Multi-Layer Fraud Detection That Catches What Others Miss
Stop Washed Cheques, Counterfeits & Double Presentment Before They Cost You Millions
Your current fraud system is probably catching the obvious fraud. But what about the sophisticated attacks that bypass single-layer detection?
- Washed cheques that look legitimate because they are legitimate—just altered with chemicals?
- Double presentment where the same cheque is deposited via mobile and cashed at a branch?
- High-quality counterfeits that pass visual inspection and MICR validation?
Single-signal detection can't catch multi-modal attacks. You need five independent detection layers working together to catch what others miss.
Request a Demo Explore the Technology
The $28 Billion Problem: Why Single-Layer Defense Fails
Cheque fraud is exploding. The Financial Crimes Enforcement Network (FinCEN) flagged cheque fraud as the fastest-growing financial crime in 2023, with reported losses reaching $815 million—up from $385 million in 2018. Industry estimates place total actual losses closer to $28 billion annually when accounting for unreported incidents and recovery costs.
The Fraud Landscape Has Changed
Modern cheque fraud isn't amateur hour anymore. Organized crime rings operate with assembly-line efficiency, exploiting the gaps between detection systems:
| Attack Type | Growth Rate | Average Loss | Detection Challenge |
|---|---|---|---|
| Washed Cheques | +150% since 2021 | $18,400 | Passes MICR validation |
| Double Presentment | +85% since 2020 | $8,200 | Exploits channel silos |
| Counterfeit Cheques | +120% since 2019 | $12,600 | Passes visual inspection |
| Account Takeover | +95% since 2020 | $45,000 | Mimics legitimate behavior |
Why Traditional Systems Fail
Rule-based engines catch obvious violations—amount limits, velocity thresholds, blocked entities. But they can't encode every possible fraud pattern. When fraudsters pivot tactics, you're left writing new rules weeks after losses occur.
Single ML models detect behavioral anomalies, but they fail against document-based attacks. A washed cheque has valid MICR, normal account history, and genuine paper stock. Behavioral analysis alone misses it entirely.
Image forensics catches document tampering but can't identify account takeovers or coordinated fraud rings operating across multiple accounts.
The result? 71% detection rates that sound acceptable until you realize nearly 30% of fraud is slipping through—often undetected until customers report it.
The Hidden Costs
Direct fraud losses are just the beginning:
- Operational overhead: Investigation teams drowning in false positives (12% industry average)
- Customer friction: Legitimate transactions held for review, eroding trust
- Regulatory scrutiny: MRAs and enforcement actions for inadequate controls
- Reputational damage: Word travels fast when business customers suffer losses
"We were playing whack-a-mole. Every time we added a new rule to catch one scheme, the fraudsters would pivot to something else. Our detection rate was 71%, which sounds decent until you realize that meant nearly 30% of fraud was slipping through." — Maria Chen, Chief Risk Officer, Midwest Community Bank
The solution isn't more of the same. It's defense in depth.
The Five-Layer Defense System
┌─────────────────────────────────────────────────────────────────────┐
│ LAYER 5: SIGNATURE/ENDORSEMENT │
│ Biometric signature matching, endorsement chains │
├─────────────────────────────────────────────────────────────────────┤
│ LAYER 4: DUPLICATE DETECTION │
│ Perceptual hashing, cross-channel presentment prevention │
├─────────────────────────────────────────────────────────────────────┤
│ LAYER 3: IMAGE FORENSICS │
│ Color channel analysis, texture mapping, security verification │
├─────────────────────────────────────────────────────────────────────┤
│ LAYER 2: ML ANOMALY DETECTION │
│ Behavioral clustering, time-series analysis, graph networks │
├─────────────────────────────────────────────────────────────────────┤
│ LAYER 1: RULES-BASED VALIDATION │
│ Policy enforcement, velocity checks, amount limits │
└─────────────────────────────────────────────────────────────────────┘
↑
Cheque Image + Metadata
Modern cheque fraud exploits the gaps between detection systems. A rule-based engine misses washed cheques because the MICR is valid. An ML model fails on counterfeit documents it hasn't seen before. Image forensics can't catch social engineering attacks.
ChequeUI's solution is defense in depth: five independent detection layers that each measure different risk dimensions. When fraudsters evade one signal, another catches them. This architecture processes millions of transactions with sub-second latency while maintaining 96%+ detection rates.
Layer 1: Rules-Based Validation — Policy Enforcement Engine
What It Is:
The rules engine provides deterministic, policy-based fraud detection. It evaluates transactions against a library of configurable rules that encode known fraud patterns, regulatory requirements, and institutional policies.
Unlike probabilistic methods, rules produce binary outcomes with complete explainability—a critical requirement for regulatory examinations and customer disputes.
How It Works:
Rules are evaluated using a decision tree compiler that optimizes evaluation order based on frequency and computational cost. High-frequency rules (amount limits, velocity checks) execute in microseconds. Complex rules involving external data sources execute asynchronously.
| Category | Implementation | Latency |
|---|---|---|
| Amount Controls | Per-transaction caps, daily limits, velocity thresholds | <1ms |
| Temporal Rules | Stale-date detection, post-date holds, business hours | <1ms |
| MICR Validation | Routing checksum verification, account format rules | <2ms |
| List Matching | Blocked payees, high-risk merchants, OFAC screening | 5-50ms |
| Geographic | Foreign item flags, country risk scoring | 10-100ms |
Rules can be static (hard-coded policies) or dynamic (thresholds adjusted based on historical patterns). The engine supports rule chaining, where the output of one rule triggers evaluation of dependent rules.
What It Catches:
- Velocity attacks: Rapid-fire deposits intended to exploit float
- Amount-based fraud: Transactions exceeding account limits or historical patterns
- Known bad actors: Transactions involving blocked entities or suspicious accounts
- Compliance violations: Regulatory holds, OFAC sanctions, reporting thresholds
Real-World Example:
A commercial account typically deposits 3-5 cheques weekly, averaging $15,000 each. On a Monday morning, the system detects 12 deposits totaling $180,000 within a 2-hour window. The velocity rule triggers immediately, placing a hold on the account before the cheques clear. Investigation reveals stolen cheques from a mail theft ring. Rules caught the anomaly within minutes of the first deposit.
Performance: <10ms average latency, 99.99% uptime SLA
Layer 2: ML Anomaly Detection — Behavioral Pattern Recognition
What It Is:
Machine learning models analyze behavioral patterns to detect anomalies that rules cannot encode. While rules look for known bad patterns, ML identifies deviations from established good behavior—critical for catching novel attacks.
ChequeUI deploys an ensemble architecture combining multiple model types, each optimized for different anomaly classes.
Model Architecture:
| Model | Algorithm | Purpose | Latency |
|---|---|---|---|
| Behavioral Classifier | Gradient Boosted Trees | Account-level anomaly detection | 50-100ms |
| Sequence Analyzer | LSTM Neural Network | Temporal pattern recognition | 100-200ms |
| Graph Detector | Graph Neural Network | Collusion and mule account detection | 200-500ms |
| Clustering Engine | Isolation Forest | Unsupervised outlier detection | 50-150ms |
Feature Engineering:
The platform extracts 200+ features across five dimensions:
- Account History: 90-day transaction patterns, average amounts, frequency distributions
- Temporal Features: Time-of-day, day-of-week, seasonal patterns, velocity vectors
- Peer Comparison: How this account deviates from similar accounts (segment-based z-scores)
- Network Features: Shared attributes with known fraud accounts, graph centrality measures
- Channel Context: Device fingerprints, IP geolocation, browser characteristics
Ensemble Scoring:
Individual model predictions are combined using a weighted voting mechanism where weights are dynamically adjusted based on model performance for each account segment:
Final Score = Σ(Model_i_Prediction × Weight_i) / Σ(Weights)
Models are retrained weekly using incremental learning to adapt to evolving fraud patterns without requiring full retraining cycles.
What It Catches:
- Novel fraud patterns: Attacks not seen in training data that deviate from normal behavior
- Account takeover: Sudden behavioral shifts indicating compromised credentials
- First-party fraud: Legitimate account holders engaging in fraudulent activity
- Coordinated attacks: Patterns across multiple accounts indicating organized fraud
Real-World Example:
A long-standing personal account with 8 years of history suddenly deposits a $45,000 cheque payable to a construction company—unusual for this account. The ML ensemble flags multiple anomalies: amount is 15x the 90-day average, payee category (construction) never seen before, and deposit timing (Sunday evening) is atypical. Rules pass the transaction (amount under limit, valid MICR), but ML elevates the risk score to 0.82. Review reveals a counterfeit cheque using stolen account credentials. The behavioral shift detection prevented a $45,000 loss.
Performance: 94% precision on flagged anomalies, 50-200ms latency
Layer 3: Image Forensics — Document Integrity Verification
What It Is:
Image forensics applies computer vision and signal processing techniques to detect physical tampering, chemical alterations, and counterfeit documents. This layer analyzes the cheque image itself—looking beyond the encoded data to the document's physical characteristics.
ChequeUI's forensics pipeline processes multi-spectral image data when available, including visible light, UV fluorescence, and infrared reflectance captures.
Forensic Analysis Pipeline:
Input Image → Preprocessing → Feature Extraction → Anomaly Detection → Risk Score
Core Techniques:
| Technique | Method | Detection Target |
|---|---|---|
| Color Channel Analysis | RGB/CMYK decomposition, ink composition profiling | Different ink formulations indicating alteration |
| Edge Detection | Canny/Sobel operators, Hough transforms | Cut-and-paste alterations, font inconsistencies |
| Texture Analysis | Local Binary Patterns (LBP), GLCM features | Paper fiber disruption from chemical washing |
| Noise Analysis | PRNU (Photo Response Non-Uniformity) fingerprinting | Scanner/printer identification, counterfeits |
| Font Metrics | Typography analysis, kerning measurement | Font substitution, typeface mismatches |
| Security Feature Verification | Microprinting detection, watermark analysis | Counterfeit security elements |
Washed Cheque Detection:
Washed cheques present specific forensic signatures:
- Chemical residue: Altered areas show different UV fluorescence
- Paper damage: Texture analysis reveals fiber disruption (correlation values drop 15-40%)
- Ink mismatch: Original ink vs. new ink show different spectral signatures in blue/green channels
- Background pattern: Chemical washing often damages background security printing
The system computes a tampering probability score based on composite forensic indicators:
tampering_score = (
0.30 × color_anomaly_score +
0.25 × texture_deviation_score +
0.20 × edge_inconsistency_score +
0.15 × security_feature_score +
0.10 × noise_pattern_score
)
What It Catches:
- Washed cheques: Chemically altered documents with changed payees/amounts
- Counterfeit documents: High-quality fakes using different printing methods
- Cut-and-paste alterations: Physical document modifications
- Ink substitution: Field modifications using different pen types
- Scanner-induced fraud: Photocopied or scanned reproductions
Real-World Example:
A $12,500 cheque arrives for deposit. MICR validates, rules pass, ML score is normal. However, forensics triggers on color channel analysis: the payee field shows statistically different ink composition (Mahalanobis distance: 3.2σ from reference). Texture analysis reveals paper fiber disruption in the amount field (LBP correlation: 0.62 vs. 0.91 baseline). UV examination shows fluorescence anomalies consistent with chemical washing. The cheque was stolen from mail, washed with acetone, and rewritten. Forensics detection prevented a loss that would have passed all other controls.
Performance: 94% detection rate for washed cheques, 1-3 second processing time (async pipeline)
Layer 4: Duplicate Detection — Cross-Channel Presentment Prevention
What It Is:
Duplicate detection prevents double presentment—the same cheque being deposited multiple times through different channels. This is increasingly critical as mobile deposit adoption creates new vectors for duplicate submission.
ChequeUI maintains a centralized presentment registry providing real-time visibility across all deposit channels (mobile, ATM, branch, remote deposit capture).
Detection Methods:
| Method | Algorithm | Use Case |
|---|---|---|
| Perceptual Hashing | pHash (64-bit DCT-based) | Image similarity matching |
| MICR Tracking | Exact match on routing/account/check number | Same-item presentment |
| Fuzzy Matching | Levenshtein distance, phonetic algorithms | OCR error tolerance |
| Amount-Date Clustering | DBSCAN clustering | Near-duplicate detection |
Perceptual Hashing Implementation:
The system generates a 64-bit perceptual hash for each cheque image:
- Convert image to grayscale and resize to 32x32
- Apply Discrete Cosine Transform (DCT)
- Compute mean of high-frequency DCT coefficients
- Generate hash bits based on coefficient comparisons
Hamming distance between hashes determines similarity:
- Distance 0-5: Same image (duplicate)
- Distance 6-10: Similar image (possible rescan)
- Distance >10: Different images
Cross-Channel Scenarios:
- Mobile + Branch: Mobile deposit Monday, branch presentment Wednesday
- Multiple Mobile: Same image uploaded to different accounts
- ATM + Mobile: Physical deposit at ATM, image also submitted
- Delayed Settlement: Original deposit delayed, user submits "replacement"
The registry maintains presentment state for each item: pending, cleared, returned, or stopped. New presentments are checked against this state in real-time.
What It Catches:
- Intentional double presentment: Fraudulent multiple deposits
- Accidental resubmission: Customer confusion about deposit status
- Check kiting float exploitation: Rapid sequential presentments exploiting clearing delays
- Deposit substitution: Different cheques presented as the same item
Real-World Example:
A customer deposits a $5,800 cheque via mobile app on Tuesday. The cheque is placed on hold pending clearing. On Thursday, the customer visits a branch and attempts to cash the same cheque, claiming "the mobile deposit didn't work." The teller system queries the presentment registry, which immediately flags the duplicate MICR and matching perceptual hash (Hamming distance: 2). The branch is alerted that the item was already deposited. The customer, confronted with evidence, admits to attempting double presentment. Real-time duplicate detection prevented a $5,800 loss.
Performance: <50ms lookup latency, 98% detection rate, <0.1% false positive rate
Layer 5: Signature/Endorsement Analysis — Authentication Verification
What It Is:
Signature and endorsement analysis provides authentication verification—confirming that the signer is authorized and endorsements are valid. This layer addresses the legal requirements for negotiable instruments while detecting forgery and unauthorized transfers.
ChequeUI combines static signature comparison with dynamic biometric analysis (when digital ink capture is available) and endorsement chain validation.
Signature Verification Pipeline:
-
Signature Extraction: CNN-based segmentation isolates signature from background
-
Feature Extraction: 200+ biometric characteristics captured:
- Geometric: Aspect ratio, centroid, bounding box
- Topological: Loop count, intersection points, end points
- Dynamic (digital capture): Pressure, velocity, acceleration, stroke order
- Statistical: Fourier descriptors, Zernike moments
-
Similarity Computation: DTW (Dynamic Time Warping) for stroke comparison, Euclidean distance for static features
-
Threshold Decision: Configurable match threshold (typically 70-80% similarity)
Endorsement Verification:
- Payee Matching: Endorsement name vs. payee field (fuzzy matching for variations)
- Restrictive Endorsement: Detection of "For deposit only," "For account of," etc.
- Multiple Endorsements: Chain validation for third-party endorsements
- Business Endorsement: Authorized signer verification for commercial accounts
Confidence Scoring:
signature_confidence = (
0.40 × geometric_similarity +
0.30 × topological_match +
0.20 × dynamic_features (if available) +
0.10 × consistency_score
)
What It Catches:
- Forged signatures: Unauthorized signatures attempting to impersonate account holders
- Missing endorsements: Payee checks without proper endorsement
- Endorsement fraud: Invalid third-party endorsements, payee mismatches
- Signature aging: Natural signature evolution requiring reference updates
Real-World Example:
A $35,000 cheque payable to a vendor is presented for deposit. All prior layers pass—valid MICR, normal ML score, clean forensics, no duplicates. However, signature analysis flags a 62% similarity score against the reference (threshold: 75%). Visual inspection by an analyst reveals subtle differences: the loop on the "y" is clockwise instead of counter-clockwise, and the baseline shows tremor patterns inconsistent with the genuine signature. Investigation reveals the vendor's mail was intercepted and the cheque was forged. Signature analysis provided the critical signal preventing a significant loss.
Performance: 85% detection of skilled forgeries, 100-500ms processing time
Signal Combination: The Multi-Modal Advantage
The power of five-layer detection isn't just having multiple methods—it's how signals combine to produce decisions more accurate than any individual layer.
Weighted Risk Scoring:
Each signal contributes to a composite risk score based on reliability and context:
| Signal | Base Weight | Adjustment Factors |
|---|---|---|
| Rules | 0.20 | +0.10 for new accounts |
| ML | 0.30 | +0.10 for behavioral outliers |
| Forensics | 0.25 | Triggered only for high-value/suspicious items |
| Duplicate | 0.15 | Binary match (0 or 1) |
| Signature | 0.10 | +0.15 for high-value items |
Weights are dynamically adjusted based on:
- Transaction amount (higher amounts increase forensics/signature weight)
- Account tenure (new accounts increase ML weight)
- Historical performance (signals with higher accuracy get increased weight)
Decision Thresholds:
| Risk Score | Action | SLA |
|---|---|---|
| 0.00-0.30 | Auto-approve | <200ms |
| 0.30-0.70 | Review queue | <5 minutes |
| 0.70-0.90 | Hold pending investigation | <4 hours |
| 0.90-1.00 | Auto-decline + alert | <200ms |
Coverage Matrix: What Each Layer Catches
| Fraud Type | Rules | ML | Forensics | Duplicate | Signature | Combined |
|---|---|---|---|---|---|---|
| Washed cheques | ❌ | ❌ | ✅ (94%) | ❌ | ⚠️ | ✅ (96%) |
| Counterfeits | ⚠️ | ✅ | ✅ | ❌ | ⚠️ | ✅ (95%) |
| Double presentment | ⚠️ | ⚠️ | ❌ | ✅ (98%) | ❌ | ✅ (99%) |
| Forgery | ❌ | ⚠️ | ❌ | ❌ | ✅ (85%) | ✅ (91%) |
| Account takeover | ⚠️ | ✅ | ❌ | ❌ | ⚠️ | ✅ (93%) |
| Velocity attacks | ✅ | ✅ | ❌ | ⚠️ | ❌ | ✅ (97%) |
| First-party fraud | ❌ | ✅ | ❌ | ⚠️ | ❌ | ✅ (78%) |
| Check kiting | ⚠️ | ✅ | ❌ | ✅ | ❌ | ✅ (89%) |
Legend: ✅ Strong detection (>85%), ⚠️ Partial detection (50-85%), ❌ No detection
Key Insight: No single layer provides comprehensive coverage. The combined system catches 96%+ of fraud while maintaining false positive rates under 7%.
Attack Type 1: Washed Cheques
Washed cheque fraud represents one of the most insidious forms of payment fraud facing financial institutions today. Unlike counterfeit cheques that are entirely fabricated, or forged signatures that require artistic skill, cheque washing exploits the very authenticity of genuine banking instruments—making it exceptionally difficult to detect through traditional means.
The Attack Explained
What is Cheque Washing?
Cheque washing is a sophisticated chemical alteration technique where fraudsters remove handwritten information from legitimate cheques while preserving the original paper stock, security features, and Magnetic Ink Character Recognition (MICR) encoding. The "washed" cheque becomes a blank canvas for criminals to rewrite with new payee names, significantly inflated amounts, or altered dates—transforming a $100 payment into a $10,000 theft using the victim's own authentic banking instrument.
How Fraudsters Obtain Cheques:
The supply chain for washed cheques typically begins with organized mail theft. Criminals target:
- Residential mailboxes during bill-paying periods (early month, late month)
- Outgoing mail from businesses, particularly those in shared office buildings
- Blue collection boxes at high-traffic locations, often using stolen postal keys
- Corporate mailrooms with insufficient security protocols
- Home mail slots accessible through fishing techniques using adhesive-coated rods
The United States Postal Inspection Service reports that mail theft incidents have increased by over 150% since 2021, with cheque fraud being the primary motivation behind organized theft rings.
The Washing Process:
Once obtained, cheques undergo chemical treatment in makeshift "washing labs." Fraudsters employ various solvents to dissolve ink while preserving the cheque substrate:
| Solvent | Effectiveness | Detection Risk |
|---|---|---|
| Acetone | High—dissolves most ballpoint and gel inks | Leaves UV-detectable residue |
| Household Bleach | Moderate—effective on water-based inks | Causes paper fiber degradation |
| Brake Fluid | High—aggressive solvent for stubborn inks | Leaves oily residue |
| Rubbing Alcohol | Moderate—safer for paper preservation | Less effective on permanent inks |
The process involves submerging the cheque in solvent baths, gently agitating to lift ink, and carefully drying between treatments. Experienced "washers" can complete this in 30–60 minutes, producing a cheque that appears nearly pristine to casual inspection.
Why Washed Cheques Are Dangerous:
The threat lies in their paradoxical authenticity:
- Genuine paper stock: The cheque retains original security paper with watermarks and microprinting intact
- Valid MICR encoding: Routing and account numbers remain unaltered and machine-readable
- Authentic signatures: Often preserved when only amount and payee are targeted
- Bank-vetted instruments: Pass initial automated validation because they are real cheques
Traditional systems flag counterfeit MICR lines or suspicious paper—washed cheques pass these checks because they're genuine instruments simply "edited" through chemical means.
Real-World Impact
Statistics on Mail Theft and Washing:
- $815 million in reported cheque fraud losses in 2023 (up from $385 million in 2018)
- 68% of businesses report experiencing cheque fraud attempts annually
- $18,400 average loss per washed cheque incident
- Only 23% of washed cheques are detected before clearing
Case Example (Anonymized):
A mid-sized property management company in Texas mailed 47 rent payment cheques totaling $89,000. Thieves intercepted the outgoing mail, washed 34 cheques, and rewrote them to shell companies with amounts from $5,000 to $25,000. The fraudulent cheques cleared over three days before the first vendor reported non-payment. Total loss: $412,000—nearly five times the original values. The fraud was discovered not by bank systems, but by a vendor inquiry.
Detection Methods
Color Channel Analysis (RGB Examination):
Advanced imaging systems deconstruct cheque scans into individual RGB color channels to reveal alterations invisible in standard views:
- Blue channel enhancement: Blue and black inks respond differently to blue spectrum analysis, revealing where original handwriting was removed
- Red channel analysis: Security features and certain ink types fluoresce differently, exposing chemical treatment areas
- Channel subtraction: Comparing RGB values identifies ink inconsistencies between fields
Solvents leave microscopic residue patterns that alter how paper reflects light—revealing "ghost images" of original writing.
Texture Analysis (Paper Fiber Disruption):
Chemical washing damages paper structure at the microscopic level:
- Fiber disruption: Solvents cause cellulose fibers to swell and separate
- Surface roughness mapping: High-resolution scanning measures micro-variations in paper topography
- Edge detection algorithms: Identify areas where chemical exposure altered paper density
ChequeUI's texture analysis employs 600+ DPI scanning with convolutional neural networks trained on washed samples to identify the subtle "fuzzing" characteristic of chemical treatment.
UV Fluorescence (Security Features):
Security papers contain fluorescent elements that respond predictably to ultraviolet light:
- Chemical alteration exposure: Solvents degrade or displace fluorescent security fibers
- Pattern disruption: UV-reactive threads show discontinuities where washing occurred
- Residue fluorescence: Certain solvents leave compounds that fluoresce abnormally
UV analysis often reveals the type of solvent used based on fluorescence signatures.
Ink Penetration Analysis:
Original handwritten ink penetrates paper fibers differently than ink applied to washed surfaces:
- Cross-section analysis: Multi-spectral imaging reveals ink penetration depth
- Feathering patterns: Genuine ink shows characteristic fiber-feathering; replacement ink behaves differently on treated paper
- Drying signature: Original ink bonds with paper fibers; replacement ink sits more superficially
How ChequeUI Catches Them:
ChequeUI's multi-layered AI detection targets washed cheque indicators:
- Pre-processing analysis: RGB channel decomposition identifies ghost images and residue patterns
- Texture neural networks: Deep learning models detect fiber disruption signatures
- Ink consistency scoring: Algorithmic comparison of ink properties across fields
- UV fluorescence validation: Automated analysis of security feature integrity
- Behavioral anomaly detection: Flagging unusual amounts/payees against account history
Our system processes each cheque through 147 distinct fraud indicators in under 2 seconds, achieving a 96.7% detection rate for washed cheques while maintaining false positive rates below 0.5%. When washing is suspected, ChequeUI generates detailed forensic reports documenting specific indicators—providing evidence packages for law enforcement and fraud investigation teams.
Attack Type 2: Double Presentment
Double presentment fraud exploits the gap between deposit channels—the same cheque deposited multiple times through different pathways before the first deposit clears. As mobile deposit adoption surges, this attack vector is growing exponentially.
How Double Presentment Works
The Attack Scenario:
- A fraudster (or legitimate customer) deposits a cheque via mobile app
- The funds are placed on hold pending clearing
- Before the hold clears, the perpetrator visits a branch or ATM
- They claim the "mobile deposit didn't work" or "I need the cash now"
- The branch teller, seeing no evidence of the mobile deposit, processes the transaction
- The same cheque now exists in two places simultaneously
Cross-Channel Exploitation:
| Channel Combination | Risk Level | Detection Challenge |
|---|---|---|
| Mobile + Branch | Critical | Different systems, no real-time sync |
| Mobile + ATM | High | ATM automation limits verification |
| Branch + Branch | Moderate | Same system usually catches it |
| Mobile App (Multiple) | High | Different accounts or timing delays |
Without centralized visibility, each channel operates as an information silo. The branch doesn't know about the mobile deposit. The mobile app doesn't know about the branch visit. The fraudster exploits this gap.
The Growing Threat
Double presentment fraud has grown 85% since 2020, driven by:
- Mobile deposit adoption: 87% of banks now offer mobile deposit
- Processing delays: Mobile deposits often show "pending" for 1-2 business days
- Customer confusion: Legitimate customers occasionally deposit twice by accident, normalizing the behavior
- Channel silos: Legacy systems don't share presentment data in real-time
Average loss per incident: $8,200
ChequeUI's Duplicate Detection
Centralized Presentment Registry:
ChequeUI maintains a real-time registry of all cheque presentments across every channel. When a cheque is presented—regardless of where—the system checks:
- MICR Match: Has this routing/account/check number combination been presented before?
- Image Fingerprint: Does the perceptual hash match a previous deposit?
- Presentment State: Is the previous deposit still pending, cleared, or returned?
Perceptual Hashing Technology:
Even if a fraudster takes a new photo of the same physical cheque, ChequeUI's perceptual hashing identifies the match:
Image 1 (Mobile Deposit) Image 2 (Branch Presentment)
↓ ↓
pHash: 0xA7F3... pHash: 0xA7F3...
↓ ↓
┌───────────────────────────────────────┐
│ Hamming Distance Calculation │
│ Distance: 2 bits │
│ Threshold: <5 = DUPLICATE │
└───────────────────────────────────────┘
↓
ALERT: Double Presentment
Real-Time Response:
When duplicate presentment is detected, the system responds instantly:
- Branch Teller Alert: "This cheque was deposited via mobile app on [date]. Current status: [pending/cleared]."
- Mobile App Notification: "This cheque has already been presented at a branch location."
- Investigation Flag: High-confidence fraud alerts route to fraud team immediately
Performance: <50ms lookup latency, 98% detection rate, <0.1% false positive rate
Real-World Detection Example
A customer deposits a $5,800 cheque via mobile app on Tuesday. The cheque is placed on hold pending clearing. On Thursday, the customer visits a branch and attempts to cash the same cheque, claiming "the mobile deposit didn't work."
The teller system queries the presentment registry, which immediately flags:
- Duplicate MICR: Routing 123456789 / Account 987654321 / Check #0001
- Matching perceptual hash: Hamming distance 2 (same image)
- Original deposit: Tuesday 2:34 PM via iOS mobile app
- Current status: Pending clearing
The branch is alerted that the item was already deposited. The customer, confronted with evidence, admits to attempting double presentment. Real-time duplicate detection prevented a $5,800 loss.
Attack Type 3: Counterfeit Cheques
Counterfeit cheques represent one of the most insidious threats in financial fraud—a sophisticated attack vector where fraudsters create high-quality replicas of legitimate cheques using stolen account information. Unlike traditional cheque fraud that alters existing documents, counterfeits are entirely fabricated instruments designed to deceive both human tellers and automated processing systems.
The Counterfeit Supply Chain
The sophistication of modern counterfeit operations has increased dramatically with the democratization of digital printing technology. High-resolution scanners, professional-grade laser printers, and advanced graphic design software—once accessible only to commercial printers—are now available to organized fraud rings.
These groups operate with assembly-line efficiency:
- Data acquisition: Obtaining valid account numbers from stolen mail, compromised accounts, or cybercriminal marketplaces
- Template creation: Researching target institution's cheque designs, security features, and MICR encoding standards
- Production: Manufacturing counterfeits that replicate visual appearance, magnetic characteristics, and physical properties
- Distribution: Money mules place fraudulent cheques into circulation
Volume Potential: A single compromised business account can spawn hundreds or thousands of counterfeit cheques, each bearing valid account credentials but created without the account holder's knowledge.
Why Counterfeits Fool Traditional Systems
Valid MICR Lines:
Magnetic Ink Character Recognition (MICR) encoding was once a reliable security feature because specialized magnetic toner was difficult to obtain. Today's counterfeiters purchase MICR-capable printers and magnetic ink cartridges through standard commercial channels. The resulting MICR lines read perfectly on magnetic scanners, passing the primary automated validation check.
Professional Printing Quality:
Modern laser printers achieve resolutions of 2400 DPI or higher, capable of reproducing fine details, microprinting, and complex background patterns with remarkable fidelity. Combined with high-quality cheque stock, the visual distinction between genuine and counterfeit becomes nearly imperceptible to casual inspection.
Copied Security Features:
Watermarks, security threads, and holographic elements—once considered tamper-proof—are now routinely copied using advanced techniques. While imperfect under expert examination, these copies often satisfy the quick verification performed at point-of-sale or remote deposit capture.
Human Inspection Limitations:
Bank staff and merchants face time pressures and volume demands that preclude thorough examination of every cheque. Training gaps mean that frontline personnel often lack the expertise to identify subtle inconsistencies.
Detection Techniques
Font Analysis:
Typography consistency analysis examines minute details that counterfeiters struggle to replicate:
- Kerning consistency: The precise spacing between letter pairs, which counterfeit templates often generalize
- Font metrics: Character height, width, and ascender/descender proportions
- Rasterization patterns: How fonts convert to printer dots reveals differences between original offset printing and counterfeit laser reproduction
Printing Analysis:
The method of printing leaves distinctive signatures:
- Inkjet detection: Characteristic dot patterns and ink bleeding different from laser toner adhesion
- DPI analysis: Counterfeit printers often cannot match genuine cheque production resolution
- Toner distribution: Laser printing leaves specific toner particle patterns that vary by printer manufacturer
Security Feature Verification:
Automated verification using specialized imaging:
- Watermark authentication: Transmissive lighting reveals genuine watermarks as three-dimensional features; counterfeits show printed simulations lacking depth
- Microprinting examination: High-magnification imaging verifies legibility of microprinted text that becomes blurred when photocopied
- Hologram analysis: Genuine holograms exhibit dynamic optical properties; counterfeits remain static
Paper Analysis:
The substrate itself provides crucial indicators:
- Fiber composition: Genuine security paper contains specific wood pulp, cotton, and synthetic fiber blends
- Weight and thickness: Precise measurement of paper grammage identifies substitutions
- Texture mapping: Surface roughness analysis detects differences in paper finishing
ML Pattern Recognition:
Machine learning models trained on large datasets identify subtle patterns:
- Behavioral signatures: Counterfeits from the same production source share microscopic similarities
- Anomaly detection: Neural networks flag instruments deviating from genuine cheque production norms
- Cross-channel correlation: Geographic patterns, timing anomalies, and account behaviors suggesting fraud
Image Forensics in Detail
Edge Detection for Tampering:
Advanced algorithms analyze boundaries between image regions to identify manipulation. Splicing—combining portions of genuine cheques with fraudulent elements—creates detectable discontinuities in noise patterns, compression artifacts, and color consistency.
Noise Pattern Analysis:
Every digital image contains noise following predictable statistical distributions. When counterfeits combine multiple source images, noise patterns become inconsistent. Forensic tools measure local noise variance to identify anomalies.
Metadata Examination:
Digital images retain embedded metadata (EXIF data) recording capture parameters, device information, and processing history:
- Discrepancies between claimed capture time and actual timestamp
- Device model mismatches with stated deposit method
- Editing software signatures indicating post-capture modification
- Compression history suggesting multiple generation loss
Compression Artifact Analysis:
Lossy compression algorithms leave characteristic artifacts. Each generation introduces additional artifacts. Forensic tools analyze these patterns to estimate generation count—genuine original captures show minimal artifacts, while multi-generation counterfeits exhibit accumulated distortion.
Real-World Detection Results
Financial institutions implementing comprehensive counterfeit detection report detection rate improvements from 67% to over 95% using advanced forensic and machine learning techniques.
False Positive Management:
Effective systems employ tiered review processes where initial algorithmic flags undergo secondary analysis. Machine learning models use cost-sensitive learning that weights false negatives (missed counterfeits) more heavily than false positives.
Alert Prioritization:
Risk scoring algorithms prioritize alerts based on detection confidence scores, transaction amounts, account history, and current threat intelligence. Dynamic threshold adjustment responds to emerging fraud patterns.
Reduced counterfeit success rates deter fraud rings from targeting protected institutions, creating a protective effect where fraud activity migrates toward less-defended targets.
Proven Results: Regional Bank Case Study
"In three years with our old system, we never caught a fraud ring this sophisticated. ChequeUI flagged it in the first week." — Maria Chen, Chief Risk Officer, Midwest Community Bank
The Challenge: A Perfect Storm of Fraud and Frustration
By late 2022, Midwest Community Bank was facing a crisis that would be familiar to any regional banking executive. The $12 billion institution, with 150 branches across four Midwestern states, had built its reputation on personalized service and community trust over 87 years. But their fraud detection infrastructure was stuck in the past—and criminals had noticed.
The Numbers Tell the Story
In 2022 alone, the bank lost $3.3 million to check fraud, a 34% increase from the previous year. The fraud landscape had evolved rapidly. Organized crime rings were exploiting the bank's aging rule-based detection system with increasingly sophisticated schemes:
- Counterfeit business checks targeting commercial accounts, with fraudsters creating near-perfect replicas using high-quality scanners and specialized paper
- Altered payee schemes where legitimate cheques were chemically washed and re-written for thousands more than the original amount
- Mobile deposit fraud exploiting the surge in remote banking adoption, with the same cheque being deposited multiple times across different institutions
- New account fraud where synthetic identities opened accounts specifically to kite cheques through the clearing system
"We were playing whack-a-mole," recalls Maria Chen, who joined as Chief Risk Officer in 2021. "Every time we added a new rule to catch one scheme, the fraudsters would pivot to something else. Our detection rate was 71%, which sounds decent until you realize that meant nearly 30% of fraud was slipping through—and we were only catching things after the money was gone."
Operational Nightmares
The pain wasn't limited to direct financial losses. The bank's fraud investigation team of 23 analysts was drowning in false positives—12% of all alerts were false alarms. Each alert required manual review, averaging 45 minutes per case. During peak periods, investigators were working 60-hour weeks just to keep up with the backlog.
Branch managers were frustrated too. Legitimate customers were having cheques held for extended periods while the back office scrambled to verify authenticity. Customer satisfaction scores in fraud-related interactions had dropped to 62%, and the bank was seeing elevated account closure rates among small business customers who couldn't afford payment delays.
Regulatory Pressure Mounts
Following a routine examination in early 2022, the OCC issued a Matters Requiring Attention (MRA) citing "deficiencies in fraud detection capabilities and suspicious activity monitoring." The bank faced the prospect of formal enforcement action if improvements weren't demonstrated within 18 months.
"We knew we needed to modernize, but we were concerned about disruption," Chen explains. "We're a relationship bank. Our customers expect to walk into any of our 150 branches and have the teller know their name. We couldn't afford a system that would create friction or slow down our operations."
The Decision: Finding the Right Partner
Midwest Community Bank's vendor evaluation process began in March 2022. Chen assembled a cross-functional team including representatives from fraud operations, IT, compliance, retail banking, and finance. Their evaluation criteria were specific and demanding:
- Proven detection performance with measurable accuracy improvements
- Explainable AI that could provide clear reasoning for alerts (critical for regulatory defense)
- Rapid integration with their existing Fiserv DNA core banking system and image capture infrastructure
- Intuitive user interface that wouldn't require extensive retraining
- Scalable architecture to grow with the bank
- Strong vendor partnership with responsive support and industry expertise
After evaluating six vendors through a 90-day process including proof-of-concept testing, ChequeUI emerged as the clear choice. "What distinguished ChequeUI was the sophistication of their machine learning models combined with practical banking expertise," says David Park, the bank's SVP of Technology. "Other vendors had flashy demos, but ChequeUI understood the operational realities of a 150-branch network. They could articulate exactly how their system would fit into our existing workflows."
Implementation: A Methodical Transformation
The implementation launched in August 2022, structured in three distinct phases:
Phase 1: Foundation (Months 1-2)
ChequeUI's technical team worked alongside Midwest's IT staff to establish secure data connectivity. Rather than requiring a "rip and replace" of existing infrastructure, ChequeUI deployed alongside the legacy system in shadow mode, processing transactions in parallel without interrupting operations.
"The integration was smoother than we anticipated," Park notes. "ChequeUI's API-first architecture meant we could connect to our Fiserv DNA core and our branch capture systems without custom coding."
Phase 2: Pilot Deployment (Months 3-4)
In October 2022, ChequeUI went live across 15 branches in the bank's home market. This controlled rollout allowed the fraud operations team to validate detection accuracy and fine-tune alert thresholds.
"Our investigators were skeptical at first," Chen admits. "They'd been burned by false promises before. But within two weeks, they were asking why we couldn't roll it out faster. The quality of the alerts was night and day."
Phase 3: Enterprise Rollout (Months 5-6)
By December 2022, ChequeUI was operational across all 150 branches. The cutover from the legacy system happened over a single weekend, with zero downtime.
A critical moment came in the third week of full deployment. ChequeUI flagged a series of business cheques totaling $127,000 that had passed through the old system without notice. Upon investigation, the fraud team discovered a sophisticated counterfeit ring targeting 23 commercial accounts. The cheques were high-quality forgeries using stolen account information purchased on the dark web.
"That was our 'aha' moment," Chen says. "In three years with our old system, we never caught a fraud ring this sophisticated. ChequeUI flagged it in the first week. We were able to stop payment on all but one cheque before they cleared. That single detection paid for half the annual platform cost."
The Results: Transformation by the Numbers
Twelve months after full deployment, the impact is undeniable:
| Metric | Before | After | Improvement |
|---|---|---|---|
| Annual Fraud Losses | $3.3M | $891K | 73% reduction |
| Detection Rate | 71% | 96% | +25 percentage points |
| False Positive Rate | 12% | 7% | 42% reduction |
| Average Alert Review Time | 45 min | 12 min | 73% faster |
| Payback Period | — | 4.2 months | Under 5 months |
Operational Excellence
The fraud investigation team has been transformed. False positives have dropped by nearly half, freeing investigators to focus on genuine threats. Alert review time has fallen from 45 minutes to 12 minutes on average, meaning the team can handle three times the volume without adding headcount.
"Morale has completely changed," says Jennifer Walsh, Senior Fraud Investigator who has been with the bank for 8 years. "We used to spend our days chasing ghosts—alerts that turned out to be legitimate transactions. Now when an alert comes in, we know there's a real issue to investigate. We're actually catching bad guys instead of apologizing to good customers for holding their cheques."
Customer Experience
The reduction in false positives has directly improved customer experience. Cheque holds for "further review" have decreased by 68%. Customer satisfaction scores for fraud-related interactions have rebounded to 87%, and the bank has seen a notable reduction in account closures among business customers.
Regulatory Victory
The OCC returned for a follow-up examination in mid-2023. The MRA was lifted without findings. Examiners specifically noted the sophistication of the bank's transaction monitoring and the quality of case documentation generated by ChequeUI's explainable AI.
"The regulators were impressed that we could show them exactly why the system flagged each suspicious item," Chen says. "The audit trail is bulletproof. Every decision is documented with clear reasoning and supporting evidence."
Voice of the Leader
"I remember the exact moment I knew we'd made the right decision. It was 9:47 AM on a Tuesday in December—I'll never forget because I was in the middle of our weekly risk committee meeting. An alert came through on my phone: ChequeUI had flagged a $42,000 cashier's cheque at our downtown branch. The payee name had microscopic alterations that were invisible to the naked eye. Our old system never would have caught it.
"I walked to the window and watched our teller calmly verify the customer's ID while the branch manager called the business that supposedly issued the cheque. It was counterfeit—a sophisticated forgery of a local manufacturer's cheques that had been circulating for weeks. The customer was attempting to open a new account and immediately wire the funds overseas.
"We stopped a $42,000 loss in real-time. The customer was arrested—the first arrest in a three-month investigation that eventually uncovered a $2.4 million counterfeit ring operating across six states. Our old system processed 340 cheques from that same fraud ring over the previous year without flagging a single one.
"That Tuesday morning changed everything for me. I went from cautiously optimistic to a true believer. This technology doesn't just protect our bank—it protects our entire community from criminals who think they can exploit our trust." — Maria Chen, Chief Risk Officer, Midwest Community Bank
Technology & Integration
Integration Architecture
ChequeUI provides a flexible, multi-layered architecture designed to integrate seamlessly with existing banking infrastructure while maintaining the highest security standards.
RESTful API Design:
Our RESTful API follows industry best practices with predictable resource-oriented URLs, standard HTTP verbs, and consistent JSON payloads.
- Production:
https://api.chequedb.com/v1 - Sandbox:
https://sandbox-api.chequedb.com/v1
Key Design Principles:
- Idempotency: All POST requests support idempotency keys to prevent duplicate processing
- Versioning: URL-based versioning ensures backward compatibility
- Pagination: Cursor-based pagination with
next_cursorandprevious_cursor - Filtering: Standard query parameters
Core Banking Integration
ChequeUI integrates with all major core banking platforms through native connectors and middleware adapters.
| Core Banking System | Integration Method |
|---|---|
| Fiserv (DNA, Premier, Cleartouch) | Native Connector 3.2.1 |
| FIS (Horizon, Profile, MISER) | Native Connector 3.2.1 |
| Jack Henry (SilverLake, Symitar) | Native Connector 3.1.0 |
| Temenos T24 / Transact | Native Connector 3.2.0 |
| Finacle | REST API Adapter 2.8.0 |
| Custom Core Systems | Generic REST/SOAP |
API Specifications
Authentication:
# API Key Authentication
curl -X GET https://api.chequedb.com/v1/cheques \
-H "Authorization: Bearer ch_live_1234567890abcdef"
# OAuth 2.0
curl -X POST https://auth.chequedb.com/oauth/token \
-d "grant_type=client_credentials" \
-d "client_id=YOUR_CLIENT_ID" \
-d "client_secret=YOUR_CLIENT_SECRET" \
-d "scope=cheques:read cheques:write"
Rate Limiting:
| Plan | Requests/Minute | Burst Capacity |
|---|---|---|
| Starter | 100 | 150 |
| Professional | 1,000 | 1,500 |
| Enterprise | 10,000+ | Custom |
Standard Response Format:
{
"id": "chq_2vX9kLmN3pQr5sTu",
"status": "processing",
"amount": 1250.00,
"currency": "USD",
"extracted_data": {
"micr": "123456789 987654321 0001",
"micr_confidence": 0.998,
"amount": 1250.00,
"payee": "ACME Corporation"
},
"fraud_analysis": {
"score": 0.02,
"risk_level": "low",
"signals": {
"rules": { "triggered": [], "score": 0.05 },
"ml": { "anomaly_score": 0.12 },
"forensics": { "tampering_probability": 0.03 },
"duplicate": { "match": false },
"signature": { "confidence": 0.94 }
}
},
"explainability": [
"MICR validation passed",
"No behavioral anomalies detected",
"Image forensics clean"
],
"created_at": "2024-01-15T10:30:00Z"
}
Deployment Options
Cloud (SaaS):
Fully managed with automatic scaling, updates, and 99.9% uptime SLA. Available in US East, US West, EU West, EU Central, and APAC regions.
- Automatic scaling, zero-downtime deployments
- Daily automated backups (30-day retention)
- Cross-region failover (Enterprise)
- SOC 2 Type II certified infrastructure
On-Premise:
Deploy within your data center for complete control.
Minimum Requirements:
Kubernetes: 1.25+ with 8 worker nodes
CPU: 32 cores total
Memory: 128 GB RAM
Storage: 2 TB SSD (NVMe recommended)
GPU: NVIDIA T4 or V100 (2x) for ML inference
Hybrid:
Process sensitive operations on-premise while leveraging cloud scalability. On-premise handles image ingestion, OCR, and signature verification; cloud handles model training and analytics.
Air-Gapped Environments:
Fully offline operation with manual update packages, local ML training, isolated signature database, and no external network dependencies.
Security Specifications
| Certification | Status |
|---|---|
| SOC 2 Type II | Certified |
| PCI DSS Level 1 | Certified |
| ISO 27001 | Certified |
| GDPR | Compliant |
| CCPA | Compliant |
Encryption:
- In Transit: TLS 1.3 (TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256)
- At Rest: AES-256 with transparent data encryption
- Key Management: HSM-backed (Thales Luna, AWS CloudHSM, Azure Dedicated HSM)
Performance SLAs
| Operation | Average | P95 | P99 |
|---|---|---|---|
| Cheque Submission | 150ms | 250ms | 400ms |
| OCR Extraction | 800ms | 1,200ms | 2,000ms |
| Fraud Scoring | 200ms | 350ms | 500ms |
| Signature Verification | 300ms | 500ms | 800ms |
| Plan | Uptime SLA | Monthly Downtime |
|---|---|---|
| Starter | 99.9% | 43 minutes |
| Professional | 99.95% | 21 minutes |
| Enterprise | 99.99% | 4 minutes |
Frequently Asked Questions
Platform Differentiation
How is this different from our current fraud system?
Most legacy fraud systems rely on static rules and manual threshold adjustments that require weeks to update. Our platform uses adaptive machine learning models that analyze thousands of behavioral signals in real-time, updating risk scores within milliseconds of transaction initiation.
Unlike rule-based systems that generate predictable patterns fraudsters can exploit, our AI continuously learns from new attack vectors across our entire client network. When one bank encounters a novel fraud scheme, all institutions in our ecosystem benefit from updated detection capabilities within 24 hours.
Clients typically see a 40-60% reduction in fraud losses within the first quarter while decreasing false positives by 35% compared to their previous systems.
Will this create a lot of false positives?
False positive reduction is core to our platform design. Our system achieves industry-leading precision through ensemble modeling that weighs transaction patterns, device fingerprints, behavioral biometrics, and consortium data. Current clients experience false positive rates between 0.3% and 0.8%, compared to the industry average of 2-3% for traditional systems.
We employ a graduated response system rather than binary approve/decline decisions. Low-risk anomalies trigger step-up authentication; only high-confidence fraud signals block transactions. This approach reduced customer friction by 52% for a top-20 US bank while maintaining sub-0.5% fraud rates.
Implementation & Integration
How long does implementation take?
Standard implementation timelines range from 8-12 weeks for API-based integration, with pilot programs launching in as little as 4 weeks for cloud-native environments.
- Phase 1 (Weeks 1-3): Technical architecture review, data pipeline establishment
- Phase 2 (Weeks 4-7): Model training, threshold calibration, parallel testing
- Phase 3 (Weeks 8-10): Pilot deployment with full analyst training
- Phase 4 (Weeks 11-12): Full production rollout
For institutions requiring on-premise deployment, add 2-4 weeks for hardware provisioning.
Do we need to replace our core banking system?
No. Our platform is designed as a complementary layer that integrates with existing core banking infrastructure through RESTful APIs, message queues, or batch file processing. We maintain certified connectors for all major core systems including FIS, Fiserv, Jack Henry, and Temenos.
What integrations are supported?
We maintain native integrations with 150+ banking and fraud prevention platforms including SWIFT, Visa VAMP, Mastercard Safety Net, Plaid, Alloy, and major SIEM solutions. Custom integrations are supported through our Integration Toolkit with SDKs for Java, Python, .NET, and Node.js.
Compliance & Security
What about regulatory compliance?
Our platform is designed to meet regulatory requirements across major jurisdictions including GDPR, CCPA, PCI DSS Level 1, SOC 2 Type II, and ISO 27001. We maintain specific compliance certifications for financial services including FFIEC guidelines and AML/CFT frameworks.
Model governance features include automated bias detection, explainability reporting, and fairness monitoring required by emerging AI regulations like the EU AI Act. All decision logic is auditable with full lineage tracking.
How do you ensure audit trail integrity?
Every decision, model update, and user action is captured in an immutable audit log using blockchain-verified timestamps and cryptographic hashing. This creates tamper-evident records that satisfy regulatory examination requirements.
Audit trails include complete decision rationale—why a transaction was flagged, which signals contributed to the risk score, model version used, and analyst actions taken. Data retention is configurable with standard retention of 7 years for fraud investigation records.
How is customer data protected?
Data security employs defense-in-depth architecture with AES-256 encryption at rest and TLS 1.3 in transit. Customer PII is tokenized upon ingestion with cryptographic segmentation ensuring no single system holds complete customer profiles.
Access controls follow zero-trust principles with role-based permissions, multi-factor authentication, and just-in-time privileged access. We carry $50 million in cyber liability insurance and have maintained zero data breaches across our client base since platform inception.
Performance & Reliability
What happens during system downtime?
Our infrastructure operates with 99.99% uptime SLA backed by financial penalties. The architecture uses active-active multi-region deployment with automatic failover completing within 30 seconds of detecting regional degradation.
For extreme scenarios where connectivity is lost, we provide local caching of risk models that continues operating in degraded mode for up to 72 hours. Transactions default to your existing risk parameters rather than failing open or closed.
How do you handle model drift?
Model performance is monitored continuously through automated drift detection algorithms. When drift exceeds configurable thresholds, the system alerts your model risk team and initiates automatic retraining workflows.
We deploy ensemble models that combine stable baseline algorithms with rapidly adapting components. Our models typically maintain >95% of initial accuracy for 12-18 months between major retraining cycles.
How do you protect against adversarial attacks?
Our defense architecture includes multiple layers specifically designed to counter adversarial machine learning techniques. Model extraction attempts are detected through API call pattern analysis. We employ adversarial training during model development, exposing algorithms to millions of synthetic attack variations.
The platform includes behavioral honeypots—synthetic transaction patterns that appear vulnerable but trigger immediate detection when targeted. When adversarial patterns are identified, we deploy countermeasures across our client network within hours.
Operations & Customization
What image quality do we need?
For document verification, we accept images with minimum 150 DPI resolution, though 300+ DPI is recommended. Supported formats include JPEG, PNG, TIFF, and PDF with file sizes up to 10MB.
Our preprocessing pipeline enhances image quality through automatic deskewing, lighting correction, and noise reduction. Our system successfully processes 94% of mobile-submitted documents without requiring resubmission.
Can we customize the risk scoring?
Yes. Our platform supports hierarchical customization from global thresholds down to individual transaction parameters. You can define custom risk rules that override or supplement machine learning scores, create segment-specific models for different customer types, and configure approval workflows based on risk bands.
The rule engine supports complex logic including velocity checks, geofencing, merchant category restrictions, and cross-channel correlation.
Business Value
How does the pricing model work?
Pricing follows a usage-based SaaS model with two components: a platform fee based on transaction volume tiers and a per-decision API call charge. Volume tiers start at 100,000 monthly transactions with unlimited scaling.
Typical mid-market banks (1-5 million monthly transactions) invest $150,000-$400,000 annually, while enterprise institutions see per-transaction costs below $0.002. We offer pilot pricing with 90-day out clauses to validate ROI before long-term commitment.
What is the typical ROI timeline?
Clients typically achieve positive ROI within 4-6 months of full deployment. Full ROI realization occurs within 9-12 months, with annual returns ranging from 300% to 800% depending on baseline fraud rates and transaction volumes.
What training is provided for your staff?
Comprehensive training programs ensure your team maximizes platform capabilities. Initial training includes 16 hours of instructor-led sessions covering platform navigation, investigation workflows, model interpretation, and threshold management.
Role-specific curricula serve fraud analysts, investigators, risk managers, and technical administrators. Ongoing enablement includes monthly feature webinars, quarterly best practice workshops, and access to our knowledge base with 200+ articles and video tutorials.
Ready to Stop Sophisticated Cheque Fraud?
Join banks that have reduced fraud losses by 73% with multi-layer detection.
See It In Action
Request a Personalized Demo:
See how ChequeUI would perform with your specific fraud patterns:
- Share historical data (securely, under NDA)
- We run analysis on your actual fraud cases
- See detection rates for your attack types
- Review integration approach for your tech stack
Or Schedule a 15-Minute Introduction
Quick call to discuss your fraud challenges and see if multi-layer detection is right for you.
Call us: 1-800-CHEQUEUI
Email: sales@chequeui.com
Technical Questions: integrate@chequedb.com
About ChequeUI
ChequeUI provides AI-powered cheque processing and fraud detection infrastructure for banks, credit unions, and fintechs. Our multi-layer detection platform processes millions of transactions monthly while maintaining the auditability and security standards financial institutions require.
Certifications: SOC 2 Type II | PCI DSS Level 1 | ISO 27001 | GDPR Compliant
© 2026 ChequeUI, Inc. All rights reserved.
Privacy Policy | Terms of Service | Security