Identity Verification Blog

Meet the Newest Family Member: Ripon Bhowmik

iDenfy welcomes Ripon Bhowmik, a business development professional. Ripon serves as the Director of Business Development in the South Asia Region at iDenfy, in charge of building the company’s global sales organization and business expansion. A Business Development Professional Ripon has been working in business development for most of his career. He comes to us…

What is Deepfake Technology and How is it Used?

The emergence of deepfake technology has become a significant concern for individuals and businesses. In recent years, it has become the favorite tool of fraudsters for obtaining personal information for identity-related frauds. This post will explain what deepfake is, how it is used, and what you can do to prevent it. Fraudsters are becoming innovative…

Which ID is fake one?

Image Manipulation in Identity Verification

Image manipulation in identity verification has become a significant concern for businesses across the globe. In this post, we will find out what exactly is image manipulation, and how technologies like AI, CNN, and Special CV filters can help us detect this manipulation. Identity theft is a serious issue all over the world. Every year,…

blockchain and identity

Blockchain and Identity

Identity management is an ideal way to identify, authenticate, and authorize people to access specific systems or services. However, it has some security and privacy issues. Fortunately, blockchain technology can be a solution to those issues. This blog will guide you on what exactly Blockchain technology is, and how it can give power to identity…

Artificial Intelligence and identity theft

Artificial Intelligence & Identity Theft

Even if identity theft is a rising worry, it has a solution. This article will guide that artificial intelligence (AI) and machine learning is an ideal way to minimize identity theft risk. Identity theft has turned into big trouble all across the globe. Over the past few years, the world has witnessed several unexpected identity…

Face Spoofing

Liveness Detection to prevent Spoofing Attack

If you think biometric face recognition systems are not vulnerable to spoofing attacks, you’re mistaken. Over the past few years, biometric face spoofing attack have increased significantly all across the globe. Nowadays, hackers are trying everything possible (from 3D mask to printed photos) to bypass biometric face authentication systems. Even they’re using photos from Facebook…

What is biometric authentication?

What is Biometric Authentication?

Biometric authentication is indeed an advanced technology that takes into account the biometric data retrieved from a physical user to cross-match these details against a particular device or security area which the person is trying to access. Suppose you want to fully secure an area or a particular digital asset from unauthorized personnel, your best…

What is AMLD5

What is AMLD5?

What is AMLD5 (Anti Money Laundering Directive 5)? Why AMLD5 is important and necessary? Danske Bank case, Panama papers, and paradise leaks are some of those money laundering scandals that have taken the entire world by storm. Such revelations of fraud have compelled governments and regulatory authorities across the globe to take rigorous steps to…

What is Anti Money Laundering?

Over the past few years, money laundering has turned into a disaster for firms and institutions associated with the financial sector. As a result, governments have been actively looking for innovative ways to fight against money launderers. They are putting various policies in place to prevent money laundering called anti-money laundering policies. In this post,…

What is KYC?

What is KYC? For anyone who is not familiar with this acronym – Know your customer regulation. How well do you know your customers and are you sure that they are not linked with any criminal or fraudulent activity? KYC refers to a process verifying the identity of your customers, be it beforehand doing business…