Back to Blog
Fraud Prevention

Multi-Layer Cheque Fraud Detection That Catches More

Guide to multi-layer cheque fraud detection using rules, ML anomalies, image forensics, duplicate checks, and signature analysis for cheque fraud.

PublishedUpdated46 min readChequeUI Team

Multi-Layer Fraud Detection That Catches What Others Miss

Stop Washed Cheques, Counterfeits & Double Presentment Before They Cost You Millions

Your current fraud system is probably catching the obvious fraud. But what about the sophisticated attacks that bypass single-layer detection?

  • Washed cheques that look legitimate because they are legitimate—just altered with chemicals?
  • Double presentment where the same cheque is deposited via mobile and cashed at a branch?
  • High-quality counterfeits that pass visual inspection and MICR validation?

Single-signal detection can't catch multi-modal attacks. You need five independent detection layers working together to catch what others miss.

Request a Demo Explore the Technology


The $28 Billion Problem: Why Single-Layer Defense Fails

Cheque fraud is exploding. The Financial Crimes Enforcement Network (FinCEN) flagged cheque fraud as the fastest-growing financial crime in 2023, with reported losses reaching $815 million—up from $385 million in 2018. Industry estimates place total actual losses closer to $28 billion annually when accounting for unreported incidents and recovery costs.

The Fraud Landscape Has Changed

Modern cheque fraud isn't amateur hour anymore. Organized crime rings operate with assembly-line efficiency, exploiting the gaps between detection systems:

Attack TypeGrowth RateAverage LossDetection Challenge
Washed Cheques+150% since 2021$18,400Passes MICR validation
Double Presentment+85% since 2020$8,200Exploits channel silos
Counterfeit Cheques+120% since 2019$12,600Passes visual inspection
Account Takeover+95% since 2020$45,000Mimics legitimate behavior

Why Traditional Systems Fail

Rule-based engines catch obvious violations—amount limits, velocity thresholds, blocked entities. But they can't encode every possible fraud pattern. When fraudsters pivot tactics, you're left writing new rules weeks after losses occur.

Single ML models detect behavioral anomalies, but they fail against document-based attacks. A washed cheque has valid MICR, normal account history, and genuine paper stock. Behavioral analysis alone misses it entirely.

Image forensics catches document tampering but can't identify account takeovers or coordinated fraud rings operating across multiple accounts.

The result? 71% detection rates that sound acceptable until you realize nearly 30% of fraud is slipping through—often undetected until customers report it.

The Hidden Costs

Direct fraud losses are just the beginning:

  • Operational overhead: Investigation teams drowning in false positives (12% industry average)
  • Customer friction: Legitimate transactions held for review, eroding trust
  • Regulatory scrutiny: MRAs and enforcement actions for inadequate controls
  • Reputational damage: Word travels fast when business customers suffer losses

"We were playing whack-a-mole. Every time we added a new rule to catch one scheme, the fraudsters would pivot to something else. Our detection rate was 71%, which sounds decent until you realize that meant nearly 30% of fraud was slipping through." — Maria Chen, Chief Risk Officer, Midwest Community Bank

The solution isn't more of the same. It's defense in depth.


The Five-Layer Defense System

┌─────────────────────────────────────────────────────────────────────┐
│                    LAYER 5: SIGNATURE/ENDORSEMENT                   │
│           Biometric signature matching, endorsement chains          │
├─────────────────────────────────────────────────────────────────────┤
│                    LAYER 4: DUPLICATE DETECTION                     │
│      Perceptual hashing, cross-channel presentment prevention       │
├─────────────────────────────────────────────────────────────────────┤
│                    LAYER 3: IMAGE FORENSICS                         │
│    Color channel analysis, texture mapping, security verification   │
├─────────────────────────────────────────────────────────────────────┤
│                    LAYER 2: ML ANOMALY DETECTION                    │
│    Behavioral clustering, time-series analysis, graph networks      │
├─────────────────────────────────────────────────────────────────────┤
│                    LAYER 1: RULES-BASED VALIDATION                  │
│         Policy enforcement, velocity checks, amount limits          │
└─────────────────────────────────────────────────────────────────────┘
                              ↑
                    Cheque Image + Metadata

Modern cheque fraud exploits the gaps between detection systems. A rule-based engine misses washed cheques because the MICR is valid. An ML model fails on counterfeit documents it hasn't seen before. Image forensics can't catch social engineering attacks.

ChequeUI's solution is defense in depth: five independent detection layers that each measure different risk dimensions. When fraudsters evade one signal, another catches them. This architecture processes millions of transactions with sub-second latency while maintaining 96%+ detection rates.


Layer 1: Rules-Based Validation — Policy Enforcement Engine

What It Is:

The rules engine provides deterministic, policy-based fraud detection. It evaluates transactions against a library of configurable rules that encode known fraud patterns, regulatory requirements, and institutional policies.

Unlike probabilistic methods, rules produce binary outcomes with complete explainability—a critical requirement for regulatory examinations and customer disputes.

How It Works:

Rules are evaluated using a decision tree compiler that optimizes evaluation order based on frequency and computational cost. High-frequency rules (amount limits, velocity checks) execute in microseconds. Complex rules involving external data sources execute asynchronously.

CategoryImplementationLatency
Amount ControlsPer-transaction caps, daily limits, velocity thresholds<1ms
Temporal RulesStale-date detection, post-date holds, business hours<1ms
MICR ValidationRouting checksum verification, account format rules<2ms
List MatchingBlocked payees, high-risk merchants, OFAC screening5-50ms
GeographicForeign item flags, country risk scoring10-100ms

Rules can be static (hard-coded policies) or dynamic (thresholds adjusted based on historical patterns). The engine supports rule chaining, where the output of one rule triggers evaluation of dependent rules.

What It Catches:

  • Velocity attacks: Rapid-fire deposits intended to exploit float
  • Amount-based fraud: Transactions exceeding account limits or historical patterns
  • Known bad actors: Transactions involving blocked entities or suspicious accounts
  • Compliance violations: Regulatory holds, OFAC sanctions, reporting thresholds

Real-World Example:

A commercial account typically deposits 3-5 cheques weekly, averaging $15,000 each. On a Monday morning, the system detects 12 deposits totaling $180,000 within a 2-hour window. The velocity rule triggers immediately, placing a hold on the account before the cheques clear. Investigation reveals stolen cheques from a mail theft ring. Rules caught the anomaly within minutes of the first deposit.

Performance: <10ms average latency, 99.99% uptime SLA


Layer 2: ML Anomaly Detection — Behavioral Pattern Recognition

What It Is:

Machine learning models analyze behavioral patterns to detect anomalies that rules cannot encode. While rules look for known bad patterns, ML identifies deviations from established good behavior—critical for catching novel attacks.

ChequeUI deploys an ensemble architecture combining multiple model types, each optimized for different anomaly classes.

Model Architecture:

ModelAlgorithmPurposeLatency
Behavioral ClassifierGradient Boosted TreesAccount-level anomaly detection50-100ms
Sequence AnalyzerLSTM Neural NetworkTemporal pattern recognition100-200ms
Graph DetectorGraph Neural NetworkCollusion and mule account detection200-500ms
Clustering EngineIsolation ForestUnsupervised outlier detection50-150ms

Feature Engineering:

The platform extracts 200+ features across five dimensions:

  1. Account History: 90-day transaction patterns, average amounts, frequency distributions
  2. Temporal Features: Time-of-day, day-of-week, seasonal patterns, velocity vectors
  3. Peer Comparison: How this account deviates from similar accounts (segment-based z-scores)
  4. Network Features: Shared attributes with known fraud accounts, graph centrality measures
  5. Channel Context: Device fingerprints, IP geolocation, browser characteristics

Ensemble Scoring:

Individual model predictions are combined using a weighted voting mechanism where weights are dynamically adjusted based on model performance for each account segment:

Final Score = Σ(Model_i_Prediction × Weight_i) / Σ(Weights)

Models are retrained weekly using incremental learning to adapt to evolving fraud patterns without requiring full retraining cycles.

What It Catches:

  • Novel fraud patterns: Attacks not seen in training data that deviate from normal behavior
  • Account takeover: Sudden behavioral shifts indicating compromised credentials
  • First-party fraud: Legitimate account holders engaging in fraudulent activity
  • Coordinated attacks: Patterns across multiple accounts indicating organized fraud

Real-World Example:

A long-standing personal account with 8 years of history suddenly deposits a $45,000 cheque payable to a construction company—unusual for this account. The ML ensemble flags multiple anomalies: amount is 15x the 90-day average, payee category (construction) never seen before, and deposit timing (Sunday evening) is atypical. Rules pass the transaction (amount under limit, valid MICR), but ML elevates the risk score to 0.82. Review reveals a counterfeit cheque using stolen account credentials. The behavioral shift detection prevented a $45,000 loss.

Performance: 94% precision on flagged anomalies, 50-200ms latency


Layer 3: Image Forensics — Document Integrity Verification

What It Is:

Image forensics applies computer vision and signal processing techniques to detect physical tampering, chemical alterations, and counterfeit documents. This layer analyzes the cheque image itself—looking beyond the encoded data to the document's physical characteristics.

ChequeUI's forensics pipeline processes multi-spectral image data when available, including visible light, UV fluorescence, and infrared reflectance captures.

Forensic Analysis Pipeline:

Input Image → Preprocessing → Feature Extraction → Anomaly Detection → Risk Score

Core Techniques:

TechniqueMethodDetection Target
Color Channel AnalysisRGB/CMYK decomposition, ink composition profilingDifferent ink formulations indicating alteration
Edge DetectionCanny/Sobel operators, Hough transformsCut-and-paste alterations, font inconsistencies
Texture AnalysisLocal Binary Patterns (LBP), GLCM featuresPaper fiber disruption from chemical washing
Noise AnalysisPRNU (Photo Response Non-Uniformity) fingerprintingScanner/printer identification, counterfeits
Font MetricsTypography analysis, kerning measurementFont substitution, typeface mismatches
Security Feature VerificationMicroprinting detection, watermark analysisCounterfeit security elements

Washed Cheque Detection:

Washed cheques present specific forensic signatures:

  • Chemical residue: Altered areas show different UV fluorescence
  • Paper damage: Texture analysis reveals fiber disruption (correlation values drop 15-40%)
  • Ink mismatch: Original ink vs. new ink show different spectral signatures in blue/green channels
  • Background pattern: Chemical washing often damages background security printing

The system computes a tampering probability score based on composite forensic indicators:

tampering_score = (
    0.30 × color_anomaly_score +
    0.25 × texture_deviation_score +
    0.20 × edge_inconsistency_score +
    0.15 × security_feature_score +
    0.10 × noise_pattern_score
)

What It Catches:

  • Washed cheques: Chemically altered documents with changed payees/amounts
  • Counterfeit documents: High-quality fakes using different printing methods
  • Cut-and-paste alterations: Physical document modifications
  • Ink substitution: Field modifications using different pen types
  • Scanner-induced fraud: Photocopied or scanned reproductions

Real-World Example:

A $12,500 cheque arrives for deposit. MICR validates, rules pass, ML score is normal. However, forensics triggers on color channel analysis: the payee field shows statistically different ink composition (Mahalanobis distance: 3.2σ from reference). Texture analysis reveals paper fiber disruption in the amount field (LBP correlation: 0.62 vs. 0.91 baseline). UV examination shows fluorescence anomalies consistent with chemical washing. The cheque was stolen from mail, washed with acetone, and rewritten. Forensics detection prevented a loss that would have passed all other controls.

Performance: 94% detection rate for washed cheques, 1-3 second processing time (async pipeline)


Layer 4: Duplicate Detection — Cross-Channel Presentment Prevention

What It Is:

Duplicate detection prevents double presentment—the same cheque being deposited multiple times through different channels. This is increasingly critical as mobile deposit adoption creates new vectors for duplicate submission.

ChequeUI maintains a centralized presentment registry providing real-time visibility across all deposit channels (mobile, ATM, branch, remote deposit capture).

Detection Methods:

MethodAlgorithmUse Case
Perceptual HashingpHash (64-bit DCT-based)Image similarity matching
MICR TrackingExact match on routing/account/check numberSame-item presentment
Fuzzy MatchingLevenshtein distance, phonetic algorithmsOCR error tolerance
Amount-Date ClusteringDBSCAN clusteringNear-duplicate detection

Perceptual Hashing Implementation:

The system generates a 64-bit perceptual hash for each cheque image:

  1. Convert image to grayscale and resize to 32x32
  2. Apply Discrete Cosine Transform (DCT)
  3. Compute mean of high-frequency DCT coefficients
  4. Generate hash bits based on coefficient comparisons

Hamming distance between hashes determines similarity:

  • Distance 0-5: Same image (duplicate)
  • Distance 6-10: Similar image (possible rescan)
  • Distance >10: Different images

Cross-Channel Scenarios:

  1. Mobile + Branch: Mobile deposit Monday, branch presentment Wednesday
  2. Multiple Mobile: Same image uploaded to different accounts
  3. ATM + Mobile: Physical deposit at ATM, image also submitted
  4. Delayed Settlement: Original deposit delayed, user submits "replacement"

The registry maintains presentment state for each item: pending, cleared, returned, or stopped. New presentments are checked against this state in real-time.

What It Catches:

  • Intentional double presentment: Fraudulent multiple deposits
  • Accidental resubmission: Customer confusion about deposit status
  • Check kiting float exploitation: Rapid sequential presentments exploiting clearing delays
  • Deposit substitution: Different cheques presented as the same item

Real-World Example:

A customer deposits a $5,800 cheque via mobile app on Tuesday. The cheque is placed on hold pending clearing. On Thursday, the customer visits a branch and attempts to cash the same cheque, claiming "the mobile deposit didn't work." The teller system queries the presentment registry, which immediately flags the duplicate MICR and matching perceptual hash (Hamming distance: 2). The branch is alerted that the item was already deposited. The customer, confronted with evidence, admits to attempting double presentment. Real-time duplicate detection prevented a $5,800 loss.

Performance: <50ms lookup latency, 98% detection rate, <0.1% false positive rate


Layer 5: Signature/Endorsement Analysis — Authentication Verification

What It Is:

Signature and endorsement analysis provides authentication verification—confirming that the signer is authorized and endorsements are valid. This layer addresses the legal requirements for negotiable instruments while detecting forgery and unauthorized transfers.

ChequeUI combines static signature comparison with dynamic biometric analysis (when digital ink capture is available) and endorsement chain validation.

Signature Verification Pipeline:

  1. Signature Extraction: CNN-based segmentation isolates signature from background

  2. Feature Extraction: 200+ biometric characteristics captured:

    • Geometric: Aspect ratio, centroid, bounding box
    • Topological: Loop count, intersection points, end points
    • Dynamic (digital capture): Pressure, velocity, acceleration, stroke order
    • Statistical: Fourier descriptors, Zernike moments
  3. Similarity Computation: DTW (Dynamic Time Warping) for stroke comparison, Euclidean distance for static features

  4. Threshold Decision: Configurable match threshold (typically 70-80% similarity)

Endorsement Verification:

  • Payee Matching: Endorsement name vs. payee field (fuzzy matching for variations)
  • Restrictive Endorsement: Detection of "For deposit only," "For account of," etc.
  • Multiple Endorsements: Chain validation for third-party endorsements
  • Business Endorsement: Authorized signer verification for commercial accounts

Confidence Scoring:

signature_confidence = (
    0.40 × geometric_similarity +
    0.30 × topological_match +
    0.20 × dynamic_features (if available) +
    0.10 × consistency_score
)

What It Catches:

  • Forged signatures: Unauthorized signatures attempting to impersonate account holders
  • Missing endorsements: Payee checks without proper endorsement
  • Endorsement fraud: Invalid third-party endorsements, payee mismatches
  • Signature aging: Natural signature evolution requiring reference updates

Real-World Example:

A $35,000 cheque payable to a vendor is presented for deposit. All prior layers pass—valid MICR, normal ML score, clean forensics, no duplicates. However, signature analysis flags a 62% similarity score against the reference (threshold: 75%). Visual inspection by an analyst reveals subtle differences: the loop on the "y" is clockwise instead of counter-clockwise, and the baseline shows tremor patterns inconsistent with the genuine signature. Investigation reveals the vendor's mail was intercepted and the cheque was forged. Signature analysis provided the critical signal preventing a significant loss.

Performance: 85% detection of skilled forgeries, 100-500ms processing time


Signal Combination: The Multi-Modal Advantage

The power of five-layer detection isn't just having multiple methods—it's how signals combine to produce decisions more accurate than any individual layer.

Weighted Risk Scoring:

Each signal contributes to a composite risk score based on reliability and context:

SignalBase WeightAdjustment Factors
Rules0.20+0.10 for new accounts
ML0.30+0.10 for behavioral outliers
Forensics0.25Triggered only for high-value/suspicious items
Duplicate0.15Binary match (0 or 1)
Signature0.10+0.15 for high-value items

Weights are dynamically adjusted based on:

  • Transaction amount (higher amounts increase forensics/signature weight)
  • Account tenure (new accounts increase ML weight)
  • Historical performance (signals with higher accuracy get increased weight)

Decision Thresholds:

Risk ScoreActionSLA
0.00-0.30Auto-approve<200ms
0.30-0.70Review queue<5 minutes
0.70-0.90Hold pending investigation<4 hours
0.90-1.00Auto-decline + alert<200ms

Coverage Matrix: What Each Layer Catches

Fraud TypeRulesMLForensicsDuplicateSignatureCombined
Washed cheques✅ (94%)⚠️✅ (96%)
Counterfeits⚠️⚠️✅ (95%)
Double presentment⚠️⚠️✅ (98%)✅ (99%)
Forgery⚠️✅ (85%)✅ (91%)
Account takeover⚠️⚠️✅ (93%)
Velocity attacks⚠️✅ (97%)
First-party fraud⚠️✅ (78%)
Check kiting⚠️✅ (89%)

Legend: ✅ Strong detection (>85%), ⚠️ Partial detection (50-85%), ❌ No detection

Key Insight: No single layer provides comprehensive coverage. The combined system catches 96%+ of fraud while maintaining false positive rates under 7%.


Attack Type 1: Washed Cheques

Washed cheque fraud represents one of the most insidious forms of payment fraud facing financial institutions today. Unlike counterfeit cheques that are entirely fabricated, or forged signatures that require artistic skill, cheque washing exploits the very authenticity of genuine banking instruments—making it exceptionally difficult to detect through traditional means.

The Attack Explained

What is Cheque Washing?

Cheque washing is a sophisticated chemical alteration technique where fraudsters remove handwritten information from legitimate cheques while preserving the original paper stock, security features, and Magnetic Ink Character Recognition (MICR) encoding. The "washed" cheque becomes a blank canvas for criminals to rewrite with new payee names, significantly inflated amounts, or altered dates—transforming a $100 payment into a $10,000 theft using the victim's own authentic banking instrument.

How Fraudsters Obtain Cheques:

The supply chain for washed cheques typically begins with organized mail theft. Criminals target:

  • Residential mailboxes during bill-paying periods (early month, late month)
  • Outgoing mail from businesses, particularly those in shared office buildings
  • Blue collection boxes at high-traffic locations, often using stolen postal keys
  • Corporate mailrooms with insufficient security protocols
  • Home mail slots accessible through fishing techniques using adhesive-coated rods

The United States Postal Inspection Service reports that mail theft incidents have increased by over 150% since 2021, with cheque fraud being the primary motivation behind organized theft rings.

The Washing Process:

Once obtained, cheques undergo chemical treatment in makeshift "washing labs." Fraudsters employ various solvents to dissolve ink while preserving the cheque substrate:

SolventEffectivenessDetection Risk
AcetoneHigh—dissolves most ballpoint and gel inksLeaves UV-detectable residue
Household BleachModerate—effective on water-based inksCauses paper fiber degradation
Brake FluidHigh—aggressive solvent for stubborn inksLeaves oily residue
Rubbing AlcoholModerate—safer for paper preservationLess effective on permanent inks

The process involves submerging the cheque in solvent baths, gently agitating to lift ink, and carefully drying between treatments. Experienced "washers" can complete this in 30–60 minutes, producing a cheque that appears nearly pristine to casual inspection.

Why Washed Cheques Are Dangerous:

The threat lies in their paradoxical authenticity:

  • Genuine paper stock: The cheque retains original security paper with watermarks and microprinting intact
  • Valid MICR encoding: Routing and account numbers remain unaltered and machine-readable
  • Authentic signatures: Often preserved when only amount and payee are targeted
  • Bank-vetted instruments: Pass initial automated validation because they are real cheques

Traditional systems flag counterfeit MICR lines or suspicious paper—washed cheques pass these checks because they're genuine instruments simply "edited" through chemical means.

Real-World Impact

Statistics on Mail Theft and Washing:

  • $815 million in reported cheque fraud losses in 2023 (up from $385 million in 2018)
  • 68% of businesses report experiencing cheque fraud attempts annually
  • $18,400 average loss per washed cheque incident
  • Only 23% of washed cheques are detected before clearing

Case Example (Anonymized):

A mid-sized property management company in Texas mailed 47 rent payment cheques totaling $89,000. Thieves intercepted the outgoing mail, washed 34 cheques, and rewrote them to shell companies with amounts from $5,000 to $25,000. The fraudulent cheques cleared over three days before the first vendor reported non-payment. Total loss: $412,000—nearly five times the original values. The fraud was discovered not by bank systems, but by a vendor inquiry.

Detection Methods

Color Channel Analysis (RGB Examination):

Advanced imaging systems deconstruct cheque scans into individual RGB color channels to reveal alterations invisible in standard views:

  • Blue channel enhancement: Blue and black inks respond differently to blue spectrum analysis, revealing where original handwriting was removed
  • Red channel analysis: Security features and certain ink types fluoresce differently, exposing chemical treatment areas
  • Channel subtraction: Comparing RGB values identifies ink inconsistencies between fields

Solvents leave microscopic residue patterns that alter how paper reflects light—revealing "ghost images" of original writing.

Texture Analysis (Paper Fiber Disruption):

Chemical washing damages paper structure at the microscopic level:

  • Fiber disruption: Solvents cause cellulose fibers to swell and separate
  • Surface roughness mapping: High-resolution scanning measures micro-variations in paper topography
  • Edge detection algorithms: Identify areas where chemical exposure altered paper density

ChequeUI's texture analysis employs 600+ DPI scanning with convolutional neural networks trained on washed samples to identify the subtle "fuzzing" characteristic of chemical treatment.

UV Fluorescence (Security Features):

Security papers contain fluorescent elements that respond predictably to ultraviolet light:

  • Chemical alteration exposure: Solvents degrade or displace fluorescent security fibers
  • Pattern disruption: UV-reactive threads show discontinuities where washing occurred
  • Residue fluorescence: Certain solvents leave compounds that fluoresce abnormally

UV analysis often reveals the type of solvent used based on fluorescence signatures.

Ink Penetration Analysis:

Original handwritten ink penetrates paper fibers differently than ink applied to washed surfaces:

  • Cross-section analysis: Multi-spectral imaging reveals ink penetration depth
  • Feathering patterns: Genuine ink shows characteristic fiber-feathering; replacement ink behaves differently on treated paper
  • Drying signature: Original ink bonds with paper fibers; replacement ink sits more superficially

How ChequeUI Catches Them:

ChequeUI's multi-layered AI detection targets washed cheque indicators:

  1. Pre-processing analysis: RGB channel decomposition identifies ghost images and residue patterns
  2. Texture neural networks: Deep learning models detect fiber disruption signatures
  3. Ink consistency scoring: Algorithmic comparison of ink properties across fields
  4. UV fluorescence validation: Automated analysis of security feature integrity
  5. Behavioral anomaly detection: Flagging unusual amounts/payees against account history

Our system processes each cheque through 147 distinct fraud indicators in under 2 seconds, achieving a 96.7% detection rate for washed cheques while maintaining false positive rates below 0.5%. When washing is suspected, ChequeUI generates detailed forensic reports documenting specific indicators—providing evidence packages for law enforcement and fraud investigation teams.


Attack Type 2: Double Presentment

Double presentment fraud exploits the gap between deposit channels—the same cheque deposited multiple times through different pathways before the first deposit clears. As mobile deposit adoption surges, this attack vector is growing exponentially.

How Double Presentment Works

The Attack Scenario:

  1. A fraudster (or legitimate customer) deposits a cheque via mobile app
  2. The funds are placed on hold pending clearing
  3. Before the hold clears, the perpetrator visits a branch or ATM
  4. They claim the "mobile deposit didn't work" or "I need the cash now"
  5. The branch teller, seeing no evidence of the mobile deposit, processes the transaction
  6. The same cheque now exists in two places simultaneously

Cross-Channel Exploitation:

Channel CombinationRisk LevelDetection Challenge
Mobile + BranchCriticalDifferent systems, no real-time sync
Mobile + ATMHighATM automation limits verification
Branch + BranchModerateSame system usually catches it
Mobile App (Multiple)HighDifferent accounts or timing delays

Without centralized visibility, each channel operates as an information silo. The branch doesn't know about the mobile deposit. The mobile app doesn't know about the branch visit. The fraudster exploits this gap.

The Growing Threat

Double presentment fraud has grown 85% since 2020, driven by:

  • Mobile deposit adoption: 87% of banks now offer mobile deposit
  • Processing delays: Mobile deposits often show "pending" for 1-2 business days
  • Customer confusion: Legitimate customers occasionally deposit twice by accident, normalizing the behavior
  • Channel silos: Legacy systems don't share presentment data in real-time

Average loss per incident: $8,200

ChequeUI's Duplicate Detection

Centralized Presentment Registry:

ChequeUI maintains a real-time registry of all cheque presentments across every channel. When a cheque is presented—regardless of where—the system checks:

  1. MICR Match: Has this routing/account/check number combination been presented before?
  2. Image Fingerprint: Does the perceptual hash match a previous deposit?
  3. Presentment State: Is the previous deposit still pending, cleared, or returned?

Perceptual Hashing Technology:

Even if a fraudster takes a new photo of the same physical cheque, ChequeUI's perceptual hashing identifies the match:

Image 1 (Mobile Deposit)     Image 2 (Branch Presentment)
       ↓                              ↓
   pHash: 0xA7F3...              pHash: 0xA7F3...
       ↓                              ↓
   ┌───────────────────────────────────────┐
   │     Hamming Distance Calculation      │
   │         Distance: 2 bits              │
   │    Threshold: <5 = DUPLICATE          │
   └───────────────────────────────────────┘
              ↓
     ALERT: Double Presentment

Real-Time Response:

When duplicate presentment is detected, the system responds instantly:

  • Branch Teller Alert: "This cheque was deposited via mobile app on [date]. Current status: [pending/cleared]."
  • Mobile App Notification: "This cheque has already been presented at a branch location."
  • Investigation Flag: High-confidence fraud alerts route to fraud team immediately

Performance: <50ms lookup latency, 98% detection rate, <0.1% false positive rate

Real-World Detection Example

A customer deposits a $5,800 cheque via mobile app on Tuesday. The cheque is placed on hold pending clearing. On Thursday, the customer visits a branch and attempts to cash the same cheque, claiming "the mobile deposit didn't work."

The teller system queries the presentment registry, which immediately flags:

  • Duplicate MICR: Routing 123456789 / Account 987654321 / Check #0001
  • Matching perceptual hash: Hamming distance 2 (same image)
  • Original deposit: Tuesday 2:34 PM via iOS mobile app
  • Current status: Pending clearing

The branch is alerted that the item was already deposited. The customer, confronted with evidence, admits to attempting double presentment. Real-time duplicate detection prevented a $5,800 loss.


Attack Type 3: Counterfeit Cheques

Counterfeit cheques represent one of the most insidious threats in financial fraud—a sophisticated attack vector where fraudsters create high-quality replicas of legitimate cheques using stolen account information. Unlike traditional cheque fraud that alters existing documents, counterfeits are entirely fabricated instruments designed to deceive both human tellers and automated processing systems.

The Counterfeit Supply Chain

The sophistication of modern counterfeit operations has increased dramatically with the democratization of digital printing technology. High-resolution scanners, professional-grade laser printers, and advanced graphic design software—once accessible only to commercial printers—are now available to organized fraud rings.

These groups operate with assembly-line efficiency:

  • Data acquisition: Obtaining valid account numbers from stolen mail, compromised accounts, or cybercriminal marketplaces
  • Template creation: Researching target institution's cheque designs, security features, and MICR encoding standards
  • Production: Manufacturing counterfeits that replicate visual appearance, magnetic characteristics, and physical properties
  • Distribution: Money mules place fraudulent cheques into circulation

Volume Potential: A single compromised business account can spawn hundreds or thousands of counterfeit cheques, each bearing valid account credentials but created without the account holder's knowledge.

Why Counterfeits Fool Traditional Systems

Valid MICR Lines:

Magnetic Ink Character Recognition (MICR) encoding was once a reliable security feature because specialized magnetic toner was difficult to obtain. Today's counterfeiters purchase MICR-capable printers and magnetic ink cartridges through standard commercial channels. The resulting MICR lines read perfectly on magnetic scanners, passing the primary automated validation check.

Professional Printing Quality:

Modern laser printers achieve resolutions of 2400 DPI or higher, capable of reproducing fine details, microprinting, and complex background patterns with remarkable fidelity. Combined with high-quality cheque stock, the visual distinction between genuine and counterfeit becomes nearly imperceptible to casual inspection.

Copied Security Features:

Watermarks, security threads, and holographic elements—once considered tamper-proof—are now routinely copied using advanced techniques. While imperfect under expert examination, these copies often satisfy the quick verification performed at point-of-sale or remote deposit capture.

Human Inspection Limitations:

Bank staff and merchants face time pressures and volume demands that preclude thorough examination of every cheque. Training gaps mean that frontline personnel often lack the expertise to identify subtle inconsistencies.

Detection Techniques

Font Analysis:

Typography consistency analysis examines minute details that counterfeiters struggle to replicate:

  • Kerning consistency: The precise spacing between letter pairs, which counterfeit templates often generalize
  • Font metrics: Character height, width, and ascender/descender proportions
  • Rasterization patterns: How fonts convert to printer dots reveals differences between original offset printing and counterfeit laser reproduction

Printing Analysis:

The method of printing leaves distinctive signatures:

  • Inkjet detection: Characteristic dot patterns and ink bleeding different from laser toner adhesion
  • DPI analysis: Counterfeit printers often cannot match genuine cheque production resolution
  • Toner distribution: Laser printing leaves specific toner particle patterns that vary by printer manufacturer

Security Feature Verification:

Automated verification using specialized imaging:

  • Watermark authentication: Transmissive lighting reveals genuine watermarks as three-dimensional features; counterfeits show printed simulations lacking depth
  • Microprinting examination: High-magnification imaging verifies legibility of microprinted text that becomes blurred when photocopied
  • Hologram analysis: Genuine holograms exhibit dynamic optical properties; counterfeits remain static

Paper Analysis:

The substrate itself provides crucial indicators:

  • Fiber composition: Genuine security paper contains specific wood pulp, cotton, and synthetic fiber blends
  • Weight and thickness: Precise measurement of paper grammage identifies substitutions
  • Texture mapping: Surface roughness analysis detects differences in paper finishing

ML Pattern Recognition:

Machine learning models trained on large datasets identify subtle patterns:

  • Behavioral signatures: Counterfeits from the same production source share microscopic similarities
  • Anomaly detection: Neural networks flag instruments deviating from genuine cheque production norms
  • Cross-channel correlation: Geographic patterns, timing anomalies, and account behaviors suggesting fraud

Image Forensics in Detail

Edge Detection for Tampering:

Advanced algorithms analyze boundaries between image regions to identify manipulation. Splicing—combining portions of genuine cheques with fraudulent elements—creates detectable discontinuities in noise patterns, compression artifacts, and color consistency.

Noise Pattern Analysis:

Every digital image contains noise following predictable statistical distributions. When counterfeits combine multiple source images, noise patterns become inconsistent. Forensic tools measure local noise variance to identify anomalies.

Metadata Examination:

Digital images retain embedded metadata (EXIF data) recording capture parameters, device information, and processing history:

  • Discrepancies between claimed capture time and actual timestamp
  • Device model mismatches with stated deposit method
  • Editing software signatures indicating post-capture modification
  • Compression history suggesting multiple generation loss

Compression Artifact Analysis:

Lossy compression algorithms leave characteristic artifacts. Each generation introduces additional artifacts. Forensic tools analyze these patterns to estimate generation count—genuine original captures show minimal artifacts, while multi-generation counterfeits exhibit accumulated distortion.

Real-World Detection Results

Financial institutions implementing comprehensive counterfeit detection report detection rate improvements from 67% to over 95% using advanced forensic and machine learning techniques.

False Positive Management:

Effective systems employ tiered review processes where initial algorithmic flags undergo secondary analysis. Machine learning models use cost-sensitive learning that weights false negatives (missed counterfeits) more heavily than false positives.

Alert Prioritization:

Risk scoring algorithms prioritize alerts based on detection confidence scores, transaction amounts, account history, and current threat intelligence. Dynamic threshold adjustment responds to emerging fraud patterns.

Reduced counterfeit success rates deter fraud rings from targeting protected institutions, creating a protective effect where fraud activity migrates toward less-defended targets.


Proven Results: Regional Bank Case Study

"In three years with our old system, we never caught a fraud ring this sophisticated. ChequeUI flagged it in the first week." — Maria Chen, Chief Risk Officer, Midwest Community Bank

The Challenge: A Perfect Storm of Fraud and Frustration

By late 2022, Midwest Community Bank was facing a crisis that would be familiar to any regional banking executive. The $12 billion institution, with 150 branches across four Midwestern states, had built its reputation on personalized service and community trust over 87 years. But their fraud detection infrastructure was stuck in the past—and criminals had noticed.

The Numbers Tell the Story

In 2022 alone, the bank lost $3.3 million to check fraud, a 34% increase from the previous year. The fraud landscape had evolved rapidly. Organized crime rings were exploiting the bank's aging rule-based detection system with increasingly sophisticated schemes:

  • Counterfeit business checks targeting commercial accounts, with fraudsters creating near-perfect replicas using high-quality scanners and specialized paper
  • Altered payee schemes where legitimate cheques were chemically washed and re-written for thousands more than the original amount
  • Mobile deposit fraud exploiting the surge in remote banking adoption, with the same cheque being deposited multiple times across different institutions
  • New account fraud where synthetic identities opened accounts specifically to kite cheques through the clearing system

"We were playing whack-a-mole," recalls Maria Chen, who joined as Chief Risk Officer in 2021. "Every time we added a new rule to catch one scheme, the fraudsters would pivot to something else. Our detection rate was 71%, which sounds decent until you realize that meant nearly 30% of fraud was slipping through—and we were only catching things after the money was gone."

Operational Nightmares

The pain wasn't limited to direct financial losses. The bank's fraud investigation team of 23 analysts was drowning in false positives—12% of all alerts were false alarms. Each alert required manual review, averaging 45 minutes per case. During peak periods, investigators were working 60-hour weeks just to keep up with the backlog.

Branch managers were frustrated too. Legitimate customers were having cheques held for extended periods while the back office scrambled to verify authenticity. Customer satisfaction scores in fraud-related interactions had dropped to 62%, and the bank was seeing elevated account closure rates among small business customers who couldn't afford payment delays.

Regulatory Pressure Mounts

Following a routine examination in early 2022, the OCC issued a Matters Requiring Attention (MRA) citing "deficiencies in fraud detection capabilities and suspicious activity monitoring." The bank faced the prospect of formal enforcement action if improvements weren't demonstrated within 18 months.

"We knew we needed to modernize, but we were concerned about disruption," Chen explains. "We're a relationship bank. Our customers expect to walk into any of our 150 branches and have the teller know their name. We couldn't afford a system that would create friction or slow down our operations."

The Decision: Finding the Right Partner

Midwest Community Bank's vendor evaluation process began in March 2022. Chen assembled a cross-functional team including representatives from fraud operations, IT, compliance, retail banking, and finance. Their evaluation criteria were specific and demanding:

  1. Proven detection performance with measurable accuracy improvements
  2. Explainable AI that could provide clear reasoning for alerts (critical for regulatory defense)
  3. Rapid integration with their existing Fiserv DNA core banking system and image capture infrastructure
  4. Intuitive user interface that wouldn't require extensive retraining
  5. Scalable architecture to grow with the bank
  6. Strong vendor partnership with responsive support and industry expertise

After evaluating six vendors through a 90-day process including proof-of-concept testing, ChequeUI emerged as the clear choice. "What distinguished ChequeUI was the sophistication of their machine learning models combined with practical banking expertise," says David Park, the bank's SVP of Technology. "Other vendors had flashy demos, but ChequeUI understood the operational realities of a 150-branch network. They could articulate exactly how their system would fit into our existing workflows."

Implementation: A Methodical Transformation

The implementation launched in August 2022, structured in three distinct phases:

Phase 1: Foundation (Months 1-2)

ChequeUI's technical team worked alongside Midwest's IT staff to establish secure data connectivity. Rather than requiring a "rip and replace" of existing infrastructure, ChequeUI deployed alongside the legacy system in shadow mode, processing transactions in parallel without interrupting operations.

"The integration was smoother than we anticipated," Park notes. "ChequeUI's API-first architecture meant we could connect to our Fiserv DNA core and our branch capture systems without custom coding."

Phase 2: Pilot Deployment (Months 3-4)

In October 2022, ChequeUI went live across 15 branches in the bank's home market. This controlled rollout allowed the fraud operations team to validate detection accuracy and fine-tune alert thresholds.

"Our investigators were skeptical at first," Chen admits. "They'd been burned by false promises before. But within two weeks, they were asking why we couldn't roll it out faster. The quality of the alerts was night and day."

Phase 3: Enterprise Rollout (Months 5-6)

By December 2022, ChequeUI was operational across all 150 branches. The cutover from the legacy system happened over a single weekend, with zero downtime.

A critical moment came in the third week of full deployment. ChequeUI flagged a series of business cheques totaling $127,000 that had passed through the old system without notice. Upon investigation, the fraud team discovered a sophisticated counterfeit ring targeting 23 commercial accounts. The cheques were high-quality forgeries using stolen account information purchased on the dark web.

"That was our 'aha' moment," Chen says. "In three years with our old system, we never caught a fraud ring this sophisticated. ChequeUI flagged it in the first week. We were able to stop payment on all but one cheque before they cleared. That single detection paid for half the annual platform cost."

The Results: Transformation by the Numbers

Twelve months after full deployment, the impact is undeniable:

MetricBeforeAfterImprovement
Annual Fraud Losses$3.3M$891K73% reduction
Detection Rate71%96%+25 percentage points
False Positive Rate12%7%42% reduction
Average Alert Review Time45 min12 min73% faster
Payback Period4.2 monthsUnder 5 months

Operational Excellence

The fraud investigation team has been transformed. False positives have dropped by nearly half, freeing investigators to focus on genuine threats. Alert review time has fallen from 45 minutes to 12 minutes on average, meaning the team can handle three times the volume without adding headcount.

"Morale has completely changed," says Jennifer Walsh, Senior Fraud Investigator who has been with the bank for 8 years. "We used to spend our days chasing ghosts—alerts that turned out to be legitimate transactions. Now when an alert comes in, we know there's a real issue to investigate. We're actually catching bad guys instead of apologizing to good customers for holding their cheques."

Customer Experience

The reduction in false positives has directly improved customer experience. Cheque holds for "further review" have decreased by 68%. Customer satisfaction scores for fraud-related interactions have rebounded to 87%, and the bank has seen a notable reduction in account closures among business customers.

Regulatory Victory

The OCC returned for a follow-up examination in mid-2023. The MRA was lifted without findings. Examiners specifically noted the sophistication of the bank's transaction monitoring and the quality of case documentation generated by ChequeUI's explainable AI.

"The regulators were impressed that we could show them exactly why the system flagged each suspicious item," Chen says. "The audit trail is bulletproof. Every decision is documented with clear reasoning and supporting evidence."

Voice of the Leader

"I remember the exact moment I knew we'd made the right decision. It was 9:47 AM on a Tuesday in December—I'll never forget because I was in the middle of our weekly risk committee meeting. An alert came through on my phone: ChequeUI had flagged a $42,000 cashier's cheque at our downtown branch. The payee name had microscopic alterations that were invisible to the naked eye. Our old system never would have caught it.

"I walked to the window and watched our teller calmly verify the customer's ID while the branch manager called the business that supposedly issued the cheque. It was counterfeit—a sophisticated forgery of a local manufacturer's cheques that had been circulating for weeks. The customer was attempting to open a new account and immediately wire the funds overseas.

"We stopped a $42,000 loss in real-time. The customer was arrested—the first arrest in a three-month investigation that eventually uncovered a $2.4 million counterfeit ring operating across six states. Our old system processed 340 cheques from that same fraud ring over the previous year without flagging a single one.

"That Tuesday morning changed everything for me. I went from cautiously optimistic to a true believer. This technology doesn't just protect our bank—it protects our entire community from criminals who think they can exploit our trust." — Maria Chen, Chief Risk Officer, Midwest Community Bank


Technology & Integration

Integration Architecture

ChequeUI provides a flexible, multi-layered architecture designed to integrate seamlessly with existing banking infrastructure while maintaining the highest security standards.

RESTful API Design:

Our RESTful API follows industry best practices with predictable resource-oriented URLs, standard HTTP verbs, and consistent JSON payloads.

  • Production: https://api.chequedb.com/v1
  • Sandbox: https://sandbox-api.chequedb.com/v1

Key Design Principles:

  • Idempotency: All POST requests support idempotency keys to prevent duplicate processing
  • Versioning: URL-based versioning ensures backward compatibility
  • Pagination: Cursor-based pagination with next_cursor and previous_cursor
  • Filtering: Standard query parameters

Core Banking Integration

ChequeUI integrates with all major core banking platforms through native connectors and middleware adapters.

Core Banking SystemIntegration Method
Fiserv (DNA, Premier, Cleartouch)Native Connector 3.2.1
FIS (Horizon, Profile, MISER)Native Connector 3.2.1
Jack Henry (SilverLake, Symitar)Native Connector 3.1.0
Temenos T24 / TransactNative Connector 3.2.0
FinacleREST API Adapter 2.8.0
Custom Core SystemsGeneric REST/SOAP

API Specifications

Authentication:

# API Key Authentication
curl -X GET https://api.chequedb.com/v1/cheques \
  -H "Authorization: Bearer ch_live_1234567890abcdef"

# OAuth 2.0
curl -X POST https://auth.chequedb.com/oauth/token \
  -d "grant_type=client_credentials" \
  -d "client_id=YOUR_CLIENT_ID" \
  -d "client_secret=YOUR_CLIENT_SECRET" \
  -d "scope=cheques:read cheques:write"

Rate Limiting:

PlanRequests/MinuteBurst Capacity
Starter100150
Professional1,0001,500
Enterprise10,000+Custom

Standard Response Format:

{
  "id": "chq_2vX9kLmN3pQr5sTu",
  "status": "processing",
  "amount": 1250.00,
  "currency": "USD",
  "extracted_data": {
    "micr": "123456789 987654321 0001",
    "micr_confidence": 0.998,
    "amount": 1250.00,
    "payee": "ACME Corporation"
  },
  "fraud_analysis": {
    "score": 0.02,
    "risk_level": "low",
    "signals": {
      "rules": { "triggered": [], "score": 0.05 },
      "ml": { "anomaly_score": 0.12 },
      "forensics": { "tampering_probability": 0.03 },
      "duplicate": { "match": false },
      "signature": { "confidence": 0.94 }
    }
  },
  "explainability": [
    "MICR validation passed",
    "No behavioral anomalies detected",
    "Image forensics clean"
  ],
  "created_at": "2024-01-15T10:30:00Z"
}

Deployment Options

Cloud (SaaS):

Fully managed with automatic scaling, updates, and 99.9% uptime SLA. Available in US East, US West, EU West, EU Central, and APAC regions.

  • Automatic scaling, zero-downtime deployments
  • Daily automated backups (30-day retention)
  • Cross-region failover (Enterprise)
  • SOC 2 Type II certified infrastructure

On-Premise:

Deploy within your data center for complete control.

Minimum Requirements:
  Kubernetes: 1.25+ with 8 worker nodes
  CPU: 32 cores total
  Memory: 128 GB RAM
  Storage: 2 TB SSD (NVMe recommended)
  GPU: NVIDIA T4 or V100 (2x) for ML inference

Hybrid:

Process sensitive operations on-premise while leveraging cloud scalability. On-premise handles image ingestion, OCR, and signature verification; cloud handles model training and analytics.

Air-Gapped Environments:

Fully offline operation with manual update packages, local ML training, isolated signature database, and no external network dependencies.

Security Specifications

CertificationStatus
SOC 2 Type IICertified
PCI DSS Level 1Certified
ISO 27001Certified
GDPRCompliant
CCPACompliant

Encryption:

  • In Transit: TLS 1.3 (TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256)
  • At Rest: AES-256 with transparent data encryption
  • Key Management: HSM-backed (Thales Luna, AWS CloudHSM, Azure Dedicated HSM)

Performance SLAs

OperationAverageP95P99
Cheque Submission150ms250ms400ms
OCR Extraction800ms1,200ms2,000ms
Fraud Scoring200ms350ms500ms
Signature Verification300ms500ms800ms
PlanUptime SLAMonthly Downtime
Starter99.9%43 minutes
Professional99.95%21 minutes
Enterprise99.99%4 minutes

Frequently Asked Questions

Platform Differentiation

How is this different from our current fraud system?

Most legacy fraud systems rely on static rules and manual threshold adjustments that require weeks to update. Our platform uses adaptive machine learning models that analyze thousands of behavioral signals in real-time, updating risk scores within milliseconds of transaction initiation.

Unlike rule-based systems that generate predictable patterns fraudsters can exploit, our AI continuously learns from new attack vectors across our entire client network. When one bank encounters a novel fraud scheme, all institutions in our ecosystem benefit from updated detection capabilities within 24 hours.

Clients typically see a 40-60% reduction in fraud losses within the first quarter while decreasing false positives by 35% compared to their previous systems.

Will this create a lot of false positives?

False positive reduction is core to our platform design. Our system achieves industry-leading precision through ensemble modeling that weighs transaction patterns, device fingerprints, behavioral biometrics, and consortium data. Current clients experience false positive rates between 0.3% and 0.8%, compared to the industry average of 2-3% for traditional systems.

We employ a graduated response system rather than binary approve/decline decisions. Low-risk anomalies trigger step-up authentication; only high-confidence fraud signals block transactions. This approach reduced customer friction by 52% for a top-20 US bank while maintaining sub-0.5% fraud rates.

Implementation & Integration

How long does implementation take?

Standard implementation timelines range from 8-12 weeks for API-based integration, with pilot programs launching in as little as 4 weeks for cloud-native environments.

  • Phase 1 (Weeks 1-3): Technical architecture review, data pipeline establishment
  • Phase 2 (Weeks 4-7): Model training, threshold calibration, parallel testing
  • Phase 3 (Weeks 8-10): Pilot deployment with full analyst training
  • Phase 4 (Weeks 11-12): Full production rollout

For institutions requiring on-premise deployment, add 2-4 weeks for hardware provisioning.

Do we need to replace our core banking system?

No. Our platform is designed as a complementary layer that integrates with existing core banking infrastructure through RESTful APIs, message queues, or batch file processing. We maintain certified connectors for all major core systems including FIS, Fiserv, Jack Henry, and Temenos.

What integrations are supported?

We maintain native integrations with 150+ banking and fraud prevention platforms including SWIFT, Visa VAMP, Mastercard Safety Net, Plaid, Alloy, and major SIEM solutions. Custom integrations are supported through our Integration Toolkit with SDKs for Java, Python, .NET, and Node.js.

Compliance & Security

What about regulatory compliance?

Our platform is designed to meet regulatory requirements across major jurisdictions including GDPR, CCPA, PCI DSS Level 1, SOC 2 Type II, and ISO 27001. We maintain specific compliance certifications for financial services including FFIEC guidelines and AML/CFT frameworks.

Model governance features include automated bias detection, explainability reporting, and fairness monitoring required by emerging AI regulations like the EU AI Act. All decision logic is auditable with full lineage tracking.

How do you ensure audit trail integrity?

Every decision, model update, and user action is captured in an immutable audit log using blockchain-verified timestamps and cryptographic hashing. This creates tamper-evident records that satisfy regulatory examination requirements.

Audit trails include complete decision rationale—why a transaction was flagged, which signals contributed to the risk score, model version used, and analyst actions taken. Data retention is configurable with standard retention of 7 years for fraud investigation records.

How is customer data protected?

Data security employs defense-in-depth architecture with AES-256 encryption at rest and TLS 1.3 in transit. Customer PII is tokenized upon ingestion with cryptographic segmentation ensuring no single system holds complete customer profiles.

Access controls follow zero-trust principles with role-based permissions, multi-factor authentication, and just-in-time privileged access. We carry $50 million in cyber liability insurance and have maintained zero data breaches across our client base since platform inception.

Performance & Reliability

What happens during system downtime?

Our infrastructure operates with 99.99% uptime SLA backed by financial penalties. The architecture uses active-active multi-region deployment with automatic failover completing within 30 seconds of detecting regional degradation.

For extreme scenarios where connectivity is lost, we provide local caching of risk models that continues operating in degraded mode for up to 72 hours. Transactions default to your existing risk parameters rather than failing open or closed.

How do you handle model drift?

Model performance is monitored continuously through automated drift detection algorithms. When drift exceeds configurable thresholds, the system alerts your model risk team and initiates automatic retraining workflows.

We deploy ensemble models that combine stable baseline algorithms with rapidly adapting components. Our models typically maintain >95% of initial accuracy for 12-18 months between major retraining cycles.

How do you protect against adversarial attacks?

Our defense architecture includes multiple layers specifically designed to counter adversarial machine learning techniques. Model extraction attempts are detected through API call pattern analysis. We employ adversarial training during model development, exposing algorithms to millions of synthetic attack variations.

The platform includes behavioral honeypots—synthetic transaction patterns that appear vulnerable but trigger immediate detection when targeted. When adversarial patterns are identified, we deploy countermeasures across our client network within hours.

Operations & Customization

What image quality do we need?

For document verification, we accept images with minimum 150 DPI resolution, though 300+ DPI is recommended. Supported formats include JPEG, PNG, TIFF, and PDF with file sizes up to 10MB.

Our preprocessing pipeline enhances image quality through automatic deskewing, lighting correction, and noise reduction. Our system successfully processes 94% of mobile-submitted documents without requiring resubmission.

Can we customize the risk scoring?

Yes. Our platform supports hierarchical customization from global thresholds down to individual transaction parameters. You can define custom risk rules that override or supplement machine learning scores, create segment-specific models for different customer types, and configure approval workflows based on risk bands.

The rule engine supports complex logic including velocity checks, geofencing, merchant category restrictions, and cross-channel correlation.

Business Value

How does the pricing model work?

Pricing follows a usage-based SaaS model with two components: a platform fee based on transaction volume tiers and a per-decision API call charge. Volume tiers start at 100,000 monthly transactions with unlimited scaling.

Typical mid-market banks (1-5 million monthly transactions) invest $150,000-$400,000 annually, while enterprise institutions see per-transaction costs below $0.002. We offer pilot pricing with 90-day out clauses to validate ROI before long-term commitment.

What is the typical ROI timeline?

Clients typically achieve positive ROI within 4-6 months of full deployment. Full ROI realization occurs within 9-12 months, with annual returns ranging from 300% to 800% depending on baseline fraud rates and transaction volumes.

What training is provided for your staff?

Comprehensive training programs ensure your team maximizes platform capabilities. Initial training includes 16 hours of instructor-led sessions covering platform navigation, investigation workflows, model interpretation, and threshold management.

Role-specific curricula serve fraud analysts, investigators, risk managers, and technical administrators. Ongoing enablement includes monthly feature webinars, quarterly best practice workshops, and access to our knowledge base with 200+ articles and video tutorials.


Ready to Stop Sophisticated Cheque Fraud?

Join banks that have reduced fraud losses by 73% with multi-layer detection.

See It In Action

Request a Personalized Demo:

See how ChequeUI would perform with your specific fraud patterns:

  1. Share historical data (securely, under NDA)
  2. We run analysis on your actual fraud cases
  3. See detection rates for your attack types
  4. Review integration approach for your tech stack

Request Your Demo Now →

Or Schedule a 15-Minute Introduction

Quick call to discuss your fraud challenges and see if multi-layer detection is right for you.

Schedule a Call →


Call us: 1-800-CHEQUEUI
Email: sales@chequeui.com
Technical Questions: integrate@chequedb.com


About ChequeUI

ChequeUI provides AI-powered cheque processing and fraud detection infrastructure for banks, credit unions, and fintechs. Our multi-layer detection platform processes millions of transactions monthly while maintaining the auditability and security standards financial institutions require.

Certifications: SOC 2 Type II | PCI DSS Level 1 | ISO 27001 | GDPR Compliant


© 2026 ChequeUI, Inc. All rights reserved.
Privacy Policy | Terms of Service | Security


Turn This Into A Production Workflow

Explore implementation pages used by banks and businesses for cheque capture, MICR extraction, and end-to-end automation.

Share this article

Help others discover this content

Ready to Modernize Your Cheque Processing?

Discover how Chequedb can help you automate cheque processing, prevent fraud, and ensure compliance.