Automating the customer verification process in a car sharing system based on machine learning methods
DOI:
https://doi.org/10.15587/1729-4061.2022.263571Keywords:
know your customer, pattern recognition, optical character recognition, car sharingAbstract
Convenient and accurate verification of the user of a car sharing system is one of the key components of the successful functioning of the car sharing system as a whole. The machine learning-based KYC (Know your customer) process algorithm makes it possible to improve the accuracy of customer data validation and verification. This makes it possible to eliminate possible losses and reputational losses of the company in case of unforeseen situations while using the client's car sharing services. The object of this study is to find a solution to the problem of user verification in a car sharing system based on the KYC process using deep learning methods with a combination of OCR (Optical Character Recognition) methods.
The statement of the user verification problem in the car sharing system was formalized and the key parameters for the KYC process have been determined. The algorithm of the KYC process was constructed. The algorithm includes six successive stages: separating a face in the photograph, comparing faces, checking documents and their validity period, establishing and recognizing ROI (region of interest), formulating a verification decision. To separate the face in the client's photograph and compare faces, methods based on deep learning, as well as the quick HoG method (Histogram of oriented gradients), were considered and implemented. Verification of these methods on a test dataset, which includes images of documents of two thousand clients, showed that the recognition accuracy was 91 % according to Jaccard's metric. The average time of face separation using the HoG method was 0.2 seconds and when using trained models – 3.3 seconds. Using a combination of ROI and ORC separation methods makes it possible to significantly improve the accuracy of verification. The proposed client verification algorithm is implemented as an API on an ML server and integrated into the car sharing system.
References
- Cerovsky, Z., Mindl, P. (2008). Hybrid electric cars, combustion engine driven cars and their impact on environment. 2008 International Symposium on Power Electronics, Electrical Drives, Automation and Motion. doi: https://doi.org/10.1109/speedham.2008.4581321
- Co2 emissions from cars: facts and figures (infographics) (2019). EU Parliament News. Available at: https://www.europarl.europa.eu/news/en/headlines/society/20190313STO31218/co2-emissions-from-cars-facts-and-figures-infographics
- Kagawa, S., Hubacek, K., Nansai, K., Kataoka, M., Managi, S., Suh, S., Kudoh, Y. (2013). Better cars or older cars?: Assessing CO2 emission reduction potential of passenger vehicle replacement programs. Global Environmental Change, 23 (6), 1807–1818. doi: https://doi.org/10.1016/j.gloenvcha.2013.07.023
- Shared mobility (2020). McKinsey Center for Future Mobility. Available at: https://www.mckinsey.com/features/mckinsey-center-for-future-mobility/overview/shared-mobility
- Why Machine Learning brings up to 57 percent savings in the KYC process. Actico. Available at: https://www.actico.com/blog-en/why-machine-learning-brings-up-to-57-savings-in-the-kyc-process/#:~:text=With%20their%20feedback%2C%20they%20improve,to%2057%20percent%20of%20clarifications
- Sitaraman, S. (2019). How we built an intelligent automation solution for kyc validation. Available at: https://www.srijan.net/resources/blog/intelligent-automation-solution
- Charoenwong, B. (2019). The one reason why ai/ml for aml/kyc has failed (so far). Available at: https://medium.com/@BenCharoenwong/the-one-reason-why-machine-learning-for-aml-kyc-has-failed-so-far-38e3388ad85c
- Pic, M., Mahfoudi, G., Trabelsi, A. (2019). Remote KYC: Attacks and Counter-Measures. 2019 European Intelligence and Security Informatics Conference (EISIC). doi: https://doi.org/10.1109/eisic49498.2019.9108787
- Do, T.-L., Tran, M.-K., Nguyen, H. H., Tran, M.-T. (2021). Potential Threat of Face Swapping to eKYC with Face Registration and Augmented Solution with Deepfake Detection. Lecture Notes in Computer Science, 293–307. doi: https://doi.org/10.1007/978-3-030-91387-8_19
- Darapaneni, N., Evoori, A. K., Vemuri, V. B., Arichandrapandian, T., Karthikeyan, G., Paduri, A. R. et. al. (2020). Automatic Face Detection and Recognition for Attendance Maintenance. 2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS). doi: https://doi.org/10.1109/iciis51140.2020.9342670
- Sun, X., Wu, P., Hoi, S. C. H. (2018). Face detection using deep learning: An improved faster RCNN approach. Neurocomputing, 299, 42–50. doi: https://doi.org/10.1016/j.neucom.2018.03.030
- Chang-Yeon, J. (2008). Face Detection using LBP features. Available at: http://cs229.stanford.edu/proj2008/Jo-FaceDetectionUsingLBPfeatures.pdf
- Mita, T., Kaneko, T., Hori, O. (2005). Joint Haar-like features for face detection. Tenth IEEE International Conference on Computer Vision (ICCV’05) Volume 1. doi: https://doi.org/10.1109/iccv.2005.129
- Malhotra, D., Saini, P., Singh, A. K. (2021). How Blockchain Can Automate KYC: Systematic Review. Wireless Personal Communications, 122 (2), 1987–2021. doi: https://doi.org/10.1007/s11277-021-08977-0
- Liu, Y., James, H., Gupta, O., Raviv, D. (2021). MRZ code extraction from visa and passport documents using convolutional neural networks. International Journal on Document Analysis and Recognition (IJDAR), 25 (1), 29–39. doi: https://doi.org/10.1007/s10032-021-00384-2
- Dalal, N., Triggs, B. (2005). Histograms of Oriented Gradients for Human Detection. 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05). doi: https://doi.org/10.1109/cvpr.2005.177
- Face recognition. Available at: https://pypi.org/project/face-recognition/
- Cnn based face detector. Dlib. Available at: http://dlib.net/cnn_face_detector.py.html
- Face Recognition. URL: https://github.com/ageitgey/face_recognition/
- Stefanovic, S. (2020). Face detection algorithms comparison. Available at: https://datahacker.rs/017-face-detection-algorithms-comparison/
- He, K., Gkioxari, G., Dollar, P., Girshick, R. (2017). Mask R-CNN. 2017 IEEE International Conference on Computer Vision (ICCV). doi: https://doi.org/10.1109/iccv.2017.322
- Leydesdorff, L. (2008). On the normalization and visualization of author co-citation data: Salton's Cosineversus the Jaccard index. Journal of the American Society for Information Science and Technology, 59 (1), 77–85. doi: https://doi.org/10.1002/asi.20732
- Lu, B., Chen, J.-C., Chellappa, R. (2020). UID-GAN: Unsupervised Image Deblurring via Disentangled Representations. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2 (1), 26–39. doi: https://doi.org/10.1109/tbiom.2019.2959133
- Verma, R., Ali, J. (2013). A comparative study of various types of image noise and efficient noise removal techniques. International Journal of advanced research in computer science and software engineering, 3 (10), 617–622. Available at: https://www.researchgate.net/publication/307545428_A_comparative_study_of_various_types_of_image_noise_and_efficient_noise_removal_techniques
- Yegemberdiyeva, G., Amirgaliyev, B. (2021). Study Of AI Generated And Real Face Perception. 2021 IEEE International Conference on Smart Information Systems and Technologies (SIST). doi: https://doi.org/10.1109/sist50301.2021.9465908
- Amirgaliyev, B., Andrashko, Y., Kuchansky, A. (2022). Building a dynamic model of profit maximization for a carsharing system accounting for the region’s geographical and economic features. Eastern-European Journal of Enterprise Technologies, 2 (4 (116)), 22–29. doi: https://doi.org/10.15587/1729-4061.2022.254718
- Kuchansky, A., Biloshchytskyi, A., Andrashko, Y., Biloshchytska, S., Honcharenko, T., Nikolenko, V. (2019). Fractal Time Series Analysis in Non-Stationary Environment. 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T). doi: https://doi.org/10.1109/picst47496.2019.9061554
- Kuchansky, A., Biloshchytskyi, A., Andrashko, Y., Biloshchytska, S., Shabala, Y., Myronov, O. (2018). Development of adaptive combined models for predicting time series based on similarity identification. Eastern-European Journal of Enterprise Technologies, 1 (4 (91)), 32–42. doi: https://doi.org/10.15587/1729-4061.2018.121620
- Kuchansky, A., Biloshchytskyi, A., Bronin, S., Biloshchytska, S., Andrashko, Y. (2020). Use of the Fractal Analysis of Non-stationary Time Series in Mobile Foreign Exchange Trading for M-Learning. Advances in Intelligent Systems and Computing, 950–961. doi: https://doi.org/10.1007/978-3-030-49932-7_88
- Kuchansky, A., Biloshchytskyi, A. (2015). Selective pattern matching method for time-series forecasting. Eastern-European Journal of Enterprise Technologies, 6 (4 (78)), 13. doi: https://doi.org/10.15587/1729-4061.2015.54812
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Beibut Amirgaliyev, Gulzhan Yegemberdiyeva, Alexander Kuchansky, Yurii Andrashko, Ihor Korol
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.