Download PDF version Contact company

Fraudsters use many techniques to forge a document, and photo manipulation or replacement is not a rare one. For instance, they can morph a new picture and attach it to a valid document. The options are numerous, but they are generally related to visible primary portraits. 

However, the absolute majority of identity documents currently have secondary and/or “ghost” photos that may or may not be visible to the naked eye. Such additional portraits are added to documents in RFID chips that are read with NFC technology, in kinegrams, in lenticular images, or just placed anywhere and visualised under special lights (ultra-violet, for example). 

Updated Regula Document Reader SDK

The solution ensures that the required quantity of the holder’s photos is present and that they are located everywhere

The updated Regula Document Reader SDK automatically checks the presence (or absence) of all the portraits in the document: primary, secondary, and 'ghost'. 

The solution ensures that the required quantity of the holder’s photos is present and that they are located everywhere they should be, including other pages of the document, not only the main one. 

This ability derives from Regula’s profound knowledge of document features and security elements based on more than 12,500 scrutinised identity document templates. Regula’s proprietary database, the world's largest, is a result of its unique knowledge of reliable authentication of identity documents.

Out-of-the-box photo comparison

With portrait checks, it goes even further: paired with Regula Face SDK, Regula Document Reader SDK introduces the out-of-the-box photo comparison.

The solution matches facial images in all the photos (primary, secondary, and “ghost”), no matter their location in the document, and detects any possible mismatches or manipulations that may indicate fraud. All of that is done within one interaction in mere seconds.

LASINK™ portrait printing technology verification

For deeper document authentication, Regula Document Reader SDK offers a new feature: LASINK™ portrait printing technology verification. 

To visualise a photo in a kinegram or a lenticular image, one must move the document and inspect it at various angles

This is a special check of laser engraving technology that is used for securely printing portraits and is extremely difficult to counterfeit. Some of these secondary or “ghost” portraits are best seen and inspected only when a physical document is provided.

For instance, to be able to visualise a photo in a kinegram or a lenticular image, one must move the document and inspect it at various angles. However, that doesn’t mean that user can’t properly verify a document in remote scenarios. 

Liveness of a document

For this purpose, Regula Document Reader SDK provides a possibility to verify the so-called “liveness” of a document, i.e. to conduct a special session during which a person moves their ID in front of a mobile or web camera to show that they have it as a hardcopy, not a scanned image or a screenshot.

This makes it possible to check the presence and validity of optically variable security elements, like holograms, that help prove the authenticity of a document. 

Eliminate fake document risk

Also, such a “liveness” check helps eliminate the risk of dealing with fake documents that don’t exist physically, but are created by fraudsters in the form of screenshots or images to bypass online verification.

This is achieved by a special feature that allows Regula Document Reader SDK to detect screens and digital devices that are shown to the camera instead of document hard copies. 

Liveness-centric verification process

There are two important rules that organisations looking for maximum security should follow"

There are two important rules that organisations looking for maximum security should follow. First, the ‘Please provide a photo of your ID’ approach doesn’t work any longer, as many images of fake IDs are often impeccable and humans and even technologies may not be able to detect forgery from a static picture,” says Ihar Kliashchou, Chief Technology Officer at Regula.

Ihar Kliashchou adds, "Therefore, we strongly advise switching to a liveness-centric verification process that enables verification of physical documents and their dynamic parametres."

Cross-checks

Ihar Kliashchou continues, "Second, it is important to authenticate as many elements in a document as possible, ideally every single data field and security feature. However, it is not enough to just verify them one by one. You should be able to cross-check everything and find possible mismatches and inconsistencies that may indicate that you’re dealing with a forged ID."

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?