{"id":5141,"date":"2021-05-18T16:22:42","date_gmt":"2021-05-18T16:22:42","guid":{"rendered":"https:\/\/signdesk.com\/in\/?p=5141"},"modified":"2025-09-17T07:12:53","modified_gmt":"2025-09-17T12:42:53","slug":"how-digital-document-verification-prevents-kyc-id-fraud","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud","title":{"rendered":"How Document Verification Prevents ID Fraud"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5148 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification.jpg\" alt=\"Document-Verification\" width=\"1000\" height=\"454\" \/><\/h2>\n<h2><span style=\"color: #008000;\"><strong>Document Verification &#8211; Background<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Digitization is taking off in a big way. The <a style=\"color: #333300;\" href=\"https:\/\/www.businessinsider.com\/mobile-banking-market-trends?IR=T\"><strong>number of smartphone users<\/strong><\/a> has increased to around 2.9 billion in 2020 and more customers are demanding digital channels for services.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Nearly <a style=\"color: #333300;\" href=\"https:\/\/www.forbes.com\/sites\/theyec\/2016\/03\/09\/mobile-marketing-101-for-service-businesses\/?sh=57af486d57c8\"><strong>40% of customers<\/strong><\/a> are more likely to obtain services from businesses that offer some sort of remote channel and businesses are now adapting to these new demands.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">The new digital paradigm demands a revamp in how businesses implement KYC (Know Your Customer) protocols. This is especially true for financial institutions (FIs), which are usually heavily regulated to ensure that due diligence measures are followed.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">With these factors in mind, regulators &amp; FIs have had to redefine what it means to verify a customer\u2019s identity.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">According to the protocols of <a style=\"color: #333300;\" href=\"https:\/\/www.eba.europa.eu\/sites\/default\/documents\/files\/documents\/10180\/2622242\/4bf4e536-69a5-44a5-a685-de42e292ef78\/EBA%20Opinion%20on%20SCA%20elements%20under%20PSD2%20.pdf\"><b>SCA<\/b><\/a>\u00a0(Strong Customer Authentication), a set of regulatory requirements under the EU Revised Directive on Payment Services (PSD2), comprehensive customer identity verification involves the authentication of the following elements &#8211;<\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0<strong>What only the customer can know<\/strong><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">This involves verifying customer identity using something that only the customer knows, such as a password, pin, OTP, etc.<\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0\u00a0<strong>What only the customer possesses<\/strong><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">This involves verifying something that only the customer possesses, such as an identifying document like a PAN card, Aadhaar, Passport, etc.<\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0\u00a0<strong>What only the customer is\u00a0<\/strong><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">This involves verifying a characteristic that is physically inherent to the customer. Examples include biometric verification, keyboard type patterns, iris recognition, facial matching, etc.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Document verification, therefore, is an integral tool in verifying a customer\u2019s identity, whether it be during <a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><b>KYC verification<\/b><\/a>\u00a0for opening an account, investor verification before onboarding or vendor onboarding in retail.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Document verification, when conducted digitally, is referred to as digital document verification, as opposed to regular verification, which involves the manual cross-checking of details on paper documents.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Now that we\u2019ve covered where the idea of <strong>document verification<\/strong> comes from &amp; what it is, let\u2019s take a brief look at what it involves.<\/p>\n<div align=\"center\"><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/talk-to-sales\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal\" style=\"border-radius: 30px !important; background-color: #00b087; border: #00b087;\" type=\"button\"><strong>Get In Touch<\/strong><\/button><\/a><\/span><\/div>\n<h2><span style=\"color: #008000;\"><strong>The Basics of ID Verification<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In order to verify an ID, the ID must first be issued to the customer. Once an ID has been issued, it can then be verified by the issuer (or account grantor) either independently or with assistance from third-party service providers.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Let\u2019s take a look at the first stage involved in <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/digital-identity-verification-in-education-industry\"><b>ID verification<\/b><\/a>.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In this stage, an entity (usually an arm of the government), registers a user after that user has submitted an identity claim, either creates a record using the identifying information supplied by the user or verifies this information against pre-existing databases, and then issues an ID.<\/p>\n<h4><span style=\"color: #333300;\"><strong>Document Verification &#8211; Stage 1<\/strong><\/span><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5150 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-verification-Stage-1.jpg\" alt=\"Document-Verification-Stage1\" width=\"1000\" height=\"454\" \/><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">The second stage is where the actual \u201cverification\u201d part comes in.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In this stage, the account grantor is no longer a bureaucratic entity, but a regulated one. These include banks, NBFCs, insurers, securities firms &amp; so forth. Here, the user submits pre-existing &amp; trusted credentials to the account grantor. These credentials are then confirmed after the requisite risk assessments &amp; fraud checks are completed, and the user is granted access to services.<\/p>\n<h4><span style=\"color: #333300;\"><strong>Document Verification &#8211; Stage 2<\/strong><\/span><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5152 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-Stage-2.jpg\" alt=\"Document-Verification-Stage-2\" width=\"1000\" height=\"454\" \/><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Once these two stages have been successfully completed, the customer\u2019s documents are verified.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These steps appear to be simple enough, but lacunae and weaknesses in the procedures involved in document verification leave it vulnerable for exploitation by bad actors &amp; malevolent entities. This is equally true for <a href=\"https:\/\/melento.ai\/en-in\/blog\/why-document-verification-is-the-future-of-kyc\"><b><span style=\"color: #333300;\">digital document verification<\/span><\/b><\/a>, where criminals employ various techniques to conduct identity fraud.<\/p>\n<h2><span style=\"color: #008000;\"><strong><a style=\"color: #008000;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc-solves-id-theft-online-bank-fraud\">Identity Fraud<\/a>: A Ubiquitous Threat<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Identity fraud is when a party intent on misuse obtains access to certain crucial information about a person, and proceeds to use that information to falsely verify themselves &amp; consequently obtain financial gain.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">The keyword to notice here is the word \u201cverify\u201d.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Fraudsters indulging in identity fraud game the system to pass off someone else\u2019s identity as their own, and once they\u2019ve been cleared by the system these same fraudsters either take loans, apply for credit or open false accounts in the name of the person whose identifying credentials they\u2019ve obtained.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">But how do these criminals obtain this identifying information which, as we\u2019ve seen, should ideally be something that only one person (the person this information belongs to!) has access to?<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Two words &#8211; Data breaches.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Over the past year, we\u2019ve seen <a style=\"color: #333300;\" href=\"https:\/\/www.identityforce.com\/blog\/2020-data-breaches\"><b>numerous high-profile data breaches<\/b><\/a> come to light. Several large businesses with massive customer records, including T Mobile, Pfizer, Warner Music Group, Barnes and Noble, Twitter, Cognizant, Zoom &amp; Go Daddy, have experienced data breaches in 2020.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">2020 has also seen a <a style=\"color: #333300;\" href=\"https:\/\/www.techrepublic.com\/article\/2020-sees-huge-increase-in-records-exposed-in-data-breaches\/\"><b>141% increase<\/b><\/a>in the volume records exposed online, a number which stands at nearly 37 billion.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">With digitization taking off due to the conditions of COVID-19, more people are online for longer, and more information is available online; dovetail this with the fact that digital literacy is low for the majority of people in the world, and you\u2019ve got a recipe for dire consequences.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These consequences are already a reality for a lot of financial institutions.<a style=\"color: #333300;\" href=\"https:\/\/www.comparitech.com\/identity-theft-protection\/identity-theft-statistics\/\"><b>Fraud losses are up<\/b><\/a> by 13% in 2020, and USD 16.9 billion has been lost to fraud in the previous year.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In South Asia, online fraud is up by 65%, and 28% of all fraud cases involve identity fraud, according to <b>reports<\/b>.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Financial institutions, therefore, must preemptively take steps to protect every stage of the information collection process from hackers, and this includes document verification, which is where the majority of information is collected.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In order to better combat ID fraud, it\u2019s imperative to learn more about it. First, let\u2019s take a look at what the different types of fake IDs in circulation are.<\/p>\n<h2><span style=\"color: #008000;\"><strong>What are the various types of fraudulent IDs?<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Fake IDs, incidentally, come in all sorts of shapes and sizes. However, they can be classified into the following categories.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b><u>Forged IDs<\/u><\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These are IDs on which some information has been illegally changed, in order to modify the identity of the ID holder. This could involve &#8211;\u00a0<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Changing the variable information\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Inserting real pages from another ID\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Removing pages or specific information\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0Applying false stamps or watermarks\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0Digitally altering or adding information on an image of an original ID\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b><u>Counterfeit IDs<\/u><\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">This is the total reproduction of an entire ID, in which the fraudster will obtain a template of the ID and insert their own information.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b><u>Stolen blank IDs<\/u><\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are non-personalized blank IDs stolen from the supply chain. Fraudsters then insert their own information into the ID.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b><u>Illegally obtained genuine IDs<\/u><\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are IDs obtained after supplying authorities with false information. This information could involve photos of someone else, fake personal details or fake verifying documents.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b><u>Camouflaged IDs<\/u><\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are rare cases in which fraudsters create issuing authorities that either does not exist or are not allowed to issue IDs.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b><u>Imposter IDs<\/u><\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">In such cases, the ID itself is original but is used by someone who isn\u2019t the legal holder of the ID.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b><u>Compromised or sample IDs<\/u><\/b><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are legally valid IDs that are available online either as sample IDs or as compromised IDs that have been exposed by hackers or thieves.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">The most common of these fraudulent IDs are forged &amp; counterfeit IDs, which have been created using information illegally obtained through data breaches or on the dark web.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">This covers all the fake IDs present in the market. But how worried should FIs be about the threat posed by this?<\/p>\n<h2><span style=\"color: #008000;\"><strong>Measuring the Threat of Identity Fraud<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Identity fraud can be classified into four different tiers based on the level of sophistication involved in the fraud. These levels are inversely proportional to their threat level to FIs.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 19px; font-family: 'open sans';\"><b>Tier 4<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are unsophisticated &amp; dilettantish attempts at identity fraud. Tier 4 ID fraud typically involves camouflaged IDs that are easily detectable.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Tier 4 ID frauds make up 20% of all ID fraud instances.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 19px; font-family: 'open sans';\"><b>Tier 3<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These involve poorly manufactured or slightly altered ID templates that have been filled with fake information. These cases of fraud are detectable by examining data format &amp; consistency criteria.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Tier 3 frauds make up 40% of all instances of ID fraud.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 19px; font-family: 'open sans';\"><b>Tier 2<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are largely sophisticated attempts at ID fraud. In Tier 2 cases, the data present is verifiable; however, there are small &amp; machine-detectable variations in font, layout &amp; security features.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Tier 4 frauds make up 35% of ID fraud cases.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 19px; font-family: 'open sans';\"><b>Tier 1<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">These are the most sophisticated &amp; dangerous attempts at ID fraud. In these instances, the supply chain is compromised to obtain blank IDs, and genuine IDs are obtained through social engineering or the black market.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">5% of all ID fraud cases are Tier 1 frauds.<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #333300;\"><span style=\"color: #333300;\"><strong>ID Fraud Distribution<\/strong><\/span>:<\/span><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5154 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/pie-chart-1-1.jpg\" alt=\"Document-Verification-Pie-Chart\" width=\"1000\" height=\"454\" \/><\/h4>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Now that we\u2019ve examined the range of ID fraud cases, let\u2019s take a look at how ID fraud is detected.<\/p>\n<h2><span style=\"color: #008000;\"><strong>How to Detect ID Fraud<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">While the number of cases of <a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/banking-fraud-in-india-and-how-banks-can-combat-it\"><b>ID fraud<\/b><\/a> have been skyrocketing, the other side hasn\u2019t been sitting idle. Government-issued IDs usually all have specific layouts, designs &amp; built-in features that allow verifiers to determine the authenticity of an ID.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">The techniques used to detect ID fraud are numerous, but they can all be classified into the following categories.<\/p>\n<h3><span style=\"color: #008000;\"><strong>Data Integrity Analytics<\/strong><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These techniques evaluate the integrity of the text &amp; numerical fields present in the ID. Some of the techniques used in data integrity analysis include &#8211;<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Data Validations<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">In this technique, the original ID template is used to determine whether valid data is present in specific formats in all areas in the ID and the MRZ (Machine Readable Zone).<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">For example: The MRZ in an Indian Passport contains the name, passport number &amp; date of birth of the passport holder. These data can be validated to make sure that the passport is authentic.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Algorithmic Validations<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Some IDs include specific rules, in the form of mathematical algorithms to identify any flaws in the ID. These rules are followed during the creation of the ID &amp; therefore can be coded into an ID checker system to validate the authenticity of an ID.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">For example:\u00a0PAN cards follow very specific rules when it comes to the data present on the card &#8211;<\/p>\n<ol type=\"1\">\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">\u00a0<span style=\"color: #333333;\">The first 3 characters are alphabets between A-Z<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">\u00a0The fourth character indicates the type of cardholder<\/span><\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><span style=\"color: #333333;\">\u00a0The fifth character is the first letter of the last name of the card holder<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These rules can be used algorithmically to check whether an ID is fake.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Data Consistency<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Certain data present in multiple locations &amp; multiple formats on the ID must match. Some IDs even have machine-readable text encoded with this information, which when decoded will indicate the requisite data. Data consistency checks are a useful tool to determine the validity of an ID.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">For example: The Indian passport, as mentioned before, contains an MRZ with data that repeats in other parts of the passport. Verifying the MRZ, therefore, is an example of a data consistency check.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>NFC Chips\u00a0<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">NFC (Near-field communication) chips enable short-range communication between two devices and contain additional verifying information that can be read by specific devices. This information can then be compared to the information appearing on the ID &amp; matched to authenticate the ID\u2019s validity.<\/p>\n<h3><span style=\"color: #008000;\"><strong>Visual Document Authenticity<\/strong><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These are techniques that can be used to validate\u00a0 IDs using scanned images of the ID. They can be classified as &#8211;<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Document Template Comparison<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">All government-issued IDs have templates with spatial &amp; design-based specifications. An ID can be visually compared to its template to determine certain geometric inconsistencies that can determine whether the ID is fraudulent.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Digital Tampering<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">The software can be used by fraudsters to digitally manipulate IDs by replacing certain information or changing the picture in the ID. However, these software leave trails that can be caught. For example, the pixels in the ID image can be analyzed by\u00a0<a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/kyc-verification\"><b>KYC verification<\/b><\/a>\u00a0software to determine whether the ID has been tampered with.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Font Anomalies<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">When an ID has been digitally manipulated, fraudsters will leave certain font anomalies that can be caught by KYC verification software.<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\"><b>Security Features<\/b><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Numerous IDs have security features in place such as digital watermarks, embossed text &amp; barcodes which can be used to validate the authenticity of an ID.<\/p>\n<h3><span style=\"color: #008000;\"><strong>Proof of Ownership\u00a0<\/strong><\/span><\/h3>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">The proof of ownership of an ID can be determined conclusively via facial matching techniques. The latest <a href=\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\">KYC verification<\/a> software takes a live picture or selfie of the current ID holder and matches it with the picture in the ID to ensure that the current ID holder is the same as the original ID holder.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">These are a few of the techniques used by verifiers to determine whether an ID is fake. Now let\u2019s look at how digital document verification works in real life.<\/p>\n<h2><span style=\"color: #008000;\"><strong>Real-time Document Verification &#8211; How it works<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Real-time document verification uses most of the techniques mentioned above to authenticate documents to a high degree of accuracy.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Melento (Formerly SignDesk)\u2019s\u00a0<a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><b>KYC verification solution\u00a0<\/b><\/a>employs AI-powered ID verification techniques to digitally validate nearly all government-issued IDs including PAN card, Aadhaar, Passport, Voter ID, GSTIN &amp; Driving Licence.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Here\u2019s how Melento (Formerly SignDesk)\u2019s ID verification works &#8211;<\/p>\n<ul>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">A scanned image or photograph of the ID is uploaded onto the dashboard<\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">OCR technology is used to convert the details on the ID to machine-readable text &amp; the relevant details are extracted<\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Data integrity analysis &amp; visual document authentication are used to validate the extracted details<\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">All details are validated using standard databases<\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">If the match percentage is greater than a certain threshold value, the document is successfully validated<\/li>\n<li style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">A live image of the customer is captured &amp; matched with the photo on the ID to ensure proof of ownership<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5155 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/image-5-1.jpg\" alt=\"ID-Verification-works\" width=\"1000\" height=\"454\" \/><\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">This entire process takes just a few minutes to complete &amp; is completely digital. Validation is carried out successfully in the majority of cases &amp; does not require any physical intervention. These are just a few of the advantages of digital document verification. Here are some more.<\/p>\n<h2><span style=\"color: #008000;\"><strong>Why choose Digital Document Verification\u00a0<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Nearly <a style=\"color: #333300;\" href=\"https:\/\/resources.idg.com\/download\/white-paper\/2018-digital-business\">93% of businesses<\/a>in the financial sector have a \u201cdigital-first\u201d strategy in place &amp; <strong><a style=\"color: #333300;\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-04-24-gartner-survey-shows-42-percent-of-ceos-have-begun-digital-business-transformation\"><b>56% of CEOs\u00a0<\/b><\/a><\/strong>say that digital improvements have led to increasing in revenue. Digitization, therefore, is here to stay.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Digital document verification significantly reduces operational time &amp; costs, resulting in several benefits for businesses in general &amp; FIs in particular.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Here are some reasons why FIs need to get onboard with digital document verification.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b>Reduced expenses<\/b><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Digitization has been shown to <strong><a style=\"color: #333300;\" href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/financial-services\/us-cons-automation-in-on-boarding-and-ongoing-servicing-of-commercial-banking-clients.pdf\"><b>reduce operational expenses<\/b><\/a><\/strong>for businesses by between 50-85%. Automating the KYC verification process using AI, <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/ocr-based-insurance-claims-verification\">OCR verification<\/a> &amp; ML techniques also increases ROI by at least 5x.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b>Secure &amp; fraud-proof<\/b><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Banks &amp; insurers have <a style=\"color: #333300;\" href=\"https:\/\/www.financialexpress.com\/industry\/indias-insurance-industry-hit-by-frauds-insurers-pay-higher-premium-to-compensate\/1926553\/\"><strong>lost billions\u00a0<\/strong><\/a>to frauds over the past year. Digital document verification secures the KYC process using a host of verification techniques &amp; uses ML-based filters, among other techniques, to filter out fraudulent profiles &amp; fake IDs.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b>Shorter turnaround times<\/b><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Automating the KYC verification process reduces TAT on account opening, loan disbursement &amp; other processes by upto 99%. AI-powered document verification has helped Melento (Formerly SignDesk)\u2019s clients reduce TAT from 10-20 days to a mere 10 minutes.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b>Fewer errors &amp; zero information loss<\/b><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Manual errors &amp; misplaced documents are frequent issues when it comes to document verification for KYC. By automating the document verification process, FIs can ensure that there are no manual errors in the KYC process &amp; that all customer-related information is safe on a digital platform.<\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"text-decoration: underline;\"><span style=\"font-size: 18px; font-family: 'open sans'; color: #333300;\"><b>Increased customer satisfaction<\/b><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans'; padding-left: 30px;\">Customers are increasingly demanding digital channels to obtain financial services. <a style=\"color: #333300;\" href=\"https:\/\/www.digitalcommerce360.com\/2013\/12\/31\/why-omnichannel-strategy-matters\/\">Surveys<\/a>indicate that businesses providing a strong omnichannel experience retain on average 89% of their customers. Digital KYC verification also reduces KYC drop-offs by 20%.<\/p>\n<h2><span style=\"color: #008000;\"><strong>Award-winning KYC Verification &amp; <span style=\"color: #008000;\"><a style=\"color: #008000;\" href=\"https:\/\/melento.ai\/en-in\/digital-onboarding\">Digital Onboarding<\/a><\/span>\u00a0<\/strong><\/span><\/h2>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Melento (Formerly SignDesk) is an award-winning provider of <a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/documentation-workflow-products\"><strong>AI-powered verification and documentation solutions<\/strong><\/a>\u00a0to businesses.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">We use real-time AI-powered document verification techniques, OCR-enabled image data extraction, facial matching &amp; ML-based fraud filters to automate and expedite the KYC verification process.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Our <a style=\"color: #333300;\" href=\"https:\/\/signdesk.com\/digital-kyc\"><strong>verification solutions<\/strong><\/a> have helped our 250+ clients reduce onboarding expenses, cut down on KYC drop-offs, reduce TAT by 99%, and safeguard against fraud using cutting-edge compliance technology.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Our efforts to <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/all-about-kyc-verification\">automate KYC<\/a><\/span> have been recognized in the form of numerous\u00a0<a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/awards\"><b>awards<\/b><\/a>, the latest being the Best AI\/ML Product at InnTech 2020, and the Global Banking &amp; Finance Review\u2019s <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/digital-onboarding\"><strong>Best Digital Onboarding Product of 2020<\/strong><\/a><\/span>.<\/p>\n<p style=\"text-align: justify; font-size: 17px; font-family: 'open sans';\">Are you ready to join 50+ major banks and start onboarding with <strong><a style=\"color: #333300;\" href=\"https:\/\/melento.ai\/en-in\/blog\/video-kyc\">Video KYC<\/a><\/strong>? Book a demo with us now and let\u2019s get started!<\/p>\n<div align=\"center\"><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/talk-to-sales\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal\" style=\"border-radius: 30px !important; background-color: #00b087; border: #00b087;\" type=\"button\"><strong>Book a Demo<\/strong><\/button><\/a><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Document Verification &#8211; Background Digitization is taking off in a big way. The number of smartphone users has increased to around 2.9 billion in 2020 and more customers are demanding digital channels for services. Nearly 40% of customers are more likely to obtain services from businesses that offer some sort of remote channel and businesses [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5990,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[14,22],"tags":[144,245,562,694,697,1265,1279,1343,1479,1488,1729,2124,2348,2373,2453],"class_list":["post-5141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ekyc","category-video-kyc","tag-ai-powered-document-verification","tag-basics-of-document-verification","tag-digital-document-verification","tag-document-verification","tag-document-verification-online","tag-how-document-verification-works","tag-how-to-detect-id-fraud","tag-id-verification","tag-kyc-verification","tag-kyc-verification-solution","tag-online-document-verification","tag-solution-for-identity-fraud","tag-verify-documents","tag-video-kyc","tag-what-is-document-verification"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Document Verification Prevents ID Fraud | KYC<\/title>\n<meta name=\"description\" content=\"ID fraud is one the rise in 2020 &amp; document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Document Verification Prevents ID Fraud | KYC\" \/>\n<meta property=\"og:description\" content=\"ID fraud is one the rise in 2020 &amp; document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-18T16:22:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T12:42:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud\",\"name\":\"How Document Verification Prevents ID Fraud | KYC\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg\",\"datePublished\":\"2021-05-18T16:22:42+00:00\",\"dateModified\":\"2025-09-17T12:42:53+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"ID fraud is one the rise in 2020 & document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg\",\"width\":1000,\"height\":454,\"caption\":\"How Document-Verification Helps ID Fraud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Document Verification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Document Verification Prevents ID Fraud | KYC","description":"ID fraud is one the rise in 2020 & document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud","og_locale":"en_US","og_type":"article","og_title":"How Document Verification Prevents ID Fraud | KYC","og_description":"ID fraud is one the rise in 2020 & document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link","og_url":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2021-05-18T16:22:42+00:00","article_modified_time":"2025-09-17T12:42:53+00:00","og_image":[{"width":1000,"height":454,"url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg","type":"image\/jpeg"}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud","url":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud","name":"How Document Verification Prevents ID Fraud | KYC","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg","datePublished":"2021-05-18T16:22:42+00:00","dateModified":"2025-09-17T12:42:53+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"ID fraud is one the rise in 2020 & document verification is a convenient tool to fight it. Read how to fight fraud using KYC verification at link","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2021\/05\/Document-Verification-1-1.jpg","width":1000,"height":454,"caption":"How Document-Verification Helps ID Fraud"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/how-digital-document-verification-prevents-kyc-id-fraud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"Document Verification"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/5141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=5141"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/5141\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media\/5990"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=5141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=5141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=5141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}