🧬 Biometrics & Face
The Core AI Technology Behind eKYC
This section is the technical heart of the eKYC knowledge base. It covers every aspect of face-based biometric verification — from detection and recognition to liveness, presentation attack detection, deepfakes, injection attacks, and the metrics that measure it all.
Articles in This Section
Face Detection & Preprocessing
Face Recognition
Face Liveness & Presentation Attack Detection
| # |
Article |
What You'll Learn |
| 9 |
Face Liveness Detection Overview |
What, why, how — complete introduction |
| 10 |
Presentation Attack Types |
Print, screen, mask, makeup — the attack taxonomy |
| 11 |
Active vs Passive Liveness |
Challenge-response vs single-frame detection |
| 12 |
Liveness Model Architectures |
CNN, ViT, multi-task, auxiliary supervision |
| 13 |
Liveness Datasets |
OULU-NPU, CASIA-FASD, SiW, CelebA-Spoof, and more |
| 14 |
Domain Generalization for Liveness |
SSDG, MADDG, cross-dataset generalization |
| 15 |
iBeta Certification |
ISO 30107-3 testing, Level 1 vs Level 2 |
Advanced Threats
Biometric Metrics & Standards
Advanced Topics
| # |
Article |
What You'll Learn |
| 24 |
Face Anti-Spoofing Feature Extraction |
Texture, frequency, depth, temporal features |
| 25 |
Multi-Spectral Liveness |
NIR, depth sensors, structured light |
| 26 |
Behavioral Biometrics |
Keystroke, gait, device interaction patterns |
| 27 |
Voice Biometrics |
Speaker verification, anti-spoofing |
| 28 |
Fingerprint in eKYC |
Aadhaar biometric, on-device fingerprint |
| 29 |
Iris Recognition |
IriCode, Aadhaar iris, mobile iris |
| 30 |
Face De-Duplication (1:N) |
Preventing multiple accounts with same face |
| 31 |
Template Protection |
Cancelable biometrics, homomorphic encryption |
| 32 |
On-Device Biometric Processing |
Mobile inference, ONNX, CoreML, TFLite |
How These Concepts Connect
graph TD
A[Camera Capture] --> B[Face Detection<br/>SCRFD, RetinaFace]
B --> C[Face Alignment<br/>Affine transform]
C --> D[Face Quality Check<br/>Blur, pose, exposure]
D -->|Quality OK| E[Parallel Processing]
D -->|Poor quality| F[Reject + retry]
E --> G[Face Liveness / PAD<br/>Is this a live face?]
E --> H[Face Recognition<br/>Generate embedding]
G -->|Spoof detected| I[Reject]
G -->|Live face| J[Continue]
H --> K[Face Matching<br/>Compare with ID photo]
K -->|Match > threshold| L[✅ Verified]
K -->|Match < threshold| M[❌ Mismatch]
style B fill:#4051B5,color:#fff
style G fill:#e53935,color:#fff
style H fill:#6A1B9A,color:#fff
style L fill:#2E7D32,color:#fff
For ML Engineers
Start with Face Liveness Detection Overview and Liveness Model Architectures if you're building PAD systems. If you're focused on recognition, start with Face Recognition Architectures and Face Matching & Thresholds.