They are used in police stations, security industries, smartphones, and other mobile devices. Fingerpr ...
or checking that a person's voice is not a recording or artificially generated during
speaker recognition Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to ''speaker recognition'' or speech recognition. Speaker verification ...
.


See also

*
Artificial intelligence content detection Artificial intelligence detection software aims to determine whether some Content creation, content (text, image, video or audio) was Generative artificial intelligence, generated using artificial intelligence (AI). However, this software is ofte ...
* Biometric spoofing *
Electronic authentication Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication pro ...
*
Identity verification service An identity verification service is used by businesses to ensure that users or customers provide information that is associated with the identity of a real person. The service may verify the authenticity of physical identity documents such as a driv ...
*
Multi-factor authentication Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more distinct types of evidence ...
* Voice spoofing


Further reading

*


References

Deepfakes Identity theft Facial recognition Biometrics {{Computer-security-stub