Skip to content

Face Liveness Docs

Simple main guide + deep reference for eKYC teams

This documentation is designed to be easy for first-time readers and still useful for deeper technical work.

Instead of forcing everyone through a long encyclopedia-style path, the site has two layers:

  • Main guide — simple, practical, and fast to understand
  • Appendix / deep reference — detailed technical, testing, standards, security, and vendor material

Read by track, not just by page number

New to face liveness?

Read these first:

  1. 00. Overview
  2. 01. Face Liveness Guide
  3. 02. eKYC Integration

Building the flow?

Then read:

  1. 03. Deployment Guide
  2. 04. Best Practices
  3. 05. Real-World Examples
  4. 06. API and Response Examples
  5. 07. Decision Logic

Measuring and improving the system?

Then read:

  1. 08. Evaluation Playbook
  2. 09. Common Failures
  3. 10. Product Guide
  4. 11. Advanced Topics
  5. 12. Fusion and Meta-Model
  6. 13. Dataset Strategy
  7. 14. Score Calibration and Thresholding
  8. 15. Error Analysis
  9. 16. Monitoring and Operations

Hardening, release, and support

Then read:

  1. 17. Security Hardening
  2. 18. Device and Platform Matrix
  3. 19. Model Governance
  4. 20. FAQ
  5. 21. Troubleshooting
  6. 22. Case Studies
  7. 23. System Architecture

Need deep detail?

Go to:


Quick role map

If you are... Best starting pages
product or business 01. Face Liveness Guide, 10. Product Guide, 22. Case Studies
ML / evaluation 08. Evaluation Playbook, 12. Fusion and Meta-Model, 13. Dataset Strategy
backend / platform 03. Deployment Guide, 16. Monitoring and Operations, 23. System Architecture
security / fraud 17. Security Hardening, 15. Error Analysis, Appendix A8
compliance / procurement Appendix A4, Appendix A6

Reading phases

flowchart TB
    A[Start Here]
    B[Practical Playbook]
    C[Engineering and Operations]
    D[Support and Architecture]
    E[Appendix and Deep Reference]

    A --> B --> C --> D
    A --> E
    B --> E
    C --> E
    D --> E

What this documentation covers

  • what face liveness is
  • why it matters in eKYC
  • how passive, active, and hybrid methods differ
  • common attack types from print and replay to injection and AI-generated content
  • input quality, score interpretation, and thresholding
  • deployment choices such as on-device, server-side, and hybrid
  • testing, monitoring, governance, and model updates
  • fusion, dataset strategy, calibration, and release discipline
  • security, privacy, troubleshooting, and vendor evaluation

How to use this site

Fastest practical path

If you want a simple but complete understanding, read the Start Here pages and the first half of the Practical Playbook. That gives you the end-to-end picture without getting overloaded by standards and taxonomy detail.

When to use the appendix

Use the appendix when you need attack depth, metrics detail, standards mapping, data collection rules, or vendor and procurement checklists.

Deep-dive chapters are still preserved

The earlier topic-by-topic chapters are still available. They now serve as reference material rather than the first reading path.