Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The following diagram summarizes key attack points for deepfakes in remote identity verification (IDV). It follows from earlier work on codifying possible presentation attack points in biometric systems as included in ISO/IEC 30107-1:2016 and other industry research, such as that done by Stephanie Shuckers Schuckers at CITeR.

...

Workflow Summary

...