Home > Blog
Blog

Understanding Image Tamper Scoring
Attestiv uses AI to detect photo anomalies and fraud by scanning for evidence across a variety of attributes. Once our process is complete, each image receives an easy to understand tamper score.

Spring 2022 Review – In this issue, we share our summary of Attestiv news and platform features
In this issue, we share our Spring 2022 summary of Attestiv news and platform features.

What is digital fingerprinting?
At Attestiv, we are able to secure data by fingerprinting each item to the blockchain to prevent potential inside and outside threats.

Attestiv recognized in 2021 Gartner Market Guide for AI Trust, Risk and Security Management
Attestiv named as a Representative Adversarial Attack Resistance Vendors in the AI TRiSM Market in 2011 Gartner Market Guide

Q4 2021 Review – In this issue, we share our summary of Attestiv news and platform features
In this issue, we share our Q4 summary of Attestiv news and platform features.

Business Quality Digital Media Guideline #6: Contextual anomalies
Similar to digital media processing, contextual anomalies are not a sure sign of fraud, but are useful in identifying cases where straight through processing is not appropriate and further interaction may be necessary.

Business Quality Digital Media Guideline #5: Processing
While processing can occur totally inadvertently as a result of internal operations, poorly maintained chain of custody and/or tracking changes to the media, companies should review these methods to ensure they aren’t causing more harm than good.

Business Quality Digital Media Guideline #4: Duplicates
Duplication is the use of the same photos across multiple claims, whether within an insurance carrier or across carriers and this may be a sign of fraud. The ability to detect duplicate photos within or across carriers is an important tool to prevent potential fraud.

Business Quality Digital Media Guideline #3: Tampering
Malicious tampering of digital media is typically a sign of fraud. When media has been altered to change the state or appearance of an insured asset, the media should be rejected and/or replaced. Malicious tampering can happen in a number of ways.