signzy

API Marketplace

downArrow
Logo
Responsive
Decorative line

Spoofing (presentation attack)

Overview

Spoofing in biometrics refers to presenting fake inputs such as photos, videos, masks, or synthetic media to impersonate a legitimate user. Attackers attempt to bypass facial recognition, fingerprint scanners, or voice authentication during onboarding or login.
Regulators highlight spoofing as a major risk in remote KYC, urging adoption of liveness detection and PAD. Banks, fintechs, and ID verification providers use AI-driven tools to analyze texture, depth, and micro-movements to detect spoofing. Preventing spoofing is essential to ensure only genuine customers gain access to services, reducing fraud and AML risks.

FAQ

What is spoofing in biometrics?

Using fake or manipulated inputs to trick biometric systems.

Why is it a compliance issue?

It can bypass KYC checks, enabling fraud or money laundering.

How is it prevented?

Through liveness detection, PAD, and AI-based image analysis.

What are common spoofing methods?

Photos, masks, videos, and increasingly, deepfakes.