Fraudsters use many techniques to forge a document, and photo manipulation or replacement is not a rare one. For instance, they can morph a new picture and attach it to a valid document. The options are numerous, but they are generally related to visible primary portraits.
However, the absolute majority of identity documents currently have secondary and/or “ghost” photos that may or may not be visible to the naked eye. Such additional portraits are added to documents in RFID chips that are read with NFC technology, in kinegrams, in lenticular images, or just placed anywhere and visualised under special lights (ultra-violet, for example).
Updated Regula Document Reader SDK
The solution ensures that the required quantity of the holder’s photos is present and that they are located everywhere
The updated Regula Document Reader SDK automatically checks the presence (or absence) of all the portraits in the document: primary, secondary, and 'ghost'.
The solution ensures that the required quantity of the holder’s photos is present and that they are located everywhere they should be, including other pages of the document, not only the main one.
This ability derives from Regula’s profound knowledge of document features and security elements based on more than 12,500 scrutinised identity document templates. Regula’s proprietary database, the world's largest, is a result of its unique knowledge of reliable authentication of identity documents.
Out-of-the-box photo comparison
With portrait checks, it goes even further: paired with Regula Face SDK, Regula Document Reader SDK introduces the out-of-the-box photo comparison.
The solution matches facial images in all the photos (primary, secondary, and “ghost”), no matter their location in the document, and detects any possible mismatches or manipulations that may indicate fraud. All of that is done within one interaction in mere seconds.
LASINK™ portrait printing technology verification
For deeper document authentication, Regula Document Reader SDK offers a new feature: LASINK™ portrait printing technology verification.
To visualise a photo in a kinegram or a lenticular image, one must move the document and inspect it at various angles
This is a special check of laser engraving technology that is used for securely printing portraits and is extremely difficult to counterfeit. Some of these secondary or “ghost” portraits are best seen and inspected only when a physical document is provided.
For instance, to be able to visualise a photo in a kinegram or a lenticular image, one must move the document and inspect it at various angles. However, that doesn’t mean that user can’t properly verify a document in remote scenarios.
Liveness of a document
For this purpose, Regula Document Reader SDK provides a possibility to verify the so-called “liveness” of a document, i.e. to conduct a special session during which a person moves their ID in front of a mobile or web camera to show that they have it as a hardcopy, not a scanned image or a screenshot.
This makes it possible to check the presence and validity of optically variable security elements, like holograms, that help prove the authenticity of a document.
Eliminate fake document risk
Also, such a “liveness” check helps eliminate the risk of dealing with fake documents that don’t exist physically, but are created by fraudsters in the form of screenshots or images to bypass online verification.
This is achieved by a special feature that allows Regula Document Reader SDK to detect screens and digital devices that are shown to the camera instead of document hard copies.
Liveness-centric verification process
There are two important rules that organisations looking for maximum security should follow"
“There are two important rules that organisations looking for maximum security should follow. First, the ‘Please provide a photo of your ID’ approach doesn’t work any longer, as many images of fake IDs are often impeccable and humans and even technologies may not be able to detect forgery from a static picture,” says Ihar Kliashchou, Chief Technology Officer at Regula.
Ihar Kliashchou adds, "Therefore, we strongly advise switching to a liveness-centric verification process that enables verification of physical documents and their dynamic parametres."
Cross-checks
Ihar Kliashchou continues, "Second, it is important to authenticate as many elements in a document as possible, ideally every single data field and security feature. However, it is not enough to just verify them one by one. You should be able to cross-check everything and find possible mismatches and inconsistencies that may indicate that you’re dealing with a forged ID."