Liveness Detection

  • Liveness detection is a fundamental capability that helps determine whether you’re interacting with a real person.

  • But not all liveness is made equal.

  • iProov combines software with science to build world-leading liveness technology that continually adapts to the evolving threat landscape.

How it Works

Capture Face

Individuals are guided through a simple face-capture process, free from complex instructions or cognitive challenges.

Liveness Analysis

Signals from the imagery and device are analyzed for signs of spoofs presented to the camera or injected into the system.

Liveness Results

Highly accurate results are returned to the organization in seconds.

|

iProov check orange sm | Right Person      iProov check orange sm | Real Person        iProov check orange sm | Right Now

Identity Assurance Tailored To Your Use Case


The Different Approaches to Liveness Detection: Ensuring Security, Performance, & Accessibility

Liveness Assessment Tool

The deepfake threat and consumer demand for effortless remote services have elevated the importance of robust liveness detection in identity verification and authentication workflows. However, the market is flooded with liveness vendors claiming deepfake protection and effortless usability, often without evidence. This makes selecting the right vendor a challenge.

Complete this assessment tool to gain valuable insights into your liveness vendor’s performance, covering critical areas such as attack detection, security updates, user experience, accessibility, customer and partner support, and governance.

Screenshot 2025 03 07 at 12.56.32 PM |
|

Biometric Adoption Navigator

Explore how biometric authentication can enhance security and convenience across the identity lifecycle.

iProov’s Science-Based Approach To Mitigating Threats

iProov combines software with science to build liveness technology that stops today’s threats and mitigates the risk of tomorrow.

Stop Today’s Attacks

A complex artificial intelligence system analyzes signals from the imagery and device to detect signs of spoofs. These algorithms block known attacks, such as those presented to the camera, like masks or photos, or attacks injected into the video stream, like deepfakes.

Mitigate Tomorrow’s Attacks

Novel and emerging threats are identified by real-time monitoring, threat intelligence, and cutting-edge research. Experts analyze methodologies, replicate attacks, and fortify defenses to drive a continuous feedback loop into the core AI system.

The face capture process is free from cognitive challenges and simply requires users to align their face in the on-screen oval.

The intuitive user experience delivers, in production, 98% completion rates and takes an average of 1.08 – 1.22 attempts to pass.

Flashmark™ sends a unique color sequence to the device screen to confirm the individual is genuinely present, and isn’t a deepfake.

Externally red-team tested to meet national security standards for the UK Home Office, Singapore Government, Australian Government, and the US Department of Homeland Security.

Certified to meet Web Content Accessibility Guidelines (WCAG) 2.2 AA and Section 508.

Algorithms are trained on diverse datasets and tested in production for high performance across age, gender, and skin tone.

Certified to iBeta Level 1 and 2 for Presentation Attack Detection. Tested for Digital Injection Attack Detection by Five Eyes governments.

An active threat management system drives continuous security updates with no disruption to organizations or users.

CERTIFICATIONS MATTER.

  • eIDAS Level of Assurance High
  • ISO/IEC 30107-3
  • SOC 2 Type II
  • UK Government Digital Identity and Attributes Trust Framework Certification
  • Certified G-Cloud Supplier
  • Federal Reserve SIF Mitigation Provider
  • iBeta
  • iRAP
  • UK National Physical Laboratory (NPL)

iProov Biometric Solution Suite

What problem do you want to solve?

|

REMOTE ONBOARDING

“I want to onboard new customers”

|

AUTHENTICATION

“I want to authenticate my existing customers”

REQUEST A QUOTE   

GET A LIVE DEMO 

Liveness Detection FAQs

What is liveness detection and why does it matter?

Liveness detection is a security technique that determines whether a biometric sample comes from a real, physically present person rather than a fake representation such as a photo, video, mask, or deepfake. Without it, biometric systems can be fooled by reproductions of a person's face. iProov's liveness detection is independently certified under ISO/IEC 30107-3 and tested by Five Eyes governments for both presentation and digital injection attacks.

How does iProov's Dynamic Liveness work?

Dynamic Liveness uses iProov's patented Flashmark technology — a controlled illumination sequence during face capture — to verify that a user is genuinely present at that exact moment, not a replay, deepfake, or injected recording. It confirms the person is the right person, a real person, and authenticating right now. This real-time genuine presence check is what separates Dynamic Liveness from standard liveness and makes it suited to high-risk scenarios like onboarding and account recovery. It's also passive; no active movements or cognitive function tests required.

What is the difference between Dynamic Liveness and Express Liveness?

Dynamic Liveness uses iProov's patented Flashmark illumination to verify real-time presence, defending against deepfakes and injection attacks. Express Liveness provides quicker multi-frame face capture to detect spoofing attempts for lower-risk, everyday authentication. Organizations can use both within a single lightweight SDK integration - flexible authentication deployed according to the risk of each action/transaction.

What is the difference between a presentation attack and an injection attack?

A presentation attack involves holding a fake artifact — a photo, video, or mask — up to a camera to fool the system. An injection attack bypasses the camera entirely, feeding synthetic media like a deepfake directly into the data stream. Injection attacks are harder to detect and require server-side analysis. iProov defends against both through multi-frame liveness detection, Flashmark challenge-response, and continuous threat intelligence via iSOC.

Can liveness detection be fooled by deepfakes?

Basic livenesst technologies without robust defenses can be vulnerable to presentation attacks and increasingly to deepfake injection attacks. iProov's Dynamic Liveness projects subtle light patterns onto the user’s face to confirm live presence and fend off sophisticated attacks, including deepfakes, injection attacks, and AI-generated spoofing - with cntinuous threat intelligence from iSOC to observe and mitigate evolving attacks methods. iProov tracks over 120 face swap tools and deploys ever-evolving countermeasures, always staying steps ahead of the threat landscape.

How does iProov compare to other liveness detection providers?

Many providers offer basic liveness checks, but iProov is extensively and independently certified - it is the most-validated liveness solution on the market. For example: ISO/IEC 30107-3 (Level 1 and 2), FIDO Face Verification, and NIST 800-63-4 — the first biometrics vendor to achieve this independently. It has been tested for digital injection attack detection by Five Eyes governments and passed red team penetration testing by the US Department of Homeland Security. iProov is deployed by governments and major financial institutions where resistance to sophisticated attacks is non-negotiable.

Does liveness detection add friction to the user experience?

Not with iProov. The face capture is a passive process taking a few seconds, with no instructions, gestures, or head movements required. iProov achieves completion rates above 98% and is WCAG 2.2 AA certified for accessibility. For Dynamic Liveness, users see a brief illumination sequence but do not need to perform any active challenges.

What is iProov's iSOC?

The iProov Security Operations Center (iSOC) continuously monitors biometric transactions globally, detects emerging attack vectors in real time, and automatically deploys algorithmic updates to all customers. This cloud-based active threat management means organizations are protected against new deepfake techniques and injection methods without managing updates themselves.

Liveness RESOURCE LIBRARY

Visit our resource library for articles, case studies, reports, press releases, and more.

More Resources

Trusted By

|
NHS logo
ING logo
UBS logo |
|
GovTech Logo

Schedule your free demo!