Skip to main content

Liveness Detection

Stop Presentation Attacks

Enhance your identity verification with advanced biometric analysis that confirms users are physically present and compares their face against IDs and watchlists.

Stop Presentation Attacks

Real-Time Verification

Analyze live video streams to confirm users are physically present during the verification process, not using photos or pre-recorded videos.

Comprehensive Comparison

Compare captured facial images against ID photos and optionally against Global Watchlist databases for enhanced security.

Presentation Attack Detection

Detect and prevent sophisticated spoofing attempts including printed photos, screen displays, and masks with advanced computer vision.

Advanced Biometric Verification

Liveness Detection Overview

Autohost’s Liveness Detection is an advanced component of our ID Verification solution that provides an essential layer of security against presentation attacks and identity fraud.

Unlike basic selfie verification that can be fooled with printed photos or screen displays, Liveness Detection uses sophisticated computer vision technology to confirm that a real person is physically present during the verification process.

After confirming liveness, the system securely sends facial images to our API for comparison against the user’s ID photo and optionally against Global Watchlist databases, providing a comprehensive identity verification solution that protects your business from fraud and unauthorized access.

How Liveness Detection Works

Liveness Detection Process

Our Liveness Detection process combines advanced technology with a simple user experience:

  1. Video Stream Initialization: The system activates the user’s device camera and starts a secure video stream.

  2. On-Device Liveness Analysis: Using WebAssembly (WASM) technology, a lightweight AI model runs on the user’s device to track facial movements and verify physical presence.

  3. Movement Guidance: Users are prompted to perform simple head rotations from side to side, following on-screen instructions.

  4. Real-Time Analysis: As the user moves, the system analyzes facial movements, depth changes, and three-dimensional characteristics that can only be produced by a live person.

  5. Secure Image Transmission: Once liveness is confirmed, facial images are securely sent to Autohost’s API for further verification.

  6. ID Comparison: The API compares the captured facial images against the photo on the user’s ID document to confirm identity.

  7. Optional Watchlist Check: If enabled, the system also compares facial images against Global Watchlist databases for additional security.

Comprehensive Identity Verification

Comprehensive Verification

Liveness Detection provides multi-layered identity verification:

  • Presentation Attack Prevention: Confirms the user is physically present and not using photos, videos, or masks to spoof the system.

  • Biometric Identity Matching: Compares facial features with ID document photos to verify the user is the legitimate ID holder.

  • Global Watchlist Screening: Optionally checks facial images against international watchlists to identify potential high-risk individuals.

  • Comprehensive Risk Assessment: Integrates verification results with Autohost’s Screening AI for holistic risk evaluation.

This multi-faceted approach ensures that users are who they claim to be, are physically present during verification, and do not pose known security risks—all within a seamless verification flow.

Advanced Fraud Prevention

Fraud Prevention Capabilities

Liveness Detection protects against sophisticated presentation attacks:

  • Photo Spoofing: Detects when someone attempts to use a printed or digital photo instead of their actual face.

  • Screen Replay Attacks: Identifies when pre-recorded videos are displayed on screens to try to fool the verification system.

  • Deepfake Prevention: Analyzes micro-movements and natural facial patterns that are difficult for even sophisticated deepfakes to replicate.

  • Identity Theft Protection: By comparing faces against ID photos, the system prevents individuals from using stolen or borrowed identification documents.

  • High-Risk Individual Screening: The optional watchlist comparison helps identify individuals who may pose security risks.

Secure Data Handling

Secure Data Handling

Autohost’s Liveness Detection is built with security and privacy as core principles:

  • Hybrid Processing Approach: Liveness detection happens on-device for privacy, while secure facial comparison occurs via our encrypted API for enhanced security.

  • Encrypted Transmission: All facial images sent to our API are transmitted using industry-standard encryption protocols.

  • Secure Storage: Any stored facial data is protected with enterprise-grade security measures and strict access controls.

  • Transparent Process: Users are clearly informed about what data is collected, how it’s used, and who it’s shared with.

  • Compliance-Ready: Our systems are designed to comply with privacy regulations including GDPR, CCPA, and biometric information laws.

  • Data Minimization: We collect only the data necessary for verification purposes and maintain appropriate retention policies.

Easily integrate your tech stack with Autohost

Use Autohost to integrate the services you need via Web SDK, RESTful API, or our Hosted Verification Page. Alternatively, you can onboard users via a QR code or a link to the verification form without integrating Autohost at all. Don't worry about interruptions with 99.996% uptime.

Easily integrate your tech stack with Autohost

Frequently Asked Questions

1 How does Liveness Detection work?

Liveness Detection uses your device's camera to start a video stream that is analyzed in real-time by a lightweight AI model running on your device. The system asks you to perform simple head movements (rotating from side to side) while it tracks facial landmarks and movement patterns. Once verified as a live person, facial images are securely sent to our API for comparison against ID photos and optionally against Global Watchlist databases.

2 What happens to the facial images captured during verification?

The video stream is processed locally on your device to verify liveness. Once liveness is confirmed, selected facial images are securely transmitted to our API for comparison against ID photos and optionally against watchlist databases. All data transmission is encrypted, and our systems comply with relevant privacy regulations.

3 How does the system compare my face to my ID?

After confirming you're physically present through the liveness check, the system securely sends facial images to our API, which uses advanced biometric algorithms to compare your face against the photo on your ID document. This comparison analyzes facial features to verify that the person completing the verification is the same person shown on the ID.

4 What is the Global Watchlist comparison?

The optional Global Watchlist comparison feature checks your facial images against databases of known individuals on various international watchlists. This additional security layer helps property managers identify potential high-risk individuals and comply with regulatory requirements.

5 What devices and browsers support Liveness Detection?

Liveness Detection works on most modern smartphones, tablets, and computers with a front-facing camera. It supports major browsers including Chrome, Safari, Firefox, and Edge on both mobile and desktop devices. The lightweight nature of our AI model ensures compatibility with a wide range of devices.

  • 99.8%

    spoofing detection rate

  • 3-5 sec

    average verification time

  • 98%

    first-attempt success rate

Guest using Autohost on mobile device

Ready to Strengthen Your Identity Verification?

Get started

Autohost Assistant

Online

Hello! How can I help you with Autohost today?

I can answer questions about our guest screening, ID verification, and fraud detection services.

03:20 PM