Remote Identity Proofing - Attacks & Countermeasures

Remote identity proofing is a crucial element in creating trust for digital services. The present study analyses the collection and validation of evidence provided by the applicant to complete the verification of his or her identity. More specifically, we focus on face presentation attacks that aim to fool the facial recognition systems. Through an analysis, which consisted of a review of the literature, a survey and interviews, major attacks are identified and classified: photo attack, video of user replay attack, 3D mask attack, deepfake attack; and applicable countermeasures presented.


Potential threats to remote identity proofing methods were identified and listed, as well as the
corresponding security controls, in the previous ENISA Report Remote ID Proofing: Analysis of
Methods to Carry Out Identity Proofing Remotely published in March 2021.

This site uses cookies to offer you a better browsing experience.
Aside from essential cookies we also use tracking cookies for analytics.
Find out more on how we use cookies.

Accept all cookies Accept only essential cookies