IdenTransformer: A Foundation Model Architecture for Robust Digital Identity Verification

Authors

  • Suman Kumar Sanjeev Prasanna

Keywords:

Behavioral Biometrics, Digital Security, Foundation Models, Fraud Detection, Identity Verification, Machine Learning, Transaction Analysis

Abstract

This research introduces a novel architecture for digital identity verification by leveraging the representational capabilities of large-scale foundation models. Traditional discriminative approaches for fraud detection often struggle to generalize across heterogeneous identity signals and evolving adversarial behaviors. The proposed framework, IdenTransformer, employs a multimodal transformer architecture that integrates biometric embeddings, behavioral telemetry, and relational metadata through cross-attention mechanisms within a unified latent representation space. Central to the approach is a parameter-efficient fine-tuning strategy using Identity-Adapters, which enables effective adaptation of large pre-trained models to high-cardinality identity verification tasks without requiring full model retraining. The framework further incorporates contrastive representation learning to enforce identity consistency across modalities while preserving sensitivity to anomalous behavioral patterns indicative of synthetic identity creation and coordinated fraud activity. Empirical evaluation on large-scale identity transaction datasets demonstrates significant improvements in fraud detection performance, including a 15% increase in Area Under the Precision–Recall Curve (AUPRC) and a 12% reduction in False Discovery Rate compared with strong ensemble-based baselines. The results demonstrate that foundation-model architectures provide a scalable and robust approach for detecting emerging identity fraud patterns in complex digital ecosystems.

Downloads

Download data is not yet available.

References

P. P. Arcot, G. Sayed, B. Parekh, J. V. Balasubramanian, and V. N. Sudheer, “The interplay of ethics, culture, and society in the age of finance digital transformation,” J. Southwest Jiaotong Univ., vol. 59, no. 2, pp. 139–163, 2024.

Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023.

V. M. Patel et al., “Robust deep learning for computer vision,” Proc. IEEE, 2022.

V. Davidavičienė, J. Raudeliūnienė, M. Tvaronavičienė, and J. Kaušinis, “The importance of security aspects in consumer preferences in electronic environment,” J. Secur. Sustain. Issues, vol. 8, no. 3, 2019.

S. Kumar and S. Prasanna, “Heterogeneous ensemble learning for robust adversarial pattern recognition in digital ecosystems,” J. Comput. Anal. Appl., vol. 27, no. 5, pp. 18–28, 2019.

V. Štruc et al., “Deep learning based face recognition: A survey,” IEEE Access, 2022.

S. T. Boppiniti, “Big data meets machine learning: Strategies for efficient data processing and analysis in large datasets,” Int. J. Creative Res. Comput. Technol. Des., vol. 2, no. 2, 2020.

S. Kumar, S. Prasanna, and X. Ruan, “A unified hybrid machine learning architecture for robust identity anomaly detection in large-scale digital ecosystems,” J. Electr. Syst., vol. 14, no. 1, pp. 160–173, 2018.

R. Wang and W. Ji, “Computational intelligence for information security: A survey,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 4, no. 5, pp. 616–629, 2020.

E. Ellavarason, R. Guest, F. Deravi, R. Sanchez-Riello, and B. Corsetti, “Touch-dynamics based behavioural biometrics on mobile devices—a review from a usability and performance perspective,” ACM Comput. Surv., vol. 53, no. 6, pp. 1–36, 2020.

B. Lebichot, T. Verhelst, Y. A. Le Borgne, L. He-Guelton, F. Oble, and G. Bontempi, “Transfer learning strategies for credit card fraud detection,” IEEE Access, vol. 9, pp. 114754–114766, 2021.

E. Ileberi, Y. Sun, and Z. Wang, “A machine learning based credit card fraud detection using the GA algorithm for feature selection,” J. Big Data, vol. 9, no. 1, p. 24, 2022.

P. Kasprowski, Z. Borowska, and K. Harezlak, “Biometric identification based on keystroke dynamics,” Sensors, vol. 22, no. 9, p. 3158, 2022.

I. Stylios, S. Kokolakis, O. Thanou, and S. Chatzis, “Behavioral biometrics and continuous user authentication on mobile devices: A survey,” Inf. Fusion, vol. 66, pp. 76–99, 2021.

S. P. Maniraj, A. Saini, S. Ahmed, and S. Sarkar, “Credit card fraud detection using machine learning and data science,” Int. J. Eng. Res., vol. 8, no. 9, pp. 110–115, 2019.

A. Kaleel and Z. Polkowski, “Credit card fraud detection and identification using machine learning techniques,” Wasit J. Comput. Math. Sci., vol. 2, no. 4, pp. 159–165, 2023.

P. Raghavan and N. El Gayar, “Fraud detection using machine learning and deep learning,” in Proc. Int. Conf. Comput. Intell. Knowl. Econ. (ICCIKE), Dec. 2019, pp. 334–339.

R. K. Chenoori and R. Kavuri, “Online transaction fraud detection using efficient dimensionality reduction and machine learning techniques,” Revue d’Intelligence Artificielle, vol. 36, no. 4, p. 621, 2022.

S. Khatib, “The application of machine learning models in fraud detection and prevention across digital banking channels and payment platforms,” Int. J. Adv. Comput. Methodol. Emerg. Technol., vol. 14, no. 9, pp. 1–7, 2024.

Downloads

Published

19.04.2025

How to Cite

Suman Kumar Sanjeev Prasanna. (2025). IdenTransformer: A Foundation Model Architecture for Robust Digital Identity Verification . International Journal of Intelligent Systems and Applications in Engineering, 13(1), 639–647. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/8099

Issue

Section

Research Article