Morphed image detection logic and surveillance systems

Inventors

Vemury, Arun

Assignees

US Department of Homeland Security

Publication Number

US-12354412-B1

Publication Date

2025-07-08

Expiration Date

2044-10-17

Interested in licensing this patent?

MTEC can help explore whether this patent might be available for licensing for your application.


Abstract

Aspects of the present invention relate to machines, systems, and methods for detecting a morphed image on an ID card associated with a user. The invention may comprise a plurality of security kiosks, a user database, morphed image detection logic, surveillance cameras, a surveillance database, surveillance similarity logic, user identification logic, message logic, and detainment logic. The machines, systems, and methods may assist an operator in controlling access of an individual using an ID bearing a morphed image.

Core Innovation

The invention relates to machines, systems, and methods for detecting a morphed image on an ID card associated with a user. It comprises components such as multiple security kiosks, a user database, morphed image detection logic, surveillance cameras and database, surveillance similarity logic, user identification logic, message logic, and detainment logic. The system assists an operator in controlling access of an individual using an ID bearing a morphed image by scanning, storing, and analyzing images and biographic information over time and locations.

The morphed image detection logic involves generating similarity and dissimilarity profiles from images captured of a user at multiple points and analyzing these scores to determine whether the images likely comprise a morphed image. A morphed image is then flagged, and the system can instruct an access control device to deny access. Surveillance images captured remotely by cameras are similarly analyzed for morph detection. The system further includes user identification logic to match flagged images with stored card images, notify operators, and enact detainment or access denial procedures.

The problem being solved addresses security risks arising from morphing techniques by which a facial image on an ID card may resemble more than one person. Morphing can be electronic or organic (via makeup or disguise). Such morphs can allow individuals to impersonate others or gain unauthorized access, with current human and biometric verification systems prone to errors, including false positive matches. The invention addresses the need for automated, reliable detection of morphed images to mitigate threats such as fraudulent access or identity misrepresentation.

Claims Coverage

The patent discloses a security system with multiple inventive features across independent claims focused on morphed image detection and access control.

Multi-kiosk image capture and user record management

The system includes a plurality of security kiosks each capturing biographic and biometric information and images associated with a user’s ID card, storing multiple images in a user database to generate an image gallery.

Morphed image detection based on image similarity profiles

A morphed image detection logic generates multiple image similarity scores comparing different images of the user’s ID card, composes a similarity profile, and flags the ID card as morphed if any similarity score falls below a specified threshold.

Access control logic integrated with morphed image detection

Communication logic instructs an access control device to shift to an access granted position if the ID card is not flagged as morphed, or to an access denied position if flagged as morphed, with the access control device executing the commands accordingly.

Use of image dissimilarity profiles for morph detection

The morphed image detection logic may alternatively or additionally generate image dissimilarity profiles to flag ID cards where dissimilarity scores exceed a threshold, identifying morphed images.

Sequential authentication combining biographic, biometric, PIN, and morph detection

The system may perform sequential verification including biographic matching, biometric matching, and PIN verification prior to or concurrent with morphed image detection to authenticate the user and grant or deny access.

Automated flagging and messaging for morphed image detection

Upon detecting a morph, the system flags the ID card, sends messages to operators or security personnel, and may initiate detainment processes, enhancing security responses.

The independent claims collectively cover a comprehensive security system incorporating multi-point image capture, morph detection via similarity and dissimilarity profiling, integrated access control responses, user authentication steps, and operator notification for managing morphed image threats.

Stated Advantages

Detects morphed images on ID cards to prevent unauthorized access and reduce security risks.

Automates identification of morphed images using image similarity and dissimilarity profiles to improve reliability beyond human capability.

Integrates detection with access control devices to dynamically grant or deny access based on morph detection results.

Facilitates operator notification and possible detainment of individuals using morphed images, enhancing security enforcement.

Supports sequential authentication steps including biographic, biometric, and PIN verification for multi-layered security.

Documented Applications

Controlling physical access to secure areas such as airports, military bases, commercial buildings, and restricted locations using ID cards with facial images.

Verification of user identity at security kiosks distributed across multiple locations and times to track and analyze credential usage.

Surveillance monitoring and identification of users within secured perimeters via cameras and image similarity analysis for detecting morphing attempts.

Preventing fraud and security breaches arising from use of morphed images on official documents including passports, driver’s licenses, military IDs, and employee IDs.

Use in automated biometric authentication systems with integrated morph detection to improve accuracy and security decision-making.

JOIN OUR MAILING LIST

Stay Connected with MTEC

Keep up with active and upcoming solicitations, MTEC news and other valuable information.