US 12,437,583 B2
Morphed image detection logic and surveillance systems
Arun Vemury, North Bethesda, MD (US)
Assigned to The Government of the United States of America, Secretary of Homeland Security, Washington, DC (US)
Filed by The Government of the United States of America, as represented by the Secretary of Homeland Security, Washington, DC (US)
Filed on Feb. 6, 2025, as Appl. No. 19/047,488.
Application 19/047,488 is a continuation in part of application No. 18/918,245, filed on Oct. 17, 2024, abandoned.
Claims priority of provisional application 63/544,577, filed on Oct. 17, 2023.
Prior Publication US 2025/0191408 A1, Jun. 12, 2025
Int. Cl. G06V 40/40 (2022.01); G06V 10/74 (2022.01); G06V 10/776 (2022.01); G06V 20/52 (2022.01); G06V 40/16 (2022.01); G06V 40/50 (2022.01); G07C 9/25 (2020.01)
CPC G06V 40/40 (2022.01) [G06V 10/761 (2022.01); G06V 10/776 (2022.01); G06V 20/52 (2022.01); G06V 40/172 (2022.01); G06V 40/50 (2022.01); G07C 9/257 (2020.01)] 15 Claims
OG exemplary drawing
 
1. A security system comprising:
an enrollment logic configured to store in a user record in a user database:
reference biographic data about a user;
reference biometric data about the user;
a reference image of the user;
a first security kiosk configured to:
capture a first biographic information about the user from an ID card;
capture a first kiosk image of biometric information about the user from the ID card;
a second security kiosk configured to:
capture a second biographic information about the user from the ID card;
capture a second kiosk image of biometric information about the user from the ID card;
a third security kiosk configured to:
capture a third biographic information about the user from the ID card;
capture a third kiosk image of biometric information about the user from the ID card;
an Nth security kiosk configured to:
capture an Nth biographic information about the user from the ID card;
capture an Nth kiosk image of biometric information about the user from the ID card; N is a natural number larger than 3;
the user database connected to the first security kiosk; the user database configured to store the first kiosk image, second kiosk image, third kiosk image, and Nth kiosk image in an image gallery;
a surveillance camera configured to capture a set of surveillance images of the user; the set of images comprising a first surveillance image, a second surveillance image, a third surveillance image, and a Nth surveillance image; wherein N is a natural number greater than 3;
a surveillance database comprising the set of surveillance images captured by a plurality of surveillance cameras;
a surveillance logic comprising a processor, computer readable media, memory, a network interface, and computer code non-transitorily stored in the memory and executable by the processor to cause the processor to:
execute a morphed image detection algorithm comprising parameters;
determine a first relative similarity value of the first surveillance image as compared to the reference image;
determine a second relative similarity value of the second surveillance image as compared to the reference image;
determine a third relative similarity value of the third surveillance image as compared to the reference image;
determine a Nth relative similarity value of the Nth surveillance image as compared to the reference image;
flag the first surveillance image as a morphed image if any of the relative similarity values are below a similarity threshold; and
flag the first surveillance image as not comprising a morphed image if none of the relative similarity values are below the similarity threshold;
communication logic configured to send a signal to an access control device comprising:
instructions to shift the access control device into an access granted position if the surveillance logic has flagged the ID card as not comprising a morphed image;
instructions to shift the access control device into an access denied position if the surveillance logic has flagged the ID card as comprising a morphed image; and
the access control device configured to receive the signal from the communication logic and shift into the access granted position or access denied position depending on the instructions.