Looking for a Bynn alternative? — Structural PDF forensics with transparent markers
Risk-ops and fraud teams evaluating Bynn for document verification have a focused need: catch forged or edited PDFs before they enter the workflow. htpbe? solves that need at the file layer with named structural markers, public pricing, and a self-serve API. If you want forensic transparency rather than a single black-box risk score, this is the difference that matters.
htpbe? analyzes the structural layer of the PDF file — producer, xref, metadata, image streams, signature chain, balance arithmetic. We don't do identity-document biometrics or photo-ID matching. Bynn covers a broader document-and-identity verification scope; this page describes how htpbe? fits the structural document-fraud layer specifically.
One REST call, one deterministic verdict
Upload the PDF. The API returns INTACT, MODIFIED, or INCONCLUSIVE with named markers — in about three seconds.
Why teams pick htpbe? for the structural-forensics layer
Three real fraud mechanics we catch at the structural PDF layer.
Named markers, not a black-box score
htpbe? returns INTACT, MODIFIED, or INCONCLUSIVE with explicit named markers (xref count, producer signature, signature chain, balance arithmetic, image-stream artefacts). Your fraud-ops or underwriting logic interprets the markers in context — no opaque numerical score to defend.
Self-serve, public pricing
Plans from $15/mo (30 requests) to $499/mo (1,500 requests) with explicit quotas on the public pricing page. Sign up, get an API key, ship the integration the same day. No sales call, no procurement.
Structural-only depth
We don't spread across OCR, identity biometrics, transaction analytics, AML. We focus on one thing: did this PDF get modified or fabricated after issuance? That focus shows up in detection depth — incremental update detection, font subset divergence, ghost-info scan, hybrid raster-and-programmatic detection, page-assembly forensics.
How htpbe? is positioned
When htpbe? makes sense (and when Bynn might fit you better)
Want focused structural depth? htpbe? Want broader doc + identity scope? Look at both.
Honest sizing: pick the tool whose feature scope and depth match yours.
htpbe? is built for risk-ops teams that want maximum structural-forensics depth on PDF documents — named markers, multiple detection layers, transparent pricing. If your team needs document verification bundled with identity-document biometrics, photo matching, or broader KYC scope, Bynn and similar platforms have that broader scope — that's a fair reason to evaluate them. If structural document fraud is your focused need, htpbe? is positioned for that.
Five forensic layers, one deterministic verdict
Every PDF we receive passes through the same structural pipeline — no model training, no thresholds to tune.
Metadata analysis
Creation and modification timestamps, producer and creator fields, XMP metadata — the first layer exposes basic tampering.
File structure
Xref tables, trailer chain, incremental updates. Any edit after export leaves a structural fingerprint here.
Digital signatures
Signature chain integrity and post-signature modifications produce deterministic markers. Certainty-level signal.
Content integrity
Fonts, objects, embedded content, page assembly. Multi-session edits and inserted objects are visible at this layer.
Verdict with markers
Deterministic output: INTACT / MODIFIED / INCONCLUSIVE, with named markers for every finding — suitable for audit trail.
PDFs we analyze structurally
Every type listed below is analyzed at the structural file layer — not the rendered image.
Detection capabilities
Deterministic structural signals. No probabilistic scores, no model training.
Producer signature analysis
Authentic documents come from institutional sources. When the producer field shows a desktop tool or generator-tool fingerprint, htpbe? flags it. The verdict is interpretable, not a black-box score.
Incremental update detection
Edits to a real PDF leave incremental update markers in the xref chain. htpbe? flags these as MODIFIED at high confidence — visible structural evidence of post-issuance editing.
Balance arithmetic verification
Running balance is verified row-by-row across bank statements. Edited transactions break the chain unless every dependent balance was also adjusted.
Digital signature chain validation
Tax forms, employer letters, government PDFs carry digital signature chains. htpbe? validates the chain and flags invalidated or removed signatures as MODIFIED at certain confidence.
Image-stream artefact detection
Lifted-and-pasted logos, signatures, and headers leave compression and object-structure artefacts that differ from authentic embedded content.
Multi-layer forensic depth
Beyond the basics: font subset divergence (multi-session generation), ghost-info scan (residual original metadata after producer forgery), hybrid raster-and-programmatic detection (Y-flip CTM), page-assembly forensics (pages imported from different sources), template-forgery patterns. The depth shows up in INCONCLUSIVE-vs-MODIFIED-vs-INTACT precision.
A Bynn alternative your engineers can ship today
Buyers can skip this section — developers, the integration is two HTTP calls.
Step 1 — submit the PDF
curl -X POST https://api.htpbe.tech/v1/analyze \
-H "Authorization: Bearer $HTPBE_API_KEY" \
-H "Content-Type: application/json" \
-d '{"url": "https://your-storage/applicant-document.pdf"}'Step 2 — read the named markers
{
"id": "b1y2n3n4-5a6l-7t8x-9z0r-a1b2c3d4e5f6",
"status": "modified",
"modification_confidence": "high",
"modification_markers": [
"Two cross-reference tables — incremental update",
"Modification date 11 days after creation date",
"PDF editor producer detected",
"Font subset prefix shift between pages 2 and 3"
],
"producer": "Adobe Acrobat Pro",
"creator": "Chase Online Banking",
"creation_date": 1707091200,
"modification_date": 1708041600,
"has_digital_signature": false,
"xref_count": 2,
"has_incremental_updates": true
}Verdict: modified at high confidence with named markers. The xref count, producer mismatch (Chase original, Adobe re-save), modification timestamp gap, and font subset prefix shift across pages each tell a piece of the story. Your fraud-ops logic interprets the markers — we don't hide them behind a single number.
Customer Stories
Teams that stopped document fraud
Compliance, finance, and risk teams use htpbe? to catch manipulated PDFs before they become costly mistakes.
Caught an invoice where the total had been changed by less than a thousand dollars. Without this I would have approved it without a second look.
Sarah M.
AP Manager
United States
We had three applicants in the same week with bank statements that looked completely fine. Two of them were flagged as modified. You simply cannot see this by reading the document — it is in the file structure.
Lars V.
Risk Analyst, Online Lending
Netherlands
Salary slips were coming with altered figures. We identified two problematic files before the placement was finalised.
Priya K.
HR Operations Lead
India
Since we started checking documents this way, we stopped two applications early in the process that would have been very difficult to reverse later.
Julien R.
Fraud Analyst, Fintech
France
Some applicants were sending PDFs that looked authentic but had been edited in ways not visible to the eye. We now ask for verified originals when something is flagged. Already saved us from a few bad decisions.
Marta S.
Compliance Coordinator
Spain
One invoice was caught because there was a mismatch between the document dates and structure. That particular case would have cost us significantly.
Tariq A.
Finance Manager
United Arab Emirates
Frequently asked questions
Related solutions and guides
Fintech & Lending
Full lender vertical positioning — fraud-ops angle for risk teams.
KYC Onboarding
Document fraud at the KYC layer — fintech onboarding angle.
Bank Statement Fraud Detection
Bank statement structural forensics — the most common document-fraud target.
Secure your workflow
Create your account — API key on signup, free test environment on every plan.
From $15/mo. No sales call. Cancel any time.