Video Injection Detection
Controls that detect injected, replayed, or pre-recorded video streams used to bypass selfie and liveness checks during remote identity verification.
Overview
Video injection detection focuses on identifying attempts to feed a verification system a manipulated or pre-recorded stream (for example, via virtual cameras, screen replays, or intermediaries) instead of a live capture from the user’s device camera.
Typical signals and controls
- Capture pipeline integrity checks (e.g., detecting virtual camera sources).
- Consistency checks across frames and metadata (timing, encoding artifacts).
- Challenge-response or motion prompts combined with PAD/liveness.
Where it shows up
- Remote onboarding / selfie identity verification
- Account recovery re-verification
- High-risk transaction step-up checks
References
Vendors using Video Injection Detection
Latest Data Cards
Data Card Mitek enhances video verification to counter injection attacks in Spanish market
2026-02-16CC-BY-4.0video-injection-detectiondeepfake-detectionMitek enhanced its SEPBLAC-compliant digital onboarding platform for Spain with four defense layers against injection attacks—deepfake detection, digital manipulation analysis, injection attack protection, and face gallery analysis—achieving 99.9% accuracy on known deepfake engines and over 99% detection rates for face swaps.
- 89% of Spanish companies reported increased fraud attempts annually, with identity fraud the leading cause of corporate fraud loss in Spain.
- The update aligns with February 2025's new European injection attack standard, CEN/TS 18099:2025.
- Mitek's approach combines AI-trained detection with traditional software checks targeting coordinated fraud attempts during onboarding.
