Video Injection Detection

Controls that detect injected, replayed, or pre-recorded video streams used to bypass selfie and liveness checks during remote identity verification.

Overview

Video injection detection focuses on identifying attempts to feed a verification system a manipulated or pre-recorded stream (for example, via virtual cameras, screen replays, or intermediaries) instead of a live capture from the user’s device camera.

Typical signals and controls

  • Capture pipeline integrity checks (e.g., detecting virtual camera sources).
  • Consistency checks across frames and metadata (timing, encoding artifacts).
  • Challenge-response or motion prompts combined with PAD/liveness.

Where it shows up

  • Remote onboarding / selfie identity verification
  • Account recovery re-verification
  • High-risk transaction step-up checks

References

Vendors using Video Injection Detection

Latest Data Cards

  • Data Card

    Mitek enhances video verification to counter injection attacks in Spanish market

    2026-02-16CC-BY-4.0video-injection-detectiondeepfake-detection

    Mitek enhanced its SEPBLAC-compliant digital onboarding platform for Spain with four defense layers against injection attacks—deepfake detection, digital manipulation analysis, injection attack protection, and face gallery analysis—achieving 99.9% accuracy on known deepfake engines and over 99% detection rates for face swaps.

    • 89% of Spanish companies reported increased fraud attempts annually, with identity fraud the leading cause of corporate fraud loss in Spain.
    • The update aligns with February 2025's new European injection attack standard, CEN/TS 18099:2025.
    • Mitek's approach combines AI-trained detection with traditional software checks targeting coordinated fraud attempts during onboarding.