Morphed image detection logic and surveillance systems
Inventors
Assignees
US Department of Homeland Security
Publication Number
US-12354412-B1
Publication Date
2025-07-08
Expiration Date
2044-10-17
Interested in licensing this patent?
MTEC can help explore whether this patent might be available for licensing for your application.
Abstract
Aspects of the present invention relate to machines, systems, and methods for detecting a morphed image on an ID card associated with a user. The invention may comprise a plurality of security kiosks, a user database, morphed image detection logic, surveillance cameras, a surveillance database, surveillance similarity logic, user identification logic, message logic, and detainment logic. The machines, systems, and methods may assist an operator in controlling access of an individual using an ID bearing a morphed image.
Core Innovation
The invention relates to machines, systems, and methods for detecting a morphed image on an ID card associated with a user. It comprises components such as multiple security kiosks, a user database, morphed image detection logic, surveillance cameras and database, surveillance similarity logic, user identification logic, message logic, and detainment logic. The system assists an operator in controlling access of an individual using an ID bearing a morphed image by scanning, storing, and analyzing images and biographic information over time and locations.
The morphed image detection logic involves generating similarity and dissimilarity profiles from images captured of a user at multiple points and analyzing these scores to determine whether the images likely comprise a morphed image. A morphed image is then flagged, and the system can instruct an access control device to deny access. Surveillance images captured remotely by cameras are similarly analyzed for morph detection. The system further includes user identification logic to match flagged images with stored card images, notify operators, and enact detainment or access denial procedures.
The problem being solved addresses security risks arising from morphing techniques by which a facial image on an ID card may resemble more than one person. Morphing can be electronic or organic (via makeup or disguise). Such morphs can allow individuals to impersonate others or gain unauthorized access, with current human and biometric verification systems prone to errors, including false positive matches. The invention addresses the need for automated, reliable detection of morphed images to mitigate threats such as fraudulent access or identity misrepresentation.
Claims Coverage
The patent discloses a security system with multiple inventive features across independent claims focused on morphed image detection and access control.
Multi-kiosk image capture and user record management
The system includes a plurality of security kiosks each capturing biographic and biometric information and images associated with a user’s ID card, storing multiple images in a user database to generate an image gallery.
Morphed image detection based on image similarity profiles
A morphed image detection logic generates multiple image similarity scores comparing different images of the user’s ID card, composes a similarity profile, and flags the ID card as morphed if any similarity score falls below a specified threshold.
Access control logic integrated with morphed image detection
Communication logic instructs an access control device to shift to an access granted position if the ID card is not flagged as morphed, or to an access denied position if flagged as morphed, with the access control device executing the commands accordingly.
Use of image dissimilarity profiles for morph detection
The morphed image detection logic may alternatively or additionally generate image dissimilarity profiles to flag ID cards where dissimilarity scores exceed a threshold, identifying morphed images.
Sequential authentication combining biographic, biometric, PIN, and morph detection
The system may perform sequential verification including biographic matching, biometric matching, and PIN verification prior to or concurrent with morphed image detection to authenticate the user and grant or deny access.
Automated flagging and messaging for morphed image detection
Upon detecting a morph, the system flags the ID card, sends messages to operators or security personnel, and may initiate detainment processes, enhancing security responses.
The independent claims collectively cover a comprehensive security system incorporating multi-point image capture, morph detection via similarity and dissimilarity profiling, integrated access control responses, user authentication steps, and operator notification for managing morphed image threats.
Stated Advantages
Detects morphed images on ID cards to prevent unauthorized access and reduce security risks.
Automates identification of morphed images using image similarity and dissimilarity profiles to improve reliability beyond human capability.
Integrates detection with access control devices to dynamically grant or deny access based on morph detection results.
Facilitates operator notification and possible detainment of individuals using morphed images, enhancing security enforcement.
Supports sequential authentication steps including biographic, biometric, and PIN verification for multi-layered security.
Documented Applications
Controlling physical access to secure areas such as airports, military bases, commercial buildings, and restricted locations using ID cards with facial images.
Verification of user identity at security kiosks distributed across multiple locations and times to track and analyze credential usage.
Surveillance monitoring and identification of users within secured perimeters via cameras and image similarity analysis for detecting morphing attempts.
Preventing fraud and security breaches arising from use of morphed images on official documents including passports, driver’s licenses, military IDs, and employee IDs.
Use in automated biometric authentication systems with integrated morph detection to improve accuracy and security decision-making.
Interested in licensing this patent?