Skip to main content

Suspect Vehicle Detection Using Vehicle Reputation with Association Analysis Concept

  • Chapter
  • First Online:
Tourism Informatics

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 90))

Abstract

The suspect vehicle detection system normally compares the list of criminal license plates and vehicle license plates gathering from various sensors in order to identify the criminal/suspect vehicles. However, the traditional process of comparing those license plates utilizing the matching of alphabet character is not effective. In traditional methods, the system unable to detect the criminal/suspect vehicles if the characters of the licence plate do not totally match with the blacklisted license plates. This paper proposes the use of reputation algorithm to detect the criminal/suspect vehicles that crossing the checkpoint which license plates match with the blacklist in the checkpoint database. In addition, we also use association analysis concept to detect the vehicles crossing the checkpoint that might relate to the criminal activity records. Our method can detect the suspect vehicles with forged license plate by using color, brand and type of the vehicles instead of only the license plate number matching method. These two techniques use a blacklist of criminal vehicles and criminal activity recorded in a criminal report database of Defence Technology Institute (DTI), Thailand, to help facilitate the detection process. From our extensive experiments, the results show that the reputation algorithm and the association analysis concept can improve the detection capability of the suspect vehicle detection system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patel, R.P., Patel, N.M., Brahmbhatt, K.: Automatic licenses plate recognition. Int. J. Comput. Sci. Mob. Comput. 2(4), 285–294 (2013)

    Google Scholar 

  2. Kaza, S., Wang, T., Gowda, H., Chen, H.: Target vehicle identification for border safety using mutual information. In: Proceedings of the 2005 IEEE Intelligent Transportation Systems, pp. 1141–1146 (2005)

    Google Scholar 

  3. Ashtari, A., Nordin, M., Fathy, M.: An Iranian license plate recognition system based on color features. IEEE Trans. Intell. Transp. Syst. 15(4), 1690–1705 (2014)

    Article  Google Scholar 

  4. Sheng, H., Li, C., Wen, Q., Xiong, Z.: Real-time anti-interference location of vehicle license plates using high-definition video. IEEE Intell. Transp. Syst. Mag. 1(4), 17–23 (2009)

    Article  MATH  Google Scholar 

  5. Bailey, D., Irecki, D., Lim, B., Yang, L.: Test bed for number plate recognition applications, In: Proceedings of the First IEEE International Workshop on Electronic Design, Test and Applications, pp. 501–503 (2002)

    Google Scholar 

  6. Adorni, G., Bergenti, F., Cagnoni, S., Mordonini, M.: License-plate recognition for restricted-access area control. In: Foresti, G., Mhnen, P., Regazzoni, C. (eds.) Multimedia Video-Based Surveillance Systems. The Springer International Series in Engineering and Computer Science, vol. 573, pp. 260–271. Springer, New York (2000)

    Google Scholar 

  7. Chen, Z., Pears, N., Freeman, M., Austin, J.: A Gaussian mixture model and support vector machine approach to vehicle type and colour classification. IET Intell. Transp. Syst. 8(2), 135–144 (2014)

    Article  Google Scholar 

  8. Friedman, N., Russell, S.: Image segmentation in video sequences: a probabilistic approach. In: Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence, Series UAI’97, pp. 175–181. Morgan Kaufmann Publishers Inc., San Francisco (1997)

    Google Scholar 

  9. Stauffer, C., Grimson, W.: Learning patterns of activity using real-time tracking. IEEE Trans. Pattern Anal. Mach. Intell. 22(8), 747–757 (2000)

    Article  Google Scholar 

  10. Hsieh, J.-W., Chen, L.-C., Chen, D.-Y.: Symmetrical surf and its applications to vehicle detection and vehicle make and model recognition. IEEE Trans. Intell. Transp. Syst. 15(1), 6–20 (2014)

    Article  Google Scholar 

  11. Li, Q., Malip, A., Martin, K., Ng, S.-L., Zhang, J.: A reputation-based announcement scheme for vanets. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)

    Article  Google Scholar 

  12. Dhurandher, S., Obaidat, M., Jaiswal, A., Tiwari, A., Tyagi, A.: Vehicular security through reputation and plausibility checks. IEEE Syst. J. 8(2), 384–394 (2014)

    Article  Google Scholar 

  13. Ayday, E., Fekri, F.: An iterative algorithm for trust management and adversary detection for delay-tolerant networks. IEEE Trans. Mob. Comput. 11(9), 1514–1531 (2012)

    Article  Google Scholar 

  14. Kerdsri, J., Wipusitwarkun, K.: DORSI: data-wise opportunistic routing with spatial information. JCIT 8(13), 91–103 (2013)

    Google Scholar 

  15. Xie, M., Wang, H.: A collaboration-based autonomous reputation system for email services. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  16. Chirita, P.-A., Diederich, J., Mailrank, W.N.: Using ranking for spam detection. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, ser. CIKM’05, pp. 373–380. ACM, New York (2005)

    Google Scholar 

  17. West, A.G., Aviv, A.J., Chang, J., Lee, I.: Spam mitigation using spatio-temporal reputations from blacklist history. In: Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC’10, pp. 161–170. ACM, New York (2010)

    Google Scholar 

  18. Zhang, H., Duan, H., Liu, W., Wu, J.: Ipgrouprep: a novel reputation based system for anti-spam. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC’09, pp. 513–518 (2009)

    Google Scholar 

  19. Altman, A., Tennenholtz, M.: Ranking systems: the pagerank axioms. In: Proceedings of the 6th ACM Conference on Electronic Commerce, ser. EC’05, pp. 1–8. ACM, New York (2005)

    Google Scholar 

  20. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. In: Proceedings of the 7th International World Wide Web Conference, Brisbane, Australia, pp. 161–172 (1998)

    Google Scholar 

  21. Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in E-commerce environments. IEEE Internet Comput. 12(4), 55–59 (2008)

    Article  Google Scholar 

  22. Kaza, S., Chen, H.: Suspect vehicle identification for border safety. In: Chen, H., Yang, C. (eds.) Intelligence and Security Informatics, ser. Studies in Computational Intelligence, vol. 135, pp. 305–318. Springer, Berlin (2008)

    Google Scholar 

  23. Umedu, T., Isu, K., Higashinoz, T., Toh, C.-K.: An intervehicular-communication protocol for distributed detection of dangerous vehicles. IEEE Trans. Veh. Technol. 59(2), 627–637 (2010)

    Article  Google Scholar 

  24. Kaza, S., Xu, J., Marshall, B., Chen, H.: Topological analysis of criminal activity networks: enhancing transportation security. IEEE Trans. Intell. Transp. Syst. 10(1), 83–91 (2009)

    Article  Google Scholar 

  25. Thiel, G.: Automatic CCTV surveillance-towards the virtual guard. IEEE Aerosp. Electron. Syst. Mag. 15(7), 3–9 (2000)

    Article  Google Scholar 

  26. Ward, C.K., Patrick, H.: Word association norms, mutual information, and lexicography. Comput. Linguist. 16(1), 22–29 (1990)

    Google Scholar 

  27. Romashchenko, A.: Extracting the mutual information for a triple of binary strings. In: Proceedings of the 18th IEEE Annual Conference on Computational Complexity, pp. 221–229 (2003)

    Google Scholar 

  28. Exarchos, T., Papaloukas, C., Fotiadis, D., Michalis, L.: An association rule mining-based methodology for automated detection of ischemic ECG beats. IEEE Trans. Biomed. Eng. 53(8), 1531–1540 (2006)

    Article  Google Scholar 

  29. Zhuang, Z., Zhang, B.: Application of association analysis in digital content industry. In: 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID), vol. 1, pp. 18–21 (2012)

    Google Scholar 

  30. Gengxin, M., Ziyu, G., Moser, L.E., Xifeng, Y., Shu, T., Nikos, A., Jimeng, S.: Latent association analysis of document pairs. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD’12, pp. 1415–1423. ACM, New York (2012)

    Google Scholar 

Download references

Acknowledgments

This work is funded by basic research program from research and development department, Defence Technology Institute, Thailand.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ubon Thongsatapornwatana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Thongsatapornwatana, U., Chuenmanus, C. (2015). Suspect Vehicle Detection Using Vehicle Reputation with Association Analysis Concept. In: Matsuo, T., Hashimoto, K., Iwamoto, H. (eds) Tourism Informatics. Intelligent Systems Reference Library, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47227-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47227-9_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47226-2

  • Online ISBN: 978-3-662-47227-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics