Overview
Model Name: VisualizationRegion
A highlighted region of suspected fraud and the information needed to depict it visually.
Properties
visual_type
visual_type
- Type
- String
- Required
- true
A machine-readable identifier that indicates the type of file tampering visualization offered in this image. This value will not change; you may rely on it in your application logic.
Possible Values
tamper_overview
: Tampered fields are highlighted in red.edit_regions
: Red highlights indicate the areas of the original document that were changed.original_pdf
: Red highlights indicate the areas of the original document that were changed.tampered_fonts
: The same field appears to use multiple fonts. Where possible, the fonts within a field are highlighted with different colors.added_fonts
: Text that was added to the document is highlighted in red.overwritten_text
: Text has been added to (or modified from) the original document. Where possible, unchanged text will be highlighted in green while added text will be highlighted in red. In some cases, only one of these two regions will be shown; this still indicates suspicious activity.misaligned_text
: Fields do not match the expected alignment based on where they appear in the doc and how other similar fields in the document are aligned.post_whiteout_content
: Indicates that the document is redacted using a photo editor and shows the redacted field values that have been recovered.
display_name
display_name
- Type
- String
- Required
- true
- Min. Length
- 1
A human-readable version of the value given in identifier
. You should display this value within your application.
description
description
- Type
- String
- Required
- true
- Min. Length
- 1
A human-readable description of the visualized fraud signal and guidance on how to interpret it. You should display this value within your application.
image_url
image_url
- Type
-
String (
url
) - Required
- true
A URL to an image that represents this visualization. The image's content is the analyzed page with translucent colored squares overlaid on the regions of suspected fraud. The image requires authentication to access, which means it can't be hot-linked within your own web apps. You can provide your credentials to retrieve it the same way you would with our other endpoints. The image is stored indefinitely, but will be deleted if the associated Book or Document is deleted.