Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The following diagram summarizes key attack points for deepfakes in remote identity verification (IDV). It follows from earlier work on codifying possible presentation attack points in biometric systems as included in ISO/IEC 30107-1:2016 and other industry research, such as that done by Stephanie Schuckers at CITeR.

...

Copy of Deepfake Attacks Diagram v2.pngImage Added

Workflow Summary

...