Overview
Veridox provides comprehensive forensic document analysis through a suite of AI-powered detection engines. This guide covers the end-to-end analysis lifecycle, from initial case creation to interpreting detailed fraud indicators and risk assessments.The Analysis Lifecycle
Document verification in Veridox follows a structured path:- Case Creation: Group related documents into a single container for context-aware analysis.
- Document Ingestion: Securely upload files to our storage infrastructure.
- Automated Processing: Veridox engines perform forensic analysis in parallel.
- Intelligence Retrieval: Access granular findings, authenticity scores, and generated reports.
Supported Formats: Veridox is optimised for images (JPEG, PNG, TIFF) and documents (PDF), analysing them for metadata anomalies and pixel-level tampering.
Forensic Capabilities
Image Forensics
Metadata & Provenance Analysis
Metadata & Provenance Analysis
Validates data to ensure digital integrity:
- Verifies capture device signatures and software markers.
- Validates capture timestamps and GPS coordinates.
- Detects signs of metadata stripping or manipulation.
Error Level Analysis (ELA)
Error Level Analysis (ELA)
Detects compression inconsistencies within image layers:
- Identifies spliced regions with varying compression ratios.
- Highlights localised editing or pixel-level manipulation.
- Generates a visual heatmap for investigation.
Noise & Filter Analysis
Noise & Filter Analysis
Examines sensor noise patterns to detect synthetic elements:
- Identifies inconsistent digital noise across different regions.
- Detects cloning, “healing,” and copy-paste operations.
- Flags AI-generated or enhanced regions.
Visual Search & Stock Detection
Visual Search & Stock Detection
Performs global reverse image searches:
- Identifies the use of public stock photography.
- Detects reused images across different verification cases.
- Matches content against known fraudulent document repositories.
Content Authenticity (C2PA)
Content Authenticity (C2PA)
Validates cryptographic provenance markers:
- Verifies hardware-level digital signatures.
- Tracks the immutable edit history of the file.
- Validates compliance with the C2PA standard.
Document Forensics (PDF)
Structural Integrity
Structural Integrity
Analyses the internal architecture of the PDF:
- Detects anomalous creation tools or non-standard libraries.
- Flags modification markers and hidden object streams.
- Validates PDF versioning and cross-reference tables.
Formatting & Font Consistency
Formatting & Font Consistency
Examines visual and structural consistency:
- Identifies font substitution and “invisible” text overlays.
- Detects layout anomalies and alignment inconsistencies.
- Validates barcodes and security patterns against global standards.
Entity Extraction & OCR
Entity Extraction & OCR
Transforms documents into structured data:
- High-accuracy OCR for text extraction.
- Automatic recognition of persons, dates, and reference numbers.
- Cross-validation between extracted text and embedded metadata.
Interpreting Risk Levels
Every document is assigned a risk classification based on the aggregate findings of all analysis engines:| Risk Level | Description | Recommended Logic |
|---|---|---|
| Informational | No fraud indicators. Standard characteristics detected. | Proceed with automated acceptance. |
| Low | Minor anomalies found that are likely benign. | Accept with optional background monitoring. |
| Medium | Moderate risk factors or multiple minor anomalies. | Route to a human agent for manual review. |
| High | Significant indicators of tampering or fabrication. | Reject automatically or escalate to fraud team. |
Detailed Findings
Each analysis report includes afindings array. A typical finding follows this structure:
Real-Time Notifications
You can use webhooks to receive automatic notifications when file analysis completes, rather than polling for results. This enables automated workflows like risk-based escalation and report generation.Security & Best Practices
- File Quality: High-resolution uploads (min. 1200x1600 pixels) ensure the highest accuracy for ELA and noise analysis.
- Access Control: You can only access and retrieve analysis results for documents you have personally created or requested.
- Data Retention: Upon account termination, Veridox retains files for 90 days after permanent deletion. Ensure you download the PDF reports if you require long-term storage for compliance.