Skip to main content

Overview

Veridox provides comprehensive forensic document analysis through a suite of AI-powered detection engines. This guide covers the end-to-end analysis lifecycle, from initial case creation to interpreting detailed fraud indicators and risk assessments.

The Analysis Lifecycle

Document verification in Veridox follows a structured path:
  1. Case Creation: Group related documents into a single container for context-aware analysis.
  2. Document Ingestion: Securely upload files to our storage infrastructure.
  3. Automated Processing: Veridox engines perform forensic analysis in parallel.
  4. Intelligence Retrieval: Access granular findings, authenticity scores, and generated reports.
Supported Formats: Veridox is optimised for images (JPEG, PNG, TIFF) and documents (PDF), analysing them for metadata anomalies and pixel-level tampering.

Forensic Capabilities

Image Forensics

Validates data to ensure digital integrity:
  • Verifies capture device signatures and software markers.
  • Validates capture timestamps and GPS coordinates.
  • Detects signs of metadata stripping or manipulation.
Detects compression inconsistencies within image layers:
  • Identifies spliced regions with varying compression ratios.
  • Highlights localised editing or pixel-level manipulation.
  • Generates a visual heatmap for investigation.
Examines sensor noise patterns to detect synthetic elements:
  • Identifies inconsistent digital noise across different regions.
  • Detects cloning, “healing,” and copy-paste operations.
  • Flags AI-generated or enhanced regions.
Performs global reverse image searches:
  • Identifies the use of public stock photography.
  • Detects reused images across different verification cases.
  • Matches content against known fraudulent document repositories.
Validates cryptographic provenance markers:
  • Verifies hardware-level digital signatures.
  • Tracks the immutable edit history of the file.
  • Validates compliance with the C2PA standard.

Document Forensics (PDF)

Analyses the internal architecture of the PDF:
  • Detects anomalous creation tools or non-standard libraries.
  • Flags modification markers and hidden object streams.
  • Validates PDF versioning and cross-reference tables.
Examines visual and structural consistency:
  • Identifies font substitution and “invisible” text overlays.
  • Detects layout anomalies and alignment inconsistencies.
  • Validates barcodes and security patterns against global standards.
Transforms documents into structured data:
  • High-accuracy OCR for text extraction.
  • Automatic recognition of persons, dates, and reference numbers.
  • Cross-validation between extracted text and embedded metadata.

Interpreting Risk Levels

Every document is assigned a risk classification based on the aggregate findings of all analysis engines:
Risk LevelDescriptionRecommended Logic
InformationalNo fraud indicators. Standard characteristics detected.Proceed with automated acceptance.
LowMinor anomalies found that are likely benign.Accept with optional background monitoring.
MediumModerate risk factors or multiple minor anomalies.Route to a human agent for manual review.
HighSignificant indicators of tampering or fabrication.Reject automatically or escalate to fraud team.

Detailed Findings

Each analysis report includes a findings array. A typical finding follows this structure:
{
  "heading": "Anomalous Document Reference Format",
  "category": "Document Integrity",
  "description": "The reference number uses a 24-digit format instead of the 11-digit standard.",
  "supporting_evidence": [
    "Standard DVLA V5C format requires 11 digits.",
    "The embedded Code128 barcode matches the 24-digit string."
  ]
}

Real-Time Notifications

You can use webhooks to receive automatic notifications when file analysis completes, rather than polling for results. This enables automated workflows like risk-based escalation and report generation.

Security & Best Practices

  • File Quality: High-resolution uploads (min. 1200x1600 pixels) ensure the highest accuracy for ELA and noise analysis.
  • Access Control: You can only access and retrieve analysis results for documents you have personally created or requested.
  • Data Retention: Upon account termination, Veridox retains files for 90 days after permanent deletion. Ensure you download the PDF reports if you require long-term storage for compliance.