Automatically detecting criminal identity deception: An adaptive detection algorithm

G. Alan Wang, Hsinchun Chen, Homa Atabakhsh

Research output: Contribution to journalArticle

44 Citations (Scopus)

Abstract

Identity deception, specifically identity concealment, is a serious problem encountered in the law enforcement and intelligence communities. In this paper, the authors discuss techniques that can automatically detect identity deception. Most of the existing techniques are experimental and cannot be easily applied to real applications because of problems such as missing values and large data size. The authors propose an adaptive detection algorithm that adapts well to incomplete identities with missing values and to large datasets containing millions of records. The authors describe three experiments to show that the algorithm is significantly more efficient than the existing record comparison algorithm with little loss in accuracy. It can identify deception having incomplete identities with high precision. In addition, it demonstrates excellent efficiency and scalability for large databases. A case study conducted in another law enforcement agency shows that the authors’ algorithm is useful in detecting both intentional deception and unintentional data errors.

Original languageEnglish (US)
Pages (from-to)988-999
Number of pages12
JournalIEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans
Volume36
Issue number5
DOIs
StatePublished - 2006

Fingerprint

Law enforcement
Scalability
Experiments

Keywords

  • Efficiency
  • identity deception
  • missing value
  • scalability

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Software
  • Human-Computer Interaction
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Automatically detecting criminal identity deception : An adaptive detection algorithm. / Wang, G. Alan; Chen, Hsinchun; Atabakhsh, Homa.

In: IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Vol. 36, No. 5, 2006, p. 988-999.

Research output: Contribution to journalArticle

@article{e9bd324ac5ee42b6b942078382a0437b,
title = "Automatically detecting criminal identity deception: An adaptive detection algorithm",
abstract = "Identity deception, specifically identity concealment, is a serious problem encountered in the law enforcement and intelligence communities. In this paper, the authors discuss techniques that can automatically detect identity deception. Most of the existing techniques are experimental and cannot be easily applied to real applications because of problems such as missing values and large data size. The authors propose an adaptive detection algorithm that adapts well to incomplete identities with missing values and to large datasets containing millions of records. The authors describe three experiments to show that the algorithm is significantly more efficient than the existing record comparison algorithm with little loss in accuracy. It can identify deception having incomplete identities with high precision. In addition, it demonstrates excellent efficiency and scalability for large databases. A case study conducted in another law enforcement agency shows that the authors’ algorithm is useful in detecting both intentional deception and unintentional data errors.",
keywords = "Efficiency, identity deception, missing value, scalability",
author = "Wang, {G. Alan} and Hsinchun Chen and Homa Atabakhsh",
year = "2006",
doi = "10.1109/TSMCA.2006.871799",
language = "English (US)",
volume = "36",
pages = "988--999",
journal = "IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.",
issn = "1083-4427",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "5",

}

TY - JOUR

T1 - Automatically detecting criminal identity deception

T2 - An adaptive detection algorithm

AU - Wang, G. Alan

AU - Chen, Hsinchun

AU - Atabakhsh, Homa

PY - 2006

Y1 - 2006

N2 - Identity deception, specifically identity concealment, is a serious problem encountered in the law enforcement and intelligence communities. In this paper, the authors discuss techniques that can automatically detect identity deception. Most of the existing techniques are experimental and cannot be easily applied to real applications because of problems such as missing values and large data size. The authors propose an adaptive detection algorithm that adapts well to incomplete identities with missing values and to large datasets containing millions of records. The authors describe three experiments to show that the algorithm is significantly more efficient than the existing record comparison algorithm with little loss in accuracy. It can identify deception having incomplete identities with high precision. In addition, it demonstrates excellent efficiency and scalability for large databases. A case study conducted in another law enforcement agency shows that the authors’ algorithm is useful in detecting both intentional deception and unintentional data errors.

AB - Identity deception, specifically identity concealment, is a serious problem encountered in the law enforcement and intelligence communities. In this paper, the authors discuss techniques that can automatically detect identity deception. Most of the existing techniques are experimental and cannot be easily applied to real applications because of problems such as missing values and large data size. The authors propose an adaptive detection algorithm that adapts well to incomplete identities with missing values and to large datasets containing millions of records. The authors describe three experiments to show that the algorithm is significantly more efficient than the existing record comparison algorithm with little loss in accuracy. It can identify deception having incomplete identities with high precision. In addition, it demonstrates excellent efficiency and scalability for large databases. A case study conducted in another law enforcement agency shows that the authors’ algorithm is useful in detecting both intentional deception and unintentional data errors.

KW - Efficiency

KW - identity deception

KW - missing value

KW - scalability

UR - http://www.scopus.com/inward/record.url?scp=85008018414&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85008018414&partnerID=8YFLogxK

U2 - 10.1109/TSMCA.2006.871799

DO - 10.1109/TSMCA.2006.871799

M3 - Article

AN - SCOPUS:85008018414

VL - 36

SP - 988

EP - 999

JO - IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.

JF - IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.

SN - 1083-4427

IS - 5

ER -