Systems and methods can leverage images of remotely captured items to extract information, populate forms, authenticate users, and perform other actions.