Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 213-219.doi: 10.11896/JsJkx.191100089

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Contaminated and Shielded Number Plate Recognition Based on Convolutional Neural Network

LI Lin1, ZHAO Kai-yue1, ZHAO Xiao-yong2, WEI Shuai-qin3 and ZHANG Bing4   

  1. 1 College of Information and Science Engineering,Yanshan University,Qinhuangdao,Hebei 066004,China
    2 School of Information Management,BeiJing University of Information Technology,BeiJing 100097,China
    3 Teaching and Research Support Center of Air Force Command College,BeiJing 100097,China
    4 Command Center of Police Traffic Detachment Cangzhou,Cangzhou,Hebei 061000,China
  • Published:2020-07-07
  • About author:LI Lin, born in 1977, Ph.D, associate professor.His main research intrests include embedded system and signal processing.
    ZHAO Kai-yue, born in 1993, postgra-duate.His main research intrests include machine learning and pattern re-cognition.
  • Supported by:
    This work was supproted by the General ProJect of Science and Technology Plan of BeiJing Municipal Education Commission (KM201711232018),National Natural Science Foundation ProJect (61502039),Research ProJect of Model and Optimization Control of Software Defined Energy Internet and General ProJect of Science and Technology Plan of BeiJing University of Information Technology in 2019 (KM201911232002).

Abstract: As one of the important components of intelligent transportation,license plate recognition plays an irreplaceable role in people’s daily life.For example,in daily life,illegal vehicles often avoid punishment because of the number plate contamination and occlusion,which further increases the difficulty of law enforcement.Therefore,improving the recognition efficiency of contaminated license plate is still a crucial issue in today’s automatic recognition system.The paper mainly focuses on the recognition of shielded number plate.There are four main cases:normal number plate,partially shielded number plate,completely shielded number plate and not hanging plate.The traditional OCR algorithm has a high accuracy in the recognition of Chinese characters,characters and numbers.When it is applied to the recognition of license plates,although the detection of normal and partial shielded license plates shows a good recognition effect,the recognition effect of completely shielded number plates and not hanging license plates is still very poor.With the development of artificial intelligence,it is possible to get better recognition on completely shielded plates and not hanging plates.Therefore,combined with the advantages of traditional algorithms,this paper adopted OCR technology and the current deep learning algorithm to optimize the recognition effect of stained license plate.

Key words: Intelligent transportation, Target detection, Contaminated license plate, Deep learning, OCR

CLC Number: 

  • TP311.5
[1] LI C Q.Research on Key Technologies of Fuzzy License Plate Image Recognition in Monitoring Video .NanJing:NanJing University of Posts and Telecommunications,2017.
[2] HU Z P,CHEN J L,WANG M,et al.New Progress of Convolutional Neural Network Classification Model in Pattern Recognition .Journal of Yanshan University,2015,39(4):283-291.
[3] LE C Y,BOTTOU L,BENGIO Y,et al.Gradient-Based learning applied to document recognition//Proc.of the IEEE.1998:2278-2324.
[4] BU Y J.Research on Algorithms of License Plate RecognitionSystem Based on Computer Vision .University of Electronic Science and Technology,2015.
[5] WANG Z.Research and Improvement of License Plate Recognition System .Shenyang:Shenyang University of Technology,2016.
[6] DING M L,DING M Y,NIU Y L,et al.A Method of Identifying Commodity Parameters in Pictures Based on Deep Learning .Journal of Software,2018,29(4):1039-1048.
[7] ZHANG S L.Research on Classification of Vehicle Brands Based on Vision .Dalian:Dalian University of Technology,2015.
[8] ZHANG S.Research on Docker Fault-tolerant Performance Monitoring and Adaptive Pre-replication Checkpoint Technology .Nanning:Guangxi University,2017.
[1] WANG Rui-ping, JIA Zhen, LIU Chang, CHEN Ze-wei, LI Tian-rui. Deep Interest Factorization Machine Network Based on DeepFM [J]. Computer Science, 2021, 48(1): 226-232.
[2] YU Wen-jia, DING Shi-fei. Conditional Generative Adversarial Network Based on Self-attention Mechanism [J]. Computer Science, 2021, 48(1): 241-246.
[3] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[4] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[5] HE Xin, XU Juan, JIN Ying-ying. Action-related Network:Towards Modeling Complete Changeable Action [J]. Computer Science, 2020, 47(9): 123-128.
[6] YE Ya-nan, CHI Jing, YU Zhi-ping, ZHAN Yu-liand ZHANG Cai-ming. Expression Animation Synthesis Based on Improved CycleGan Model and Region Segmentation [J]. Computer Science, 2020, 47(9): 142-149.
[7] DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168.
[8] BAO Yu-xuan, LU Tian-liang, DU Yan-hui. Overview of Deepfake Video Detection Technology [J]. Computer Science, 2020, 47(9): 283-292.
[9] YAO Lan, ZHAO Yong-heng, SHI Yu-qing, YU Ming-he. Highway Abnormal Event Detection Algorithm Based on Video Analysis [J]. Computer Science, 2020, 47(8): 208-212.
[10] YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91.
[11] WANG Wen-dao, WANG Run-ze, WEI Xin-lei, QI Yun-liang, MA Yi-de. Automatic Recognition of ECG Based on Stacked Bidirectional LSTM [J]. Computer Science, 2020, 47(7): 118-124.
[12] LIU Yan, WEN Jing. Complex Scene Text Detection Based on Attention Mechanism [J]. Computer Science, 2020, 47(7): 135-140.
[13] ZHANG Zhi-yang, ZHANG Feng-li, TAN Qi, WANG Rui-jin. Review of Information Cascade Prediction Methods Based on Deep Learning [J]. Computer Science, 2020, 47(7): 141-153.
[14] JIANG Wen-bin, FU Zhi, PENG Jing, ZHU Jian. 4Bit-based Gradient Compression Method for Distributed Deep Learning System [J]. Computer Science, 2020, 47(7): 220-226.
[15] CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling. False Message Propagation Suppression Based on Influence Maximization [J]. Computer Science, 2020, 47(6A): 17-23.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .