Knomi® – Liveness Detection2020-08-04T19:07:20-04:00



Face and voice liveness detection for biometrics-enabled mobile onboarding and authentication

Biometrics make mobile onboarding and authentication more convenient and secure, but liveness detection is essential for biometric applications where security is paramount and fraud is a risk. Liveness detection assures the integrity of a variety of biometric security checks, including mobile authentication, document verification, and watch list search. Knomi provides the best-performing device-independent liveness solution available that is truly passive, with an opaque user experience that does not instruct a fraudster how it might be defeated.


The Knomi mobile biometric authentication framework offers high-performance, field-proven face and voice liveness detection, with a family of machine learning-based algorithms that detect and prevent virtually all types of biometric presentation attacks. Knomi detects attacks attempting victim impersonation as well as those attempting identity concealment, which is especially important for onboarding. Knomi’s face liveness algorithms detect obstructions and distortions, and work in low-light and bright-light conditions on all types of faces. .

Liveness Spoof

high-quality 2D paper mask

Liveness Spoof

medium-quality 3D mask

Voice authentication and liveness can be optionally be added and fused with face to make spoofing exponentially more difficult for fraudsters. Knomi detects a variety of voice spoof types, including recorded, filtered, and synthetic voice spoofs.

Knomi SDKs and APIs can be incorporated into either a mobile-, browser-, or kiosk-based application. It can be implemented with a server-, or device-based architecture (with, Knomi S, or Knomi D, respectively). Server-based Knomi Web enables face capture and liveness detection from a browser on a mobile device or desktop.

Liveness detection - White Paper

Download White Paper

Liveness Detection Case Study

Read Case Study


  • Liveness detection algorithms and workflows optimized for onboarding, mobile authentication, document verification, and kiosk-based solutions
  • Purely passive, machine learning-based approach, with no user friction
  • Opaque user experience that avoids training fraudsters how to defeat it
  • Device- or server-based implementation alternatives
  • Configurable workflows and performance thresholds
  • Easy integration using on-device SDKs, server-based APIs, and reference UI code
  • Browser-based capture mode works on mobiles and desktops
  • A la carte purchase options, with liveness, matching, face, and voice offered independently
  • Server-based option that works across devices without multiple enrollments
  • iOS and Android mobile versions; Windows and Linux server versions
  • Comprehensive technical support

Liveness detection use cases

Digital onboarding   |   Passwordless authentication   |   Identity verification

Implementation options

Mobile app integration   |   Mobile browser  |   Desktop browser  |   Kiosk application

Attack types detected

Victim impersonation

Fraudster attempts to defeat a security mechanism by impersonating a victim with a biometrically matching spoof

Identity concealment

Fraudster attempts to conceal their identity to avoid detection in biometric searches and eliminate evidence of their activity

Attack detection features


Detection of
– Digital photos and videos

– Paper photos and masks
– High-quality 3D masks
– Partial obstructions and distortions

Low-light and bright-light conditions

Wide range of face types

Optional fusion with voice


Detection of
– Recorded voice

– Modulated voice
– Filtered voice
– Synthetic voice

Optional fusion with face

Arrange a Demo

Load More Posts

Three case studies demonstrate how agencies around the world use Aware’s BioSP™ to process and share biometric data

Biometrics in Government | Case Studies Three case studies demonstrate how agencies around the world use Aware’s BioSP™ to process and share biometric data Biometric search workflows require many processes across multiple systems, [...]


Addressing Vendor Lock-In in ABIS Systems | White Paper

Biometrics in Government | White Paper Addressing Vendor Lock-In in ABIS Systems “Vendor lock-in” is a term that describes when a technology vendor imposes switching costs upon their customer—intentionally or otherwise—to make it [...]

Load More Posts