Automating the customer verification process in a car sharing system based on machine learning methods

Authors

DOI:

https://doi.org/10.15587/1729-4061.2022.263571

Keywords:

know your customer, pattern recognition, optical character recognition, car sharing

Abstract

Convenient and accurate verification of the user of a car sharing system is one of the key components of the successful functioning of the car sharing system as a whole. The machine learning-based KYC (Know your customer) process algorithm makes it possible to improve the accuracy of customer data validation and verification. This makes it possible to eliminate possible losses and reputational losses of the company in case of unforeseen situations while using the client's car sharing services. The object of this study is to find a solution to the problem of user verification in a car sharing system based on the KYC process using deep learning methods with a combination of OCR (Optical Character Recognition) methods.

The statement of the user verification problem in the car sharing system was formalized and the key parameters for the KYC process have been determined. The algorithm of the KYC process was constructed. The algorithm includes six successive stages: separating a face in the photograph, comparing faces, checking documents and their validity period, establishing and recognizing ROI (region of interest), formulating a verification decision. To separate the face in the client's photograph and compare faces, methods based on deep learning, as well as the quick HoG method (Histogram of oriented gradients), were considered and implemented. Verification of these methods on a test dataset, which includes images of documents of two thousand clients, showed that the recognition accuracy was 91 % according to Jaccard's metric. The average time of face separation using the HoG method was 0.2 seconds and when using trained models – 3.3 seconds. Using a combination of ROI and ORC separation methods makes it possible to significantly improve the accuracy of verification. The proposed client verification algorithm is implemented as an API on an ML server and integrated into the car sharing system.

Author Biographies

Beibut Amirgaliyev, Astana IT University

Candidate of Technical Sciences, Professor

Department of Computer Engineering

Gulzhan Yegemberdiyeva, Astana IT University

Master of Computational and Cognitive Neuroscience, Lecturer

Department of Computer Engineering

Alexander Kuchansky, Taras Shevchenko National University of Kyiv

Doctor of Technical Sciences, Head of Department

Department of Information Systems and Technology

Yurii Andrashko, Uzhhorod National University

PhD, Associate Professor

Department of System Analysis and Optimization Theory

Ihor Korol, Uzhhorod National University

Doctor of Physical and Mathematical Sciences, Professor, Vice-Rector for Academic Policy and Research

Department of Algebra and Differential Equations

References

  1. Cerovsky, Z., Mindl, P. (2008). Hybrid electric cars, combustion engine driven cars and their impact on environment. 2008 International Symposium on Power Electronics, Electrical Drives, Automation and Motion. doi: https://doi.org/10.1109/speedham.2008.4581321
  2. Co2 emissions from cars: facts and figures (infographics) (2019). EU Parliament News. Available at: https://www.europarl.europa.eu/news/en/headlines/society/20190313STO31218/co2-emissions-from-cars-facts-and-figures-infographics
  3. Kagawa, S., Hubacek, K., Nansai, K., Kataoka, M., Managi, S., Suh, S., Kudoh, Y. (2013). Better cars or older cars?: Assessing CO2 emission reduction potential of passenger vehicle replacement programs. Global Environmental Change, 23 (6), 1807–1818. doi: https://doi.org/10.1016/j.gloenvcha.2013.07.023
  4. Shared mobility (2020). McKinsey Center for Future Mobility. Available at: https://www.mckinsey.com/features/mckinsey-center-for-future-mobility/overview/shared-mobility
  5. Why Machine Learning brings up to 57 percent savings in the KYC process. Actico. Available at: https://www.actico.com/blog-en/why-machine-learning-brings-up-to-57-savings-in-the-kyc-process/#:~:text=With%20their%20feedback%2C%20they%20improve,to%2057%20percent%20of%20clarifications
  6. Sitaraman, S. (2019). How we built an intelligent automation solution for kyc validation. Available at: https://www.srijan.net/resources/blog/intelligent-automation-solution
  7. Charoenwong, B. (2019). The one reason why ai/ml for aml/kyc has failed (so far). Available at: https://medium.com/@BenCharoenwong/the-one-reason-why-machine-learning-for-aml-kyc-has-failed-so-far-38e3388ad85c
  8. Pic, M., Mahfoudi, G., Trabelsi, A. (2019). Remote KYC: Attacks and Counter-Measures. 2019 European Intelligence and Security Informatics Conference (EISIC). doi: https://doi.org/10.1109/eisic49498.2019.9108787
  9. Do, T.-L., Tran, M.-K., Nguyen, H. H., Tran, M.-T. (2021). Potential Threat of Face Swapping to eKYC with Face Registration and Augmented Solution with Deepfake Detection. Lecture Notes in Computer Science, 293–307. doi: https://doi.org/10.1007/978-3-030-91387-8_19
  10. Darapaneni, N., Evoori, A. K., Vemuri, V. B., Arichandrapandian, T., Karthikeyan, G., Paduri, A. R. et. al. (2020). Automatic Face Detection and Recognition for Attendance Maintenance. 2020 IEEE 15th International Conference on Industrial and Information Systems (ICIIS). doi: https://doi.org/10.1109/iciis51140.2020.9342670
  11. Sun, X., Wu, P., Hoi, S. C. H. (2018). Face detection using deep learning: An improved faster RCNN approach. Neurocomputing, 299, 42–50. doi: https://doi.org/10.1016/j.neucom.2018.03.030
  12. Chang-Yeon, J. (2008). Face Detection using LBP features. Available at: http://cs229.stanford.edu/proj2008/Jo-FaceDetectionUsingLBPfeatures.pdf
  13. Mita, T., Kaneko, T., Hori, O. (2005). Joint Haar-like features for face detection. Tenth IEEE International Conference on Computer Vision (ICCV’05) Volume 1. doi: https://doi.org/10.1109/iccv.2005.129
  14. Malhotra, D., Saini, P., Singh, A. K. (2021). How Blockchain Can Automate KYC: Systematic Review. Wireless Personal Communications, 122 (2), 1987–2021. doi: https://doi.org/10.1007/s11277-021-08977-0
  15. Liu, Y., James, H., Gupta, O., Raviv, D. (2021). MRZ code extraction from visa and passport documents using convolutional neural networks. International Journal on Document Analysis and Recognition (IJDAR), 25 (1), 29–39. doi: https://doi.org/10.1007/s10032-021-00384-2
  16. Dalal, N., Triggs, B. (2005). Histograms of Oriented Gradients for Human Detection. 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05). doi: https://doi.org/10.1109/cvpr.2005.177
  17. Face recognition. Available at: https://pypi.org/project/face-recognition/
  18. Cnn based face detector. Dlib. Available at: http://dlib.net/cnn_face_detector.py.html
  19. Face Recognition. URL: https://github.com/ageitgey/face_recognition/
  20. Stefanovic, S. (2020). Face detection algorithms comparison. Available at: https://datahacker.rs/017-face-detection-algorithms-comparison/
  21. He, K., Gkioxari, G., Dollar, P., Girshick, R. (2017). Mask R-CNN. 2017 IEEE International Conference on Computer Vision (ICCV). doi: https://doi.org/10.1109/iccv.2017.322
  22. Leydesdorff, L. (2008). On the normalization and visualization of author co-citation data: Salton's Cosineversus the Jaccard index. Journal of the American Society for Information Science and Technology, 59 (1), 77–85. doi: https://doi.org/10.1002/asi.20732
  23. Lu, B., Chen, J.-C., Chellappa, R. (2020). UID-GAN: Unsupervised Image Deblurring via Disentangled Representations. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2 (1), 26–39. doi: https://doi.org/10.1109/tbiom.2019.2959133
  24. Verma, R., Ali, J. (2013). A comparative study of various types of image noise and efficient noise removal techniques. International Journal of advanced research in computer science and software engineering, 3 (10), 617–622. Available at: https://www.researchgate.net/publication/307545428_A_comparative_study_of_various_types_of_image_noise_and_efficient_noise_removal_techniques
  25. Yegemberdiyeva, G., Amirgaliyev, B. (2021). Study Of AI Generated And Real Face Perception. 2021 IEEE International Conference on Smart Information Systems and Technologies (SIST). doi: https://doi.org/10.1109/sist50301.2021.9465908
  26. Amirgaliyev, B., Andrashko, Y., Kuchansky, A. (2022). Building a dynamic model of profit maximization for a carsharing system accounting for the region’s geographical and economic features. Eastern-European Journal of Enterprise Technologies, 2 (4 (116)), 22–29. doi: https://doi.org/10.15587/1729-4061.2022.254718
  27. Kuchansky, A., Biloshchytskyi, A., Andrashko, Y., Biloshchytska, S., Honcharenko, T., Nikolenko, V. (2019). Fractal Time Series Analysis in Non-Stationary Environment. 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T). doi: https://doi.org/10.1109/picst47496.2019.9061554
  28. Kuchansky, A., Biloshchytskyi, A., Andrashko, Y., Biloshchytska, S., Shabala, Y., Myronov, O. (2018). Development of adaptive combined models for predicting time series based on similarity identification. Eastern-European Journal of Enterprise Technologies, 1 (4 (91)), 32–42. doi: https://doi.org/10.15587/1729-4061.2018.121620
  29. Kuchansky, A., Biloshchytskyi, A., Bronin, S., Biloshchytska, S., Andrashko, Y. (2020). Use of the Fractal Analysis of Non-stationary Time Series in Mobile Foreign Exchange Trading for M-Learning. Advances in Intelligent Systems and Computing, 950–961. doi: https://doi.org/10.1007/978-3-030-49932-7_88
  30. Kuchansky, A., Biloshchytskyi, A. (2015). Selective pattern matching method for time-series forecasting. Eastern-European Journal of Enterprise Technologies, 6 (4 (78)), 13. doi: https://doi.org/10.15587/1729-4061.2015.54812

Downloads

Published

2022-08-31

How to Cite

Amirgaliyev, B., Yegemberdiyeva, G., Kuchansky, A., Andrashko, Y., & Korol, I. (2022). Automating the customer verification process in a car sharing system based on machine learning methods. Eastern-European Journal of Enterprise Technologies, 4(2(118), 59–66. https://doi.org/10.15587/1729-4061.2022.263571