Document Authenticity Checklist Scorer

Evaluate the authenticity of a document by checking key verification criteria. Each item is weighted by its importance. The final score indicates the likelihood of document authenticity.

Physical & Visual Security Features
Content & Formatting Integrity
Issuer & Authority Verification
Digital & Metadata Checks (if applicable)
Contextual Plausibility

Formula

Each checklist item i has a binary (or ternary for digital items) response value vi ∈ {0, 1} (or {0, 1, 2} for digital fields) and an assigned weight wi reflecting its importance to authenticity.

Weighted Score = Σ (vi × wi)

Max Possible Score = Σ (max(vi) × wi)

Authenticity Score (%) = (Weighted Score / Max Possible Score) × 100

Critical Override: If "No visible alterations" = No OR "Authorized signature present" = No, the verdict is automatically escalated to HIGH RISK regardless of the percentage score, as these are non-negotiable authenticity requirements.

Verdict thresholds:

  • ≥ 85% → Likely Authentic
  • 65–84% → Moderate Confidence
  • 40–64% → Low Confidence
  • < 40% → Likely Fraudulent
  • Critical flag triggered → High Risk (override)

Assumptions & References

  • Weights are assigned based on forensic document examination best practices, with physical tampering indicators (alterations) and authority verification (signature, registry) receiving the highest weights.
  • Digital fields use a three-point scale (0 = No/Invalid, 1 = N/A for physical documents, 2 = Yes/Verified) to avoid penalizing physical documents for lacking digital features.
  • The checklist is based on guidelines from the ACFE (Association of Certified Fraud Examiners) Fraud Examiners Manual and ISO/IEC 19794 document security standards.
  • This tool provides a structured risk-scoring framework and does not replace professional forensic document examination, legal authentication, or law enforcement investigation.
  • A score of 100% does not guarantee authenticity; sophisticated forgeries may pass visual checks. Always combine with database verification and expert review for high-stakes decisions.
  • Reference: UNODC, Anti-Money Laundering and Countering the Financing of Terrorism — Document Verification Guidelines (2022).
  • Reference: INTERPOL, Document Fraud Best Practices (2021).

In the network