{"id":34484,"date":"2022-05-13T08:21:30","date_gmt":"2022-05-13T08:21:30","guid":{"rendered":"https:\/\/veridas.com\/?p=34484"},"modified":"2024-12-17T10:58:24","modified_gmt":"2024-12-17T10:58:24","slug":"beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","title":{"rendered":"Presentation attack: what it is and how to prevent it with biometrics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34484\" class=\"elementor elementor-34484 elementor-33741\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae4910e e-flex e-con-boxed e-con e-parent\" data-id=\"ae4910e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1606ba6 elementor-widget elementor-widget-heading\" data-id=\"1606ba6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are presentation attacks?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-331d288 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"331d288\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7983bc0\" data-id=\"7983bc0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5a064f elementor-widget elementor-widget-text-editor\" data-id=\"b5a064f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A <strong>presentation attack<\/strong> involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Attackers employ printed photos, digital images, or lifelike masks to mimic authorized users&#8217; faces, aiming to gain unauthorized access.&nbsp;<\/p>\n<p>Advanced anti-spoofing measures like <a href=\"https:\/\/veridas.com\/liveness-detection\/\">liveness detection<\/a> verify that the presented facial data is from a live person, not a static source. By detecting and thwarting presentation attacks, <a href=\"https:\/\/veridas.com\/what-is-biometrics\/\">biometric authentication systems<\/a> ensure reliability and protect against unauthorized access.<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Facial biometric systems are achieving a massive insertion<\/strong> in many use cases: digital customer registration, authentication of access to web services, unlocking cell phones, physical access to offices or sporting events, etc.&nbsp;&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This spread of technology is inevitably accompanied by new forms of deception to gain fraudulent access to the different use cases mentioned. In the United States alone, the <a href=\"https:\/\/www.ftc.gov\/es\" target=\"_blank\" rel=\"noopener\">Federal Trade Commission<\/a> (FTC; Federal Trade Commission) estimated 2,331.2 million dollar losses due to identity fraud in 2021, doubling the figure estimated for 2019. According to the FTC, <a href=\"https:\/\/public.tableau.com\/app\/profile\/federal.trade.commission\/viz\/TheBigViewAllSentinelReports\/TopReports\" target=\"_blank\" rel=\"noopener\">identity fraud accounted for more than 50% of the total reported cases of fraud<\/a>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not that fraud is anything new; any process related to a person&#8217;s identity, using biometrics or not, is targeted by the malice of a few to gain access to usage rights that don&#8217;t belong to them.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And with biometrics, it&#8217;s not going to be any different, but the way the fraud is carried out is. This post aims to answer some questions about fraud in a facial biometric system and <strong>how we do technology to protect against it. <\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-426d24a elementor-widget elementor-widget-html\" data-id=\"426d24a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-da893906-cf3e-4e59-8695-c6c541f056fe\"><span class=\"hs-cta-node hs-cta-da893906-cf3e-4e59-8695-c6c541f056fe\" id=\"hs-cta-da893906-cf3e-4e59-8695-c6c541f056fe\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/da893906-cf3e-4e59-8695-c6c541f056fe\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-da893906-cf3e-4e59-8695-c6c541f056fe\" style=\"border-width:0px;\" height=\"348\" width=\"1280\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/da893906-cf3e-4e59-8695-c6c541f056fe.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, 'da893906-cf3e-4e59-8695-c6c541f056fe', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ba8d82 elementor-widget elementor-widget-spacer\" data-id=\"6ba8d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64278a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64278a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8fb1eaa\" data-id=\"8fb1eaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f2f76a elementor-widget elementor-widget-heading\" data-id=\"8f2f76a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is face presentation attack detection?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9603037 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9603037\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1fb8e3b\" data-id=\"1fb8e3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1809a6d elementor-widget elementor-widget-text-editor\" data-id=\"1809a6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In a biometric system, <strong>different weaknesses<\/strong> can be exploited in an attack depending on the component of the system that is being targeted. In this post, we will focus on what are known as <\/span><b>Presentation Attack<\/b><span style=\"font-weight: 400;\">\u00a0(PA).\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In presentation attacks, the attacker can either construct a replica artifact of a human biometric feature (e.g. a latex mask that has the physical features of a certain person) or modify a biometric feature of his own (e.g. the face, to hide his identity or make it resemble someone else&#8217;s).<\/span><\/p><p><span style=\"font-weight: 400;\">In these fraud attempts, the attacker presents either the artifact or the human characteristic to the biometric capture subsystem (camera and\/or software in charge of taking a picture of a face) in a way that interferes with the logic that allows the system to decide whether or not a face belongs to the person being authenticated or identified.\u00a0\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In other words, the system is attacked without modifying any component, but by altering the system&#8217;s response, &#8220;teaching&#8221; the sensor a biometric characteristic that is fraudulent. In facial biometrics the sensor is the camera, and the process of &#8220;teaching&#8221; consists of recording with the camera an artifact that represents a fraudulent biometric characteristic, this artifact being a photo on a screen, a photo printed on paper, a realistic mask, etc.<\/span><\/p><p><span style=\"font-weight: 400;\">When we say that the <strong>biometric characteristic is fraudulent<\/strong>, we are referring to one of these scenarios:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An artifact that has been fabricated to look like the person it is intended to impersonate, or it does not look like anyone but allows the attacker to conceal their identity.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attacker&#8217;s real face but made up, painted, tattooed in some way that allows him to hide his identity, or to look like a person he wants to impersonate.<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bf49739 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf49739\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-300cdc5\" data-id=\"300cdc5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e317f6b elementor-widget elementor-widget-heading\" data-id=\"e317f6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A regulatory framework to protect against a presentation attack<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab7a117 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab7a117\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8bc7d1a\" data-id=\"8bc7d1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8171ab2 elementor-widget elementor-widget-text-editor\" data-id=\"8171ab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The framework for evaluating presentation attack is developed within <a href=\"https:\/\/www.iso.org\/standard\/67381.html\" target=\"_blank\" rel=\"noopener\">ISO\/IEC 30107-3:2017<\/a>. This standard was born from the interest in classifying attacks based on parameters such as the effort required by the attacker and the motivation to establish a methodological framework that objectively measures how robust an attack detection system is. Some evaluators, such as <a href=\"https:\/\/www.ibeta.com\/iso-30107-3-presentation-attack-detection-confirmation-letters\/\" target=\"_blank\" rel=\"noopener\">iBeta Quality Assurance<\/a>, specify an ordering of the <strong>types of attacks into two levels of difficulty<\/strong>:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Level 1<\/strong>: The attacker does not know the algorithms used by the biometric solution to be attacked. It is estimated that the attacker can spend up to 8 hours with the same type of attack, with an approximate maximum budget of $30 to build each device to be used. This type of attack can be carried out with office material, such as mobile devices, paper, etc., and, therefore, they are attacks that can be carried out without difficulty.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Level 2<\/strong>: The attacker knows details about the algorithms used by the biometric solution. It is estimated that the attacker can spend up to 24 hours to perform the attacks with the same attack species and that he has a budget of approximately $300 to build each device to be used.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">At Veridas, following our strict and firm commitment not to use customer data, <strong>we have developed specific databases<\/strong> to measure the performance of our algorithms on different species (types) of presentation attacks.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">These databases are essential to fine-tune the algorithms and to be able to choose those that generalize best for all cases.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We will now show a description of the different species we have and some example recordings where you can learn about them. We give you the Veridas facial anti-fraud laboratory.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac56e5d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ac56e5d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ef5512\" data-id=\"7ef5512\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fc050c elementor-widget elementor-widget-heading\" data-id=\"9fc050c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Presentation attack types<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8fdeee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8fdeee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ce3ee6\" data-id=\"3ce3ee6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d07fe elementor-widget elementor-widget-heading\" data-id=\"12d07fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Level 1: five different types of attacks\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d2e4156 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d2e4156\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60547cc\" data-id=\"60547cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c73cab6 elementor-widget elementor-widget-text-editor\" data-id=\"c73cab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>1. Photo Replay Attack<\/b><span style=\"font-weight: 400;\">: this type of attack consists of showing to the camera a screen displaying the face that the attacker wants to use.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a1a4bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a1a4bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c907dc9\" data-id=\"c907dc9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-613ec52 elementor-widget elementor-widget-image\" data-id=\"613ec52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-replay-attack.gif\" class=\"attachment-full size-full wp-image-34462\" alt=\"photo presentation attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f53d243 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f53d243\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3673167\" data-id=\"3673167\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7539d1a elementor-widget elementor-widget-text-editor\" data-id=\"7539d1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>2. Video Replay Attack<\/b><span style=\"font-weight: 400;\">: like the previous one, it reproduces the face on a screen but uses a video instead of using a photo as the source. This allows the person to blink their eyes, move their head or make other gestures that can be reproduced on the video.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d90c33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d90c33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2ffca6\" data-id=\"b2ffca6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88fcc79 elementor-widget elementor-widget-image\" data-id=\"88fcc79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-video-replay-attack.gif\" class=\"attachment-large size-large wp-image-34468\" alt=\"video presentation attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d5b77e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d5b77e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dfb767b\" data-id=\"dfb767b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3bb28e elementor-widget elementor-widget-text-editor\" data-id=\"f3bb28e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>3. Print Attack<\/b><span style=\"font-weight: 400;\">: the camera records a sheet of paper on which the target face of the attack has been printed.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-429b99a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"429b99a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a65c33\" data-id=\"4a65c33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cc8f64 elementor-widget elementor-widget-image\" data-id=\"4cc8f64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-print-attack.gif\" class=\"attachment-large size-large wp-image-34458\" alt=\"print presentation attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-490c718 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"490c718\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a90c1e\" data-id=\"9a90c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6619f1 elementor-widget elementor-widget-text-editor\" data-id=\"e6619f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>4. Print 3D Layered Mask<\/b><span style=\"font-weight: 400;\">: like the previous one, this attack consists of printing a photograph of a face on paper. But in this case, instead of printing it once, it is done several times, and the features are cut out and glued to give a sense of 3D volume.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0ca3b7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0ca3b7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b4f2500\" data-id=\"b4f2500\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-289a056 elementor-widget elementor-widget-image\" data-id=\"289a056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-print-3D-layered-mask.gif\" class=\"attachment-large size-large wp-image-34456\" alt=\"pad print 3D layered mask\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53053f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53053f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cbe6d0\" data-id=\"2cbe6d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d519eaa elementor-widget elementor-widget-text-editor\" data-id=\"d519eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>5. Print Mask Attack<\/b><span style=\"font-weight: 400;\">: this is a printed sheet, like the &#8220;Print Attack,&#8221; but then the eyes, the outline of the face, the mouth&#8230; are cut out, constructing a \u201cpaper mask\u201d and allowing the target face to be used.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e166f56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e166f56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-487b86f\" data-id=\"487b86f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfb8e5a elementor-widget elementor-widget-image\" data-id=\"bfb8e5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-print-mask-attack.gif\" class=\"attachment-large size-large wp-image-34460\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-593aa2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"593aa2b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16b37a5\" data-id=\"16b37a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eccf3c1 elementor-widget elementor-widget-heading\" data-id=\"eccf3c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Level 2: nine different types of attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ed5d337 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ed5d337\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-298029d\" data-id=\"298029d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6870e54 elementor-widget elementor-widget-text-editor\" data-id=\"6870e54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>6. Avatar Attack 2D-to-3D:<\/b><span style=\"font-weight: 400;\">: consists of automatically generating a 3D avatar of the person&#8217;s face from a photograph of the target and then reproducing this avatar on a screen and showing it to the camera.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-234e9e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"234e9e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f30637f\" data-id=\"f30637f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7541001 elementor-widget elementor-widget-image\" data-id=\"7541001\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-attack-2D-to-3D.gif\" class=\"attachment-large size-large wp-image-34476\" alt=\"pad attack 2D to 3D\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74320c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74320c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1658a6d\" data-id=\"1658a6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f7be8b elementor-widget elementor-widget-text-editor\" data-id=\"4f7be8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>7. Photo Replay 3D Render Attack<\/b><span style=\"font-weight: 400;\">: consists of rendering a static image from a 3D face and presenting the image on a screen. Generating the 3D face is handcrafted using computer graphics editing tools. Finally, a very realistic render of the face is reproduced and shown to the camera.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bfee40a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bfee40a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bebca1a\" data-id=\"bebca1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6691a23 elementor-widget elementor-widget-image\" data-id=\"6691a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-photo-replay-3D-render-attack.gif\" class=\"attachment-large size-large wp-image-34452\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b23279 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b23279\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57f8fac\" data-id=\"57f8fac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5af6aa3 elementor-widget elementor-widget-text-editor\" data-id=\"5af6aa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>8. Video Replay 3D Render Attack<\/b><span style=\"font-weight: 400;\">: consists of building a 3D model of a face, as above, but instead of rendering a single photograph, a video is rendered in real-time. This animation is used to impersonate the person in the process.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4980bba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4980bba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5676034\" data-id=\"5676034\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d106b0 elementor-widget elementor-widget-image\" data-id=\"5d106b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-video-replay-3D-render-attack.gif\" class=\"attachment-large size-large wp-image-34466\" alt=\"video replay 3D render attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3582032 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3582032\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37b1313\" data-id=\"37b1313\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8af806d elementor-widget elementor-widget-text-editor\" data-id=\"8af806d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>9. Curved Paper 3D Mask<\/b><span style=\"font-weight: 400;\">: in this case, the person&#8217;s face is printed on a sheet of high-quality photographic paper and curved to give a sense of volume. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3713cea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3713cea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2173e7\" data-id=\"b2173e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-621665c elementor-widget elementor-widget-image\" data-id=\"621665c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-curved-paper-3D-mask.gif\" class=\"attachment-large size-large wp-image-34444\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-265c680 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"265c680\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9838499\" data-id=\"9838499\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-344dd52 elementor-widget elementor-widget-text-editor\" data-id=\"344dd52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>10. Layered 2D Transparent Photo<\/b><span style=\"font-weight: 400;\">: a photograph of the face is printed on two different paper substrates. One is photographic and very high quality. The other is a transparent vegetable substrate. The two prints are superimposed to give a certain sense of depth.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c653420 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c653420\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01f8c23\" data-id=\"01f8c23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-953e384 elementor-widget elementor-widget-image\" data-id=\"953e384\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-layered-2D-transparent-photo.gif\" class=\"attachment-large size-large wp-image-34448\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0382d94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0382d94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d9942a\" data-id=\"5d9942a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13353c7 elementor-widget elementor-widget-text-editor\" data-id=\"13353c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>11. Latex Mask Attack<\/b><span style=\"font-weight: 400;\">: for this case, a handmade latex mask is manufactured, made with organic materials, which can undergo rapid degradation. The manufacturer requires the presence of the person to be impersonated or a 3D reproduction of his face because the mask manufacturing process needs to use the person&#8217;s face to build the mask mold. After the mask is made, it is then artistically painted to make the features of the person you want to impersonate.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eb7a075 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eb7a075\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae16b81\" data-id=\"ae16b81\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbc9de1 elementor-widget elementor-widget-image\" data-id=\"cbc9de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-latex-mask-attack.gif\" class=\"attachment-large size-large wp-image-34446\" alt=\"pad latex mask attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b744e65 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b744e65\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cbf68d5\" data-id=\"cbf68d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9566537 elementor-widget elementor-widget-text-editor\" data-id=\"9566537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>12. Plastic Mask Attack<\/b><span style=\"font-weight: 400;\">: this is similar to the above but uses a thermoplastic or similar material. This type of mask is manufactured similarly to the latex ones but withstands the passage of time (the plastic material does not degrade in the same way).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6bf23b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6bf23b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f331dbc\" data-id=\"f331dbc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8202ff3 elementor-widget elementor-widget-image\" data-id=\"8202ff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-plastic-mask-attack.gif\" class=\"attachment-large size-large wp-image-34454\" alt=\"pad plastic mask attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08bde2f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08bde2f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42a5b9e\" data-id=\"42a5b9e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddd98f5 elementor-widget elementor-widget-text-editor\" data-id=\"ddd98f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>13. Silicone Mask Attack<\/b><span style=\"font-weight: 400;\">: as the two previous ones, but using a silicon substrate for the mask. Being made of silicone, they are more durable than latex masks preserving the same degree of flexibility.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-093bd30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"093bd30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5594780\" data-id=\"5594780\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fe4554 elementor-widget elementor-widget-image\" data-id=\"1fe4554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-silicone-mask-attack.gif\" class=\"attachment-large size-large wp-image-34464\" alt=\"pad silicone mask attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f440e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f440e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d11f54c\" data-id=\"d11f54c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d04c6a9 elementor-widget elementor-widget-text-editor\" data-id=\"d04c6a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>14. Mannequin Head Attack<\/b><span style=\"font-weight: 400;\">: uses a mannequin like those found in clothing stores. It is dressed with accessories and hair to make it look more realistic.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3afc7fb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3afc7fb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eecdc7b\" data-id=\"eecdc7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4634e92 elementor-widget elementor-widget-image\" data-id=\"4634e92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-pad-mannequin-head-attack.gif\" class=\"attachment-large size-large wp-image-34450\" alt=\"pad mannequin head attack\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3bd6952 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3bd6952\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c6f0f38\" data-id=\"c6f0f38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88b6fc5 elementor-widget elementor-widget-heading\" data-id=\"88b6fc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is PAD in biometrics?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e249aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e249aa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eced08a\" data-id=\"eced08a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b79aa2b elementor-widget elementor-widget-text-editor\" data-id=\"b79aa2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Veridas has developed proprietary Presentation Attack Detection (PAD) technology to successfully identify all of the types of attacks mentioned above and thus determine whether the evidence collected belongs to a genuine customer or an attacker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These technologies are materialized in a proof of life score, which allows for discarding a <a href=\"https:\/\/veridas.com\/what-is-digital-onboarding\/\">Digital Onboarding process<\/a> that do not exceed the minimum standards established by the client. Many companies have already implemented Veridas systems; <a href=\"https:\/\/veridas.com\/casos-exito\/\">success stories<\/a> that you can read in detail in our website. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd5d048 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd5d048\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b37c43\" data-id=\"3b37c43\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80aef9c elementor-widget elementor-widget-image\" data-id=\"80aef9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"338\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/veridas-boidas-pad.gif\" class=\"attachment-large size-large wp-image-34442\" alt=\"what is presentation attack detection\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of fraud detection (Video Replay Attack) in a Veridas Digital Onboarding process. The Liveness Detection score is below the required threshold, and therefore the process will be automatically rejected.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e9ea87f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9ea87f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae0e99e\" data-id=\"ae0e99e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-541fc97 elementor-widget elementor-widget-text-editor\" data-id=\"541fc97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Veridas is one of the few manufacturers in the world to <a href=\"https:\/\/veridas.com\/veridas-supera-la-evaluacion-de-ibeta-pad-level-2-de-la-iso-iec-en-su-tecnologia-de-prueba-de-vida\/\">have passed the ISO\/IEC iBeta PAD Level 2 evaluation of its liveness detection technology<\/a> and also has the <a href=\"https:\/\/veridas.com\/veridas-se-mantiene-a-la-cabeza-del-ranking-en-la-evaluacion-de-reconocimiento-facial-11-del-nist\/\">NIST 1:1<\/a> and <a href=\"https:\/\/veridas.com\/veridas-refuerza-su-liderazgo-tecnologico-mejorando-la-rapidez-y-precision-de-su-motor-de-biometria-facial-en-la-evaluacion-1n-del-nist-frvt\/\">NIST 1:N<\/a> evaluated facial biometrics engine. This reinforces our commitment to offering the best technology in both accuracy and security, constantly improving both facial recognition and proof-of-life algorithms.<\/span><\/p><p><span style=\"font-weight: 400;\">Focusing on proof-of-life detection, several types of attacks can be combined to increase detection complexity. To be effective in their identification and prevention, two proof-of-life detection methods are available: active proof-of-life and passive proof-of-life:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An <\/span><b>active<\/b><span style=\"font-weight: 400;\"> proof-of-life test is performed by asking the user to carry out a series of actions, such as executing random head movements. This type of life testing is mandatory for specific use cases of some regulations but involves a process with a usually higher abandonment rate.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In contrast, the user is not prompted to take any action in <\/span><b>passive<\/b><span style=\"font-weight: 400;\"> liveness testing. This makes the interaction with the user extremely simple, as there is no friction in the process, and therefore the process is faster and more efficient.\u00a0<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Veridas has both technologies available for both <a href=\"https:\/\/veridas.com\/onboarding-digital\/\">customer enrollment<\/a> and biometric authentication processes. Depending on the use case and the specific needs of our customers, our teams will provide recommendations that best fit the system based on the suitability and risks that the companies can assume on a case-by-case basis.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f2e981f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f2e981f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0f89d5\" data-id=\"e0f89d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f556c1c elementor-widget elementor-widget-heading\" data-id=\"f556c1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is ISO 30107?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d17130 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d17130\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5c7075\" data-id=\"b5c7075\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c918176 elementor-widget elementor-widget-text-editor\" data-id=\"c918176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>ISO 30107 is an international standard that specifies technical requirements and evaluation methodologies for testing the effectiveness of anti-spoofing and presentation attack detection (PAD) techniques in biometric systems. It provides guidelines for assessing the robustness of biometric systems against various types of presentation attacks, such as fake fingerprints, iris images, and facial presentations.\u00a0<\/p><p>Compliance with ISO 30107 helps ensure that biometric systems can accurately distinguish between genuine biometric traits and fake or altered ones, enhancing security and reliability in applications such as access control, identity verification, and border control.<\/p><p><a href=\"https:\/\/veridas.com\/veridas-passive-facial-liveness-detection-achieves-ibeta-levels-1-and-2\/\">Veridas has obtained iBeta Levels 1 and 2 certifications for its passive facial liveness test<\/a>, aligning with ISO\/IEC 30107-3 standards for Presentation Attack Detection (PAD).<\/p><p>This achievement matches the security level of its active liveness test. Notably, Veridas has attained the highest security level from iBeta using a passive solution applicable in browser environments, showcasing a notable industry advancement.<\/p><p>The passive facial liveness test enables seamless verification, as it assesses captured images in the background without necessitating user action or movement, streamlining the authentication process.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-519c737 elementor-widget elementor-widget-html\" data-id=\"519c737\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-601d590d-0511-4a37-afd8-7192267c79d6\"><span class=\"hs-cta-node hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\" id=\"hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-601d590d-0511-4a37-afd8-7192267c79d6\" style=\"border-width:0px;\" height=\"348\" width=\"1280\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '601d590d-0511-4a37-afd8-7192267c79d6', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Facial biometric systems are achieving a massive insertion and, with it, so are fraud attempts. Find out what types of attacks exist.<\/p>\n","protected":false},"author":20,"featured_media":33372,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[189,72],"tags":[],"country":[],"resource":[293],"topic":[250,251],"industry":[],"solution":[235,237],"class_list":["post-34484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-face-biometrics","category-identity-biometrics","resource-yes","format-article","topic-fraud-prevention","topic-identity","solution-face-authentication","solution-facial-access-control"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Presentation attack: what it is and how to prevent it | Veridas<\/title>\n<meta name=\"description\" content=\"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Presentation attack: what it is and how to prevent it | Veridas\" \/>\n<meta property=\"og:description\" content=\"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-13T08:21:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T10:58:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paco Zamora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paco Zamora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\"},\"author\":{\"name\":\"Paco Zamora\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0\"},\"headline\":\"Presentation attack: what it is and how to prevent it with biometrics\",\"datePublished\":\"2022-05-13T08:21:30+00:00\",\"dateModified\":\"2024-12-17T10:58:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\"},\"wordCount\":1951,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg\",\"articleSection\":[\"Face biometrics\",\"Identity &amp; Biometrics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\",\"url\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\",\"name\":\"Presentation attack: what it is and how to prevent it | Veridas\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg\",\"datePublished\":\"2022-05-13T08:21:30+00:00\",\"dateModified\":\"2024-12-17T10:58:24+00:00\",\"description\":\"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"presentation attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity &amp; Biometrics\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Face biometrics\",\"item\":\"https:\/\/veridas.com\/en\/category\/identity-biometrics\/face-biometrics\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Presentation attack: what it is and how to prevent it with biometrics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0\",\"name\":\"Paco Zamora\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg\",\"caption\":\"Paco Zamora\"},\"description\":\"Technology | Core Tech Manager\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/francisco-zamora-martinez-9a048436\/\"],\"url\":\"https:\/\/veridas.com\/en\/author\/paco-zamora\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Presentation attack: what it is and how to prevent it | Veridas","description":"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","og_locale":"en_US","og_type":"article","og_title":"Presentation attack: what it is and how to prevent it | Veridas","og_description":"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!","og_url":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","og_site_name":"Veridas","article_published_time":"2022-05-13T08:21:30+00:00","article_modified_time":"2024-12-17T10:58:24+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg","type":"image\/jpeg"}],"author":"Paco Zamora","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Paco Zamora","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/"},"author":{"name":"Paco Zamora","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0"},"headline":"Presentation attack: what it is and how to prevent it with biometrics","datePublished":"2022-05-13T08:21:30+00:00","dateModified":"2024-12-17T10:58:24+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/"},"wordCount":1951,"commentCount":0,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg","articleSection":["Face biometrics","Identity &amp; Biometrics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","url":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","name":"Presentation attack: what it is and how to prevent it | Veridas","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg","datePublished":"2022-05-13T08:21:30+00:00","dateModified":"2024-12-17T10:58:24+00:00","description":"A presentation attack involves deceiving a facial recognition system by using fake or manipulated facial images or videos. Discover more!","breadcrumb":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2022\/05\/verificacion-facial-veridas.jpg","width":1920,"height":1280,"caption":"presentation attack"},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identity &amp; Biometrics","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/"},{"@type":"ListItem","position":3,"name":"Face biometrics","item":"https:\/\/veridas.com\/en\/category\/identity-biometrics\/face-biometrics\/"},{"@type":"ListItem","position":4,"name":"Presentation attack: what it is and how to prevent it with biometrics"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10fdfcea52cd13a96d8be9bb065e32f0","name":"Paco Zamora","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2025\/01\/Paco-Zamora-150x150.jpg","caption":"Paco Zamora"},"description":"Technology | Core Tech Manager","sameAs":["https:\/\/www.linkedin.com\/in\/francisco-zamora-martinez-9a048436\/"],"url":"https:\/\/veridas.com\/en\/author\/paco-zamora\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/34484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=34484"}],"version-history":[{"count":10,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/34484\/revisions"}],"predecessor-version":[{"id":85835,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/34484\/revisions\/85835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/33372"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=34484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=34484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=34484"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=34484"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=34484"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=34484"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=34484"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=34484"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=34484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}