Remote Identity Proofing - Attacks & Countermeasures

Remote identity proofing is a crucial element in creating trust for digital services. The present study analyses the collection and validation of evidence provided by the applicant to complete the verification of his or her identity. More specifically, we focus on face presentation attacks that aim to fool the facial recognition systems. Through an analysis, which consisted of a review of the literature, a survey and interviews, major attacks are identified and classified: photo attack, video of user replay attack, 3D mask attack, deepfake attack; and applicable countermeasures presented.

Published
Language

Potential threats to remote identity proofing methods were identified and listed, as well as the
corresponding security controls, in the previous ENISA Report Remote ID Proofing: Analysis of
Methods to Carry Out Identity Proofing Remotely published in March 2021.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information