September 19, 2023
Defining the core accuracy metrics of biometric systems
During the evaluation of Biometrics-based systems, one of the first steps involves defining the core accuracy metrics. This is an important step that helps us to assess if the behavior of our system corresponds with our expectations. Verification scores measure the differences between two given biometrics samples and it’s normally given in 2 forms: a) […]
September 13, 2023
From the Lab to Production.
How Alice tests their Machine Learning models At Alice, machine learning models are essential tools for delivering a high-quality service. However, it is important to evaluate these models carefully to ensure that they are performing as expected. In this article, we will discuss the key steps involved in evaluating machine learning models, including creating an […]
August 1, 2023
System vs Algorithm Evaluations in Face Presentation Attack Detection
In the field of face presentation attack detection (face-PAD) or liveness detection, evaluating the effectiveness of detection systems and algorithms is crucial to ensure robust and reliable anti-spoofing measures. Two primary evaluation approaches used in PAD research are system evaluation and algorithm evaluation. In this blog post, we will explore the key differences between them, […]
July 26, 2023
Alice Biometrics ranks #1 in remote identity verification systems, according to NIST
The prestigious National Institute of Standards and Technologies (NIST), part of the US Department of Defense, has published the results of the 1-to-1 test for facial recognition providers. Alice ranked first among remote video-identification companies worldwide. This reaffirms Alice’s position as the best solution for remote identity verification using facial recognition. The results of this […]
July 5, 2023
Understanding Face Presentation Attack Detection and Face Liveness Detection
In the realm of identity verification, detecting and preventing fraud is crucial for maintaining trust and security. Two key techniques employed for this purpose are face presentation attack detection (PAD) and face liveness detection. While both techniques contribute to the overall anti-fraud measures in face recognition, they can differ (or converge, spoiler alert!) in their […]
June 8, 2023
What is NIST and what does it do?
NIST (National Institute of Standards and Technology) is a United States government agency charged with developing and promoting standards, measurements and technologies to improve the nation’s security and economic competitiveness. NIST works in areas such as information technology, cybersecurity, metrology, engineering, manufacturing and materials science. It is also responsible for creating and maintaining standards and […]
April 28, 2023
Alice Biometrics is the first cross-platform system to meet CCN requirements for video identification solutions.
Alice Biometrics, which allows non face-to-face video identification, becomes the only provider that complies, for all types of platforms (web and mobile), with the security requirements demanded by the National Cryptologic Centre of HIGH category. As reflected in the CPSTIC (Catalogue of Information and Communications Technology Products and Services) of this organisation, which exclusively includes […]
November 16, 2022
Is NFC a secure technology?
October 5, 2022
What is a compliance tool?
Legal compliance is a challenge for any company and industry. It is an ongoing task, which cannot be done once and forgotten. The world advances, and with it, regulations and threats; so your company has to adapt to changes. This is where compliance tools come into play. Let’s review this term. Compliance tool: what does […]