{"id":63778,"date":"2023-10-30T17:09:37","date_gmt":"2023-10-30T17:09:37","guid":{"rendered":"https:\/\/veridas.com\/?p=63778"},"modified":"2025-01-08T10:14:58","modified_gmt":"2025-01-08T10:14:58","slug":"presentation-attack-detection-nist","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/","title":{"rendered":"Unlocking the Essence of NIST&#8217;s Presentation Attack Detection (PAD) Evaluation: Veridas in the Spotlight"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"63778\" class=\"elementor elementor-63778\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7fc0d8 e-flex e-con-boxed e-con e-parent\" data-id=\"e7fc0d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec9919f elementor-widget elementor-widget-text-editor\" data-id=\"ec9919f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As online transactions become more common, so does the risk of identity fraud. According to the <a href=\"https:\/\/www.transunion.com\/report\/omnichannel-fraud-report\" target=\"_blank\" rel=\"noopener\">TransUnion 2023 State of Omnichannel Fraud Report<\/a>, <strong>identity theft fraud has increased by 81% between 2019 and 2022<\/strong>, with synthetic identity fraud witnessing an alarming 132% surge.<\/p><p>To address these challenges, the <a href=\"https:\/\/veridas.com\/what-is-nist\/\" target=\"_blank\" rel=\"noopener\">National Institute of Standards and Technology (NIST)<\/a> has taken a proactive approach through its pioneering evaluation of <a href=\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" target=\"_blank\" rel=\"noopener\">Presentation Attack Detection<\/a> (PAD). In this blog post, we will dive deep into what the NIST PAD assessment entails, spotlighting <strong><a href=\"https:\/\/veridas.com\/nist-ranks-veridas-world-top-facial-biometric-engines\/\" target=\"_blank\" rel=\"noopener\">Veridas&#8217; exceptional performance<\/a> in this critical domain<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb683e0 e-flex e-con-boxed e-con e-parent\" data-id=\"eb683e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db0e1a2 elementor-widget elementor-widget-heading\" data-id=\"db0e1a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding Presentation Attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bbe12d elementor-widget elementor-widget-text-editor\" data-id=\"5bbe12d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>According to the NIST, a <a href=\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" target=\"_blank\" rel=\"noopener\">presentation attack<\/a> is a deliberate act of tampering with the functioning of a biometric system by presenting <strong>forged or altered <a href=\"https:\/\/veridas.com\/what-is-biometric-data\/\">biometric data<\/a>.<\/strong> Simply put, it involves manipulating the system by submitting fake or corrupted biometric information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e24e50a elementor-widget elementor-widget-image\" data-id=\"e24e50a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"329\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34-1024x421.png\" class=\"attachment-large size-large wp-image-63979\" alt=\"Presentation Attack Detection\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34-1024x421.png 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34-300x123.png 300w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34-768x316.png 768w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34-1536x632.png 1536w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Captura-de-pantalla-2023-10-31-a-las-8.54.34.png 1915w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a6b5d elementor-widget elementor-widget-text-editor\" data-id=\"e8a6b5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Imagine a scenario where a fraudulent actor attempts to deceive a facial recognition system <strong>using a photograph or video of someone else&#8217;s face<\/strong>, trying to gain unauthorized access to secure areas or sensitive information.<\/p>\n<p>Such deceptive practices, referred to as presentation attacks, pose a significant threat to the integrity of biometric systems, <b>demanding robust <\/b><a href=\"https:\/\/veridas.com\/liveness-detection\/\" style=\"\">liveness detection software<\/a><b> to distinguish between genuine and fraudulent attempts.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da657ba e-flex e-con-boxed e-con e-parent\" data-id=\"da657ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f7d6cd elementor-widget elementor-widget-heading\" data-id=\"8f7d6cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Evaluation Process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a818e7f elementor-widget elementor-widget-text-editor\" data-id=\"a818e7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>NIST&#8217;s meticulous evaluation emphasized impartiality, ensuring all participants entered on equal terms <strong>without prior knowledge of the assessment criteria or attack types.<\/strong> This approach minimized potential biases, contributing to a fair and comprehensive provider comparison.<\/p><p>The evaluation process included a thorough assessment of 82 software algorithms from 45 distinct providers, making it one of the most comprehensive evaluations to date.<\/p><p>NIST strategically divided the evaluation scenarios into two primary use cases:<\/p><ul><li><strong>Impersonation<\/strong>, where attackers attempt to assume false identities.<\/li><li><strong>Evasion<\/strong>, where the goal is to conceal true identities to avoid detection.<\/li><\/ul><p>In the context of Identity Verification, impersonation is more pertinent, while evasion is better suited for surveillance and identification contexts.<\/p><p><a href=\"https:\/\/pages.nist.gov\/frvt\/html\/frvt_pad.html\" target=\"_blank\" rel=\"noopener\">The evaluation process<\/a> was designed around <strong>two key points specified by the ISO\/IEC 30107-3[2] standard<\/strong>: one focusing on user convenience and the other on system security.<\/p><ol><li><strong>The convenience point<\/strong> (APCER @ BPCER = 0.01) aims to uncover undetected presentation attacks while minimizing false alarms.<\/li><li><strong>The security point<\/strong> (BPCER @ APCER = 0.01) aims to reveal how often genuine users were wrongly flagged as attackers while keeping security levels to the maximum.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f671530 elementor-widget elementor-widget-image\" data-id=\"f671530\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"334\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-1024x427.jpg\" class=\"attachment-large size-large wp-image-63957\" alt=\"APCER vs BPCER\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-1024x427.jpg 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-300x125.jpg 300w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-768x320.jpg 768w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-1536x640.jpg 1536w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/3-scaled.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fad42a elementor-widget elementor-widget-text-editor\" data-id=\"8fad42a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>These metrics, dictated by the ISO standard, allowed for a balance in error rates, ensuring a fine-tuned approach to decision-making in biometric systems.<\/p><p><br \/>It is imperative to highlight that <strong>NIST only evaluates the algorithm for Presentation Attack Detection rather than the entire system.<\/strong> Therefore, results do not fully reflect a company&#8217;s capability to prevent fraud attempts, as various other factors contribute to the overall system&#8217;s effectiveness. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e7322b elementor-widget elementor-widget-heading\" data-id=\"7e7322b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Veridas' Performance and Success<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9433728 elementor-widget elementor-widget-text-editor\" data-id=\"9433728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Veridas has established itself as a <strong>front-runner in the field of Presentation Attack Detection<\/strong>, <a href=\"https:\/\/veridas.com\/veridas-passes-the-ibeta-pad-level-2-evaluation-of-iso-iec-for-its-liveness-detection-technology\/\" target=\"_blank\" rel=\"noopener\">demonstrated by its iBeta Level 2 certification<\/a>, adhering to the ISO 30107-3 standards since April 2022.<\/p><p>The company has actively participated in critical evaluations such as NIST FRTE 1:1 and 1:N and NIST FATE PAD, positioning itself as a leader in <a href=\"https:\/\/veridas.com\/nist-ranks-veridas-world-top-facial-biometric-engines\/\" target=\"_blank\" rel=\"noopener\">delivering exceptional results across all assessments<\/a>.<\/p><p>Notably, its ongoing advancements are evident in the remarkable progress of its Presentation Attack Detection engine, now <strong>four times more precise than the version presented to NIST in February<\/strong>.<\/p><p>Veridas&#8217; dedication to comprehensive security solutions is highlighted by its robust liveness detection capabilities, leveraging active and passive liveness detection technology.<\/p><p>This solution has enabled Veridas to <strong>detect over 99% of technology impersonation attacks<\/strong> according to real-production data, showcasing the company&#8217;s relentless commitment to safeguarding biometric systems in real-world environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0729cde e-flex e-con-boxed e-con e-parent\" data-id=\"0729cde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12e1688 elementor-widget elementor-widget-html\" data-id=\"12e1688\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-601d590d-0511-4a37-afd8-7192267c79d6\"><span class=\"hs-cta-node hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\" id=\"hs-cta-601d590d-0511-4a37-afd8-7192267c79d6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-601d590d-0511-4a37-afd8-7192267c79d6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/601d590d-0511-4a37-afd8-7192267c79d6.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '601d590d-0511-4a37-afd8-7192267c79d6', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As online transactions become more common, so does the risk of identity fraud. According to the TransUnion 2023 State of Omnichannel Fraud Report, identity theft fraud has increased by 81% between 2019 and 2022, with synthetic identity fraud witnessing an alarming 132% surge. To address these challenges, the National Institute of Standards and Technology (NIST) [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":63779,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[179],"tags":[],"country":[],"resource":[293],"topic":[250,248],"industry":[],"solution":[235],"class_list":["post-63778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veridas-en","resource-yes","format-article","topic-fraud-prevention","topic-milestones","solution-face-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas<\/title>\n<meta name=\"description\" content=\"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas\" \/>\n<meta property=\"og:description\" content=\"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-30T17:09:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T10:14:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Morr\u00e1s\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Morr\u00e1s\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/\"},\"author\":{\"name\":\"Marta Morr\u00e1s\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e\"},\"headline\":\"Unlocking the Essence of NIST&#8217;s Presentation Attack Detection (PAD) Evaluation: Veridas in the Spotlight\",\"datePublished\":\"2023-10-30T17:09:37+00:00\",\"dateModified\":\"2025-01-08T10:14:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/\"},\"wordCount\":599,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png\",\"articleSection\":[\"Veridas\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/\",\"url\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\",\"name\":\"Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png\",\"datePublished\":\"2023-10-30T17:09:37+00:00\",\"dateModified\":\"2025-01-08T10:14:58+00:00\",\"description\":\"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Veridas\",\"item\":\"https:\/\/veridas.com\/en\/category\/veridas-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unlocking the Essence of NIST&#8217;s Presentation Attack Detection (PAD) Evaluation: Veridas in the Spotlight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e\",\"name\":\"Marta Morr\u00e1s\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg\",\"caption\":\"Marta Morr\u00e1s\"},\"description\":\"Identity Verification Expert\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/marta-morras-ruiz\/\"],\"url\":\"https:\/\/veridas.com\/en\/author\/marta-morras\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas","description":"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","og_locale":"en_US","og_type":"article","og_title":"Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas","og_description":"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?","og_url":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","og_site_name":"Veridas","article_published_time":"2023-10-30T17:09:37+00:00","article_modified_time":"2025-01-08T10:14:58+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog-1024x576.png","type":"image\/png"}],"author":"Marta Morr\u00e1s","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Marta Morr\u00e1s","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/"},"author":{"name":"Marta Morr\u00e1s","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e"},"headline":"Unlocking the Essence of NIST&#8217;s Presentation Attack Detection (PAD) Evaluation: Veridas in the Spotlight","datePublished":"2023-10-30T17:09:37+00:00","dateModified":"2025-01-08T10:14:58+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/"},"wordCount":599,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png","articleSection":["Veridas"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/presentation-attack-detection-nist\/","url":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/","name":"Unlocking NIST\u2019s Presentation Attack Detection (PAD) | Veridas","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png","datePublished":"2023-10-30T17:09:37+00:00","dateModified":"2025-01-08T10:14:58+00:00","description":"Discover how the NIST Presentation Attack Detection (PAD) evaluation addresses the rise of identity fraud. Who leads this fight?","breadcrumb":{"@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/10\/Fotos-Blog.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/beyond-the-deepfake-14-types-of-presentation-attacks-pa-that-a-facial-biometrics-solution-should-be-able-to-prevent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Veridas","item":"https:\/\/veridas.com\/en\/category\/veridas-en\/"},{"@type":"ListItem","position":3,"name":"Unlocking the Essence of NIST&#8217;s Presentation Attack Detection (PAD) Evaluation: Veridas in the Spotlight"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e","name":"Marta Morr\u00e1s","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg","caption":"Marta Morr\u00e1s"},"description":"Identity Verification Expert","sameAs":["https:\/\/www.linkedin.com\/in\/marta-morras-ruiz\/"],"url":"https:\/\/veridas.com\/en\/author\/marta-morras\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/63778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=63778"}],"version-history":[{"count":10,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/63778\/revisions"}],"predecessor-version":[{"id":85838,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/63778\/revisions\/85838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/63779"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=63778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=63778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=63778"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=63778"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=63778"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=63778"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=63778"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=63778"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=63778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}