Abstract
The suspect vehicle detection system normally compares the list of criminal license plates and vehicle license plates gathering from various sensors in order to identify the criminal/suspect vehicles. However, the traditional process of comparing those license plates utilizing the matching of alphabet character is not effective. In traditional methods, the system unable to detect the criminal/suspect vehicles if the characters of the licence plate do not totally match with the blacklisted license plates. This paper proposes the use of reputation algorithm to detect the criminal/suspect vehicles that crossing the checkpoint which license plates match with the blacklist in the checkpoint database. In addition, we also use association analysis concept to detect the vehicles crossing the checkpoint that might relate to the criminal activity records. Our method can detect the suspect vehicles with forged license plate by using color, brand and type of the vehicles instead of only the license plate number matching method. These two techniques use a blacklist of criminal vehicles and criminal activity recorded in a criminal report database of Defence Technology Institute (DTI), Thailand, to help facilitate the detection process. From our extensive experiments, the results show that the reputation algorithm and the association analysis concept can improve the detection capability of the suspect vehicle detection system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patel, R.P., Patel, N.M., Brahmbhatt, K.: Automatic licenses plate recognition. Int. J. Comput. Sci. Mob. Comput. 2(4), 285–294 (2013)
Kaza, S., Wang, T., Gowda, H., Chen, H.: Target vehicle identification for border safety using mutual information. In: Proceedings of the 2005 IEEE Intelligent Transportation Systems, pp. 1141–1146 (2005)
Ashtari, A., Nordin, M., Fathy, M.: An Iranian license plate recognition system based on color features. IEEE Trans. Intell. Transp. Syst. 15(4), 1690–1705 (2014)
Sheng, H., Li, C., Wen, Q., Xiong, Z.: Real-time anti-interference location of vehicle license plates using high-definition video. IEEE Intell. Transp. Syst. Mag. 1(4), 17–23 (2009)
Bailey, D., Irecki, D., Lim, B., Yang, L.: Test bed for number plate recognition applications, In: Proceedings of the First IEEE International Workshop on Electronic Design, Test and Applications, pp. 501–503 (2002)
Adorni, G., Bergenti, F., Cagnoni, S., Mordonini, M.: License-plate recognition for restricted-access area control. In: Foresti, G., Mhnen, P., Regazzoni, C. (eds.) Multimedia Video-Based Surveillance Systems. The Springer International Series in Engineering and Computer Science, vol. 573, pp. 260–271. Springer, New York (2000)
Chen, Z., Pears, N., Freeman, M., Austin, J.: A Gaussian mixture model and support vector machine approach to vehicle type and colour classification. IET Intell. Transp. Syst. 8(2), 135–144 (2014)
Friedman, N., Russell, S.: Image segmentation in video sequences: a probabilistic approach. In: Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence, Series UAI’97, pp. 175–181. Morgan Kaufmann Publishers Inc., San Francisco (1997)
Stauffer, C., Grimson, W.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 747–757 (2000)
Hsieh, J.-W., Chen, L.-C., Chen, D.-Y.: Symmetrical surf and its applications to vehicle detection and vehicle make and model recognition. IEEE Trans. Intell. Transp. Syst. 15(1), 6–20 (2014)
Li, Q., Malip, A., Martin, K., Ng, S.-L., Zhang, J.: A reputation-based announcement scheme for vanets. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)
Dhurandher, S., Obaidat, M., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2014)
Ayday, E., Fekri, F.: An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Trans. Mob. Comput. 11(9), 1514–1531 (2012)
Kerdsri, J., Wipusitwarkun, K.: DORSI: data-wise opportunistic routing with spatial information. JCIT 8(13), 91–103 (2013)
Xie, M., Wang, H.: A collaboration-based autonomous reputation system for email services. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)
Chirita, P.-A., Diederich, J., Mailrank, W.N.: Using ranking for spam detection. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, ser. CIKM’05, pp. 373–380. ACM, New York (2005)
West, A.G., Aviv, A.J., Chang, J., Lee, I.: Spam mitigation using spatio-temporal reputations from blacklist history. In: Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC’10, pp. 161–170. ACM, New York (2010)
Zhang, H., Duan, H., Liu, W., Wu, J.: Ipgrouprep: a novel reputation based system for anti-spam. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC’09, pp. 513–518 (2009)
Altman, A., Tennenholtz, M.: Ranking systems: the pagerank axioms. In: Proceedings of the 6th ACM Conference on Electronic Commerce, ser. EC’05, pp. 1–8. ACM, New York (2005)
Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. In: Proceedings of the 7th International World Wide Web Conference, Brisbane, Australia, pp. 161–172 (1998)
Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in E-commerce environments. IEEE Internet Comput. 12(4), 55–59 (2008)
Kaza, S., Chen, H.: Suspect vehicle identification for border safety. In: Chen, H., Yang, C. (eds.) Intelligence and Security Informatics, ser. Studies in Computational Intelligence, vol. 135, pp. 305–318. Springer, Berlin (2008)
Umedu, T., Isu, K., Higashinoz, T., Toh, C.-K.: An intervehicular-communication protocol for distributed detection of dangerous vehicles. IEEE Trans. Veh. Technol. 59(2), 627–637 (2010)
Kaza, S., Xu, J., Marshall, B., Chen, H.: Topological analysis of criminal activity networks: enhancing transportation security. IEEE Trans. Intell. Transp. Syst. 10(1), 83–91 (2009)
Thiel, G.: Automatic CCTV surveillance-towards the virtual guard. IEEE Aerosp. Electron. Syst. Mag. 15(7), 3–9 (2000)
Ward, C.K., Patrick, H.: Word association norms, mutual information, and lexicography. Comput. Linguist. 16(1), 22–29 (1990)
Romashchenko, A.: Extracting the mutual information for a triple of binary strings. In: Proceedings of the 18th IEEE Annual Conference on Computational Complexity, pp. 221–229 (2003)
Exarchos, T., Papaloukas, C., Fotiadis, D., Michalis, L.: An association rule mining-based methodology for automated detection of ischemic ECG beats. IEEE Trans. Biomed. Eng. 53(8), 1531–1540 (2006)
Zhuang, Z., Zhang, B.: Application of association analysis in digital content industry. In: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), vol. 1, pp. 18–21 (2012)
Gengxin, M., Ziyu, G., Moser, L.E., Xifeng, Y., Shu, T., Nikos, A., Jimeng, S.: Latent association analysis of document pairs. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD’12, pp. 1415–1423. ACM, New York (2012)
Acknowledgments
This work is funded by basic research program from research and development department, Defence Technology Institute, Thailand.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Thongsatapornwatana, U., Chuenmanus, C. (2015). Suspect Vehicle Detection Using Vehicle Reputation with Association Analysis Concept. In: Matsuo, T., Hashimoto, K., Iwamoto, H. (eds) Tourism Informatics. Intelligent Systems Reference Library, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47227-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-47227-9_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47226-2
Online ISBN: 978-3-662-47227-9
eBook Packages: EngineeringEngineering (R0)