Image Processing for Criminal Pattern Detection Using Machine Learning in the Dark Web

Image Processing for Criminal Pattern Detection Using Machine Learning in the Dark Web

Sumit Dhariwal, Avani Sharma, Biswa Mohan Shaoo
DOI: 10.4018/978-1-6684-3942-5.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data mining has been used to present difficulties in this chapter in order to reduce crime. Crime is a major issue for which we must pay a high price in a variety of ways. Here, the authors look at how machine-learning techniques may be used in an image processing method to aid in the detection of and speed up the investigative process by identifying criminal tendencies. The authors look at the supervised approaches, as well as some enhancements, to help in the identification of criminal trends. They tested their approaches with real-world crime data from a police department, and they were satisfied with the results. They also employed clustering approaches to improve the prediction accuracy of criminal record categorization. They also utilized a clustering approach to assist classify crime records and improve prediction accuracy. They created a weighting system for the characteristics below. The machine-learning framework works with geospatial crime plotting and helps detectives and other law enforcement professionals increase their efficiency. It may also be used to combat terrorism and ensure national security.
Chapter Preview
Top

Introduction

We compare them to data mining systems and the extent to which a person is suspected, which are terms used in criminal justice and police agencies. For a long time, prosecutors in criminology and law enforcement have had the honor of prosecuting wrongdoing. As the use of computerized frameworks for tracking infractions grows, PC information specialists have begun to assist cops and criminal investigators in speeding up the most common method of resolving wrongdoings. We'll use a disciplinary method that combines software engineering and establishing a criminal justice system with an information excavating mindset to establish criminal justice system. To help differentiate cases of wrongdoing, we will use a bunching-based model even more clearly (Chen et al.,2008).

Computer vision is an artificial intelligence area that trains computers to observe and comprehend their environment, giving them a sense of awareness (Shah et al.,2020) and (Patel et al.,2020).

Figure 1.

Each black dot denotes the incidence of a crime in this geospatial map

978-1-6684-3942-5.ch009.f01

It has a wide range of applications, and its principal role is to analyses environmental data from a camera. Face recognition, number plate recognition, augmented and mixed realities, position determination, and object recognition are just a few of the applications that maybe It is now being investigated whether it is possible to construct mathematical techniques that can be retrieved and used by computers to analyses 3D images using semantics. Image classification is used to identify the image work. (Dhariwal et al., 2020).

Top

Mechanism For Reporting Crimes

The statistics on crime frequently pose an intriguing quandary. While certain information is kept private, some is made public. Data about the inmates are frequently available on county or sheriff's websites. Data on narcotics-related offenses and juvenile cases, on the other hand, is generally more limited. Similarly, although the victim's name is typically disguised, information about sex offenders is made public to warn others in the region. As a result, the analyst must deal with all these public vs. private data issues as part of data mining to guarantee that the data mining modeling process does not violate these legal borders (Szeliski et al.,2010). Free text boxes are frequently the most difficult part of data mining for crime data. While free text fields might provide a fantastic narrative line for a newspaper columnist, it's not always easy to turn them into data mining assets. We'll look at how to figure out the most essential aspects of a data-mining model.

Complete Chapter List

Search this Book:
Reset