
Understanding Image Tamper Scoring
Attestiv uses AI to detect photo anomalies and fraud by scanning for evidence across a variety of attributes. Once our process is complete, each image receives an easy to understand tamper score.
Home > Digital media authenticity > Page 4
Attestiv uses AI to detect photo anomalies and fraud by scanning for evidence across a variety of attributes. Once our process is complete, each image receives an easy to understand tamper score.
Similar to digital media processing, contextual anomalies are not a sure sign of fraud, but are useful in identifying cases where straight through processing is not appropriate and further interaction may be necessary.
While processing can occur totally inadvertently as a result of internal operations, poorly maintained chain of custody and/or tracking changes to the media, companies should review these methods to ensure they aren’t causing more harm than good.
Duplication is the use of the same photos across multiple claims, whether within an insurance carrier or across carriers and this may be a sign of fraud. The ability to detect duplicate photos within or across carriers is an important tool to prevent potential fraud.
Malicious tampering of digital media is typically a sign of fraud. When media has been altered to change the state or appearance of an insured asset, the media should be rejected and/or replaced. Malicious tampering can happen in a number of ways.
By having a process that immediately detects low quality and then automatically requests a customer to resubmit that image or video is the ideal way to prevent issues whether it be a claim, quote or other transaction.
Photos and videos should be of high enough resolution to meet the needs of transactions and claims. When relying on images to make decisions and support automated operations, the details within the photo matter.
For insurance carriers who are thinking about or who have currently implemented self-service processes for gathering photos and digital media that will be used in claims, underwriting or inspections, it is important to put in place a set of guidelines BEFORE they begin using this customer-provided media.
When capturing a photo from a camera or a video recorded on a smartphone, it’s not unusual for that photo or video to be edited but for businesses that need files to be 100% authentic, protection against all editing is essential.
Learn about how automated detection operates, two of the approaches typically used and the pros and cons of each.
Mark Morley is the Chief Operating Officer of Attestiv.
He received his formative Data Integrity training at Deloitte. Served as the CFO of Iomega (NYSE), the international manufacturer of Zip storage devices, at the time, the second fastest-growing public company in the U.S.. He served as the CFO of Encore Computer (NASDAQ) as it grew from Revenue of $2 million to over $200 million. During “Desert Storm”, Mark was required to hold the highest U.S. and NATO clearances.
Mark authored a seminal article on Data Integrity online (Wall Street Journal Online). Additionally, he served as EVP, General Counsel and CFO at Digital Guardian, a high-growth cybersecurity company.
Earlier in his career, he worked at an independent insurance agency, Amica as a claims representative, and was the CEO of the captive insurance subsidiary of a NYSE company.
He obtained Bachelor (Economics) and Doctor of Law degrees from Boston College and is a graduate of Harvard Business School.