Face Liveness Docs¶
Simple main guide + deep reference for eKYC teams¶
This documentation is designed to be easy for first-time readers and still useful for deeper technical work.
Instead of forcing everyone through a long encyclopedia-style path, the site has two layers:
- Main guide — simple, practical, and fast to understand
- Appendix / deep reference — detailed technical, testing, standards, security, and vendor material
Read by track, not just by page number¶
New to face liveness?¶
Read these first:
Building the flow?¶
Then read:
- 03. Deployment Guide
- 04. Best Practices
- 05. Real-World Examples
- 06. API and Response Examples
- 07. Decision Logic
Measuring and improving the system?¶
Then read:
- 08. Evaluation Playbook
- 09. Common Failures
- 10. Product Guide
- 11. Advanced Topics
- 12. Fusion and Meta-Model
- 13. Dataset Strategy
- 14. Score Calibration and Thresholding
- 15. Error Analysis
- 16. Monitoring and Operations
Hardening, release, and support¶
Then read:
- 17. Security Hardening
- 18. Device and Platform Matrix
- 19. Model Governance
- 20. FAQ
- 21. Troubleshooting
- 22. Case Studies
- 23. System Architecture
Need deep detail?¶
Go to:
- Appendix A1 — Key Terms
- Appendix A3 — Metrics and Evaluation
- Appendix A5 — Security and Privacy
- Appendix A8 — Attack Coverage Matrix
- Appendix A9 — Data Collection and Labeling
- Appendix A10 — Experiment Design
- the detailed topic chapters under Deep Reference by Topic in the left navigation
Quick role map¶
| If you are... | Best starting pages |
|---|---|
| product or business | 01. Face Liveness Guide, 10. Product Guide, 22. Case Studies |
| ML / evaluation | 08. Evaluation Playbook, 12. Fusion and Meta-Model, 13. Dataset Strategy |
| backend / platform | 03. Deployment Guide, 16. Monitoring and Operations, 23. System Architecture |
| security / fraud | 17. Security Hardening, 15. Error Analysis, Appendix A8 |
| compliance / procurement | Appendix A4, Appendix A6 |
Reading phases¶
flowchart TB
A[Start Here]
B[Practical Playbook]
C[Engineering and Operations]
D[Support and Architecture]
E[Appendix and Deep Reference]
A --> B --> C --> D
A --> E
B --> E
C --> E
D --> E
What this documentation covers¶
- what face liveness is
- why it matters in eKYC
- how passive, active, and hybrid methods differ
- common attack types from print and replay to injection and AI-generated content
- input quality, score interpretation, and thresholding
- deployment choices such as on-device, server-side, and hybrid
- testing, monitoring, governance, and model updates
- fusion, dataset strategy, calibration, and release discipline
- security, privacy, troubleshooting, and vendor evaluation
How to use this site¶
Fastest practical path
If you want a simple but complete understanding, read the Start Here pages and the first half of the Practical Playbook. That gives you the end-to-end picture without getting overloaded by standards and taxonomy detail.
When to use the appendix
Use the appendix when you need attack depth, metrics detail, standards mapping, data collection rules, or vendor and procurement checklists.
Deep-dive chapters are still preserved
The earlier topic-by-topic chapters are still available. They now serve as reference material rather than the first reading path.