Yoti MyFace liveness white paper

profile picture Matt Prendergast 2 min read
Yoti MyFace Livness White Paper document preview

Learn how Yoti’s liveness solution can help you defeat spoof attacks

Liveness is an essential part of any verification or authentication process. It gives you reassurance that you are dealing with a real human. Read our latest white paper on liveness to learn how Yoti’s MyFace liveness solution can help defeat presentation attacks including:

  • Paper image
  • Mask 
  • Screen image
  • Video imagery
  • Deep fake video
  • Injection attacks
  • Bot attacks

 

Key takeaways from the report

  • Yoti’s MyFace solution is NIST Level 2 approved with 100% attack detection.
  • Why liveness is important for verification and authentication.
  • The difference between active and passive liveness.
  • Age, gender and skin tone bias minimised.

Related stories

An image of a woman looking directly at the camera. A guide over her face indicates that the image is a deepfake.

The rising challenge of detecting deepfakes

Artificial intelligence (AI) has come a long way in just a few years. What started as a tool for automating routine tasks and processing data more efficiently has now become integrated into nearly every industry. It seems as though it’s everywhere we look right now. One of the most controversial, and perhaps concerning, developments in AI is the rise of deepfakes. In simple terms, deepfakes are incredibly realistic synthetic media, such audio, video or images, generated by AI. These digital forgeries have become so convincing that telling real from fake is becoming a serious challenge. We look into how

8 min read
Graphic depicting the balance security and user experience with robust authentication methods such as MFA, biometrics and passwordless, versus a traditional username and password

Beyond passwords: exploring modern authentication methods for secure login

As online threats grow more sophisticated, the way we authenticate users needs to evolve. This blog explores the modern authentication methods which can support or replace passwords, such as biometrics and verified digital IDs, and how businesses can use them to protect accounts, reduce fraud and build trust with users.   What is authentication? Authentication is the process of verifying that someone is who they say they are, typically before granting them access to a service or system. Traditionally, this has involved entering a username and password, something only the user should know.   Are passwords enough to keep

6 min read
Woman at desk using multiple screens

Why testing data is as important as training data for machine learning models

When developing machine learning systems for facial age estimation, the conversation often centres on the training data: how much you have, how diverse it is, how inclusive it is, and how well it represents your end users.  Not to mention, where the data comes from.  Intuitively, that focus makes sense. More data presumably leads to better models. But test data is just as important, and in some ways, even more critical for ensuring models perform effectively. Training data: more isn’t always better Common sense would suggest that for a machine learning model “the more data, the better.” And that’s

4 min read