
tures such as a gender classifier and an age predictor.
To bolster the security of the KYC solution, we rec-
ommend implementing a “liveness detection” feature,
which verifies whether the individual on the screen is
indeed a live person.
REFERENCES
(2024). Cnn based face detector. Accessed: 2024-10-14.
(2024). Face recognition api. Accessed: 2024-10-14.
ACTICO (2023). Why machine learning brings up to 57%
savings in the KYC process. Accessed: 2024-10-14.
Al, S. and Kumar, J. (2020). Fingerprint scanning tech-
nology in modern identity verification systems. Inter-
national Journal of Computer Applications, 28(3):65–
78.
Bhardwaj, R. and Sharma, P. (2021). Anomaly detection
algorithms in anti-money laundering systems. Journal
of Artificial Intelligence Research, 34(4):45–60.
Cerovsky, Z. and Mindl, P. (2008). Hybrid electric cars,
combustion engine driven cars and their impact on
environment. In 2008 International Symposium on
Power Electronics, Electrical Drives, Automation and
Motion, pages 739–743. IEEE.
Chang-Yeon, J. (2008). Face detection using lbp features.
Final Project Report, 77:1–4.
Charoenwong, B. (2023). The one reason why AI/ML for
AML/KYC has failed (so far). Accessed: 2024-10-14.
Dalal, N. and Triggs, B. (2005). Histograms of oriented
gradients for human detection. In 2005 IEEE com-
puter society conference on computer vision and pat-
tern recognition (CVPR’05), volume 1, pages 886–
893. Ieee.
Darapaneni, N., Evoori, A. K., Vemuri, V. B., Arichandra-
pandian, T., Karthikeyan, G., Paduri, A. R., Babu, D.,
and Madhavan, J. (2020). Automatic face detection
and recognition for attendance maintenance. In 2020
IEEE 15th International Conference on Industrial and
Information Systems (ICIIS), pages 236–241. IEEE.
Do, T.-L., Tran, M.-K., Nguyen, H. H., and Tran, M.-T.
(2021). Potential threat of face swapping to eKYC
with face registration and augmented solution with
deepfake detection. In Future Data and Security En-
gineering: 8th International Conference, FDSE 2021,
Virtual Event, November 24–26, 2021, Proceedings 8,
pages 293–307. Springer.
He, K., Gkioxari, G., Doll
´
ar, P., and Girshick, R. (2017).
Mask R-CNN. In Proceedings of the IEEE interna-
tional conference on computer vision, pages 2961–
2969.
Jain, A. K. and Gupta, S. B. (2017). Facial recognition: Ad-
vances and applications in identity verification. IEEE
Transactions on Biometrics, Behavior, and Identity
Science, 4(2):115–130.
Kagawa, S., Hubacek, K., Nansai, K., Kataoka, M., Man-
agi, S., Suh, S., and Kudoh, Y. (2013). Better cars
or older cars?: assessing co2 emission reduction po-
tential of passenger vehicle replacement programs.
Global Environmental Change, 23(6):1807–1818.
Leydesdorff, L. (2008). On the normalization and visualiza-
tion of author co-citation data: Salton’s cosine versus
the jaccard index. Journal of the American Society for
Information Science and Technology, 59(1):77–85.
Liu, X. and Zhang, Y. (2019). Blockchain technology for
secure kyc in financial systems. Journal of Blockchain
Research, 5(2):45–59.
Lu, B., Chen, J.-C., and Chellappa, R. (2019). Uid-gan:
Unsupervised image deblurring via disentangled rep-
resentations. IEEE Transactions on Biometrics, Be-
havior, and Identity Science, 2(1):26–39.
Miller, M. and Smith, J. (2019). Biometric authentication
systems in financial applications. Journal of Financial
Technology, 12(3):89–104.
Mita, T., Kaneko, T., and Hori, O. (2005). Joint haar-like
features for face detection. In Tenth IEEE Interna-
tional Conference on Computer Vision (ICCV’05) Vol-
ume 1, volume 2, pages 1619–1626. IEEE.
Pic, M., Mahfoudi, G., and Trabelsi, A. (2019). Remote
KYC: Attacks and counter-measures. In 2019 Eu-
ropean Intelligence and Security Informatics Confer-
ence (EISIC), pages 126–129. IEEE.
Recognition, F. Face comparison distance calculation. Ac-
cessed: 2024-10-14.
Stefanovic, S. (2023). Face detection algorithms compari-
son. Accessed: 2024-10-14.
Sun, X., Wu, P., and Hoi, S. C. (2018). Face detection us-
ing deep learning: An improved faster rcnn approach.
Neurocomputing, 299:42–50.
Technologies, S. (2023). How we built an intelligent au-
tomation solution for KYC validation. Accessed:
2024-10-14.
Verma, R. and Ali, J. (2013). A comparative study of var-
ious types of image noise and efficient noise removal
techniques. International Journal of advanced re-
search in computer science and software engineering,
3(10).
Yoon, J. and Kim, R. (2020). Pattern recognition in finan-
cial fraud detection systems. IEEE Transactions on
Computational Intelligence, 9(5):98–112.
Zohdy, M. and Thomas, L. (2018). Blockchain technol-
ogy for secure customer data sharing in kyc systems.
Blockchain Technology Review, 2(1):23–37.
Onboarding Customers in Car Sharing Systems: Implementation of Know Your Customer Solutions
391