| CPC G06V 40/40 (2022.01) [G06V 10/761 (2022.01); G06V 10/776 (2022.01); G06V 20/52 (2022.01); G06V 40/172 (2022.01); G06V 40/50 (2022.01); G07C 9/257 (2020.01)] | 15 Claims |

|
1. A security system comprising:
an enrollment logic configured to store in a user record in a user database:
reference biographic data about a user;
reference biometric data about the user;
a reference image of the user;
a first security kiosk configured to:
capture a first biographic information about the user from an ID card;
capture a first kiosk image of biometric information about the user from the ID card;
a second security kiosk configured to:
capture a second biographic information about the user from the ID card;
capture a second kiosk image of biometric information about the user from the ID card;
a third security kiosk configured to:
capture a third biographic information about the user from the ID card;
capture a third kiosk image of biometric information about the user from the ID card;
an Nth security kiosk configured to:
capture an Nth biographic information about the user from the ID card;
capture an Nth kiosk image of biometric information about the user from the ID card; N is a natural number larger than 3;
the user database connected to the first security kiosk; the user database configured to store the first kiosk image, second kiosk image, third kiosk image, and Nth kiosk image in an image gallery;
a surveillance camera configured to capture a set of surveillance images of the user; the set of images comprising a first surveillance image, a second surveillance image, a third surveillance image, and a Nth surveillance image; wherein N is a natural number greater than 3;
a surveillance database comprising the set of surveillance images captured by a plurality of surveillance cameras;
a surveillance logic comprising a processor, computer readable media, memory, a network interface, and computer code non-transitorily stored in the memory and executable by the processor to cause the processor to:
execute a morphed image detection algorithm comprising parameters;
determine a first relative similarity value of the first surveillance image as compared to the reference image;
determine a second relative similarity value of the second surveillance image as compared to the reference image;
determine a third relative similarity value of the third surveillance image as compared to the reference image;
determine a Nth relative similarity value of the Nth surveillance image as compared to the reference image;
flag the first surveillance image as a morphed image if any of the relative similarity values are below a similarity threshold; and
flag the first surveillance image as not comprising a morphed image if none of the relative similarity values are below the similarity threshold;
communication logic configured to send a signal to an access control device comprising:
instructions to shift the access control device into an access granted position if the surveillance logic has flagged the ID card as not comprising a morphed image;
instructions to shift the access control device into an access denied position if the surveillance logic has flagged the ID card as comprising a morphed image; and
the access control device configured to receive the signal from the communication logic and shift into the access granted position or access denied position depending on the instructions.
|