Professional Documents
Culture Documents
A Project Report
on
AUTOMATED TOLL SYSTEM USING IMAGE PROCESSING
Submitted in partial fulfillment of the requirement for the award of the degree of
Bachelor of Engineering
In
Telecommunication Engineering
Submitted by
GOPI KRISHNAN.N
(1DS10TE032)
KARTHIK PADIYAR
NAKUL V SHET
(1DS10TE041)
(1DS10TE058)
H.O.D
Mr. SANDEEP K V
Dr. A R ASWATHA
Assistant Professor,
Dept. of Telecommunication Engg.,
DSCE, Bangalore
2013-14
CERTIFICATE
2013-14
Certified that the project work entitled "AUTOMATED TOLL SYSTEM USING IMAGE
PROCESSING" carried out by Mr.GOPI KRISHNAN N (1DS10TE032), Mr.KARTHIK
PADIYAR (1DS10TE041), Mr.NAKUL V SHET (1DS10TE058) are bonafide students of
Dayananda Sagar College of Engineering in partial fulfillment for the award of degree in
Bachelor of Engineering in Telecommunication Engineering of the Visvesvaraya
Technological University, Belgaum during the year 2013-14. It is certified that all
corrections/suggestions indicated for internal assessment have been incorporated in the report
deposited in the departmental library. The project report has been approved as it satisfies the
academic requirements in respect of project work prescribed for the said Degree.
Signature of Principal
(Mr.SANDEEP K V)
(Dr.A.R ASWATHA)
EXTERNAL VIVA
Name of the Examiner
1.
2.
ACKNOWLEDGEMENT
We take this opportunity to convey our gratitude to all those who have been kind enough to
offer their advice and provide assistance when needed which has led to the successful
completion of the project.
We would like to express our immense gratitude to our Principal, Dr. A.N.N MURTHY,
DSCE, Bangalore and Dr. ASWATHA A. R, Professor and Head, Department of
Telecommunication Engineering, Dayananda Sagar College of Engineering, Bangalore for
their constant support and motivation that has encouraged us to come up with this project and
also providing the right ambience for carrying out the work and the facilities provided to us.
We express our warm thanks to our internal guide Mr. SANDEEP K V, Assistant Professor,
Dept. of Telecommunication Engineering, Dayananda Sagar College of Engineering,
Bangalore for his skillful guidance, patience, concerned nature, constant supervision, timely
suggestion and constructive criticism in successful completion of our project in time.
We are grateful and thankful to all our friends, classmates who supported us in all stages in
making this seminar wonderful and successful.
Finally, we thank all the staff members of Telecommunication Engineering Department who
have rendered their valuable time and whole hearted support at all times for the successful
completion of this project.
GOPI KRISHNAN N
(1DS10TE032)
KARTHIK PADIYAR
(1DS10TE041)
NAKUL V SHET
(1DS10TE058)
ABSTRACT
In the past few years, the vehicular density has increased drastically. With this increase, it is
becoming difficult to keep track of each vehicle for purpose of law enforcement and traffic
management. Automatic Number Plate Recognition (ANPR) is used increasingly now a days
for automatic toll collection, maintaining traffic activities and law enforcement. Many
techniques have been proposed for plate detection, each having its own advantages and
disadvantages. The proposed project suggests an automated way of highway toll collection
based on the number plate of the vehicles when they pass through a toll collection booth. This
project deals in the field of Artificial Intelligence, Image Processing and Neural Networks in
the construction of an Automatic Number Plate Recognition System (ANPR).There will be
collection of the toll from the associated card and amount will be deducted. A corresponding
message will be sent to vehicle owners mobile number using GSM module. In case of theft,
the particular blacklisted vehicle will not be allowed to pass through toll gate. A corresponding
message will be sent to the owners mobile and Highway patrol. This project enhances the
performance of the system up to the maximum extent possible with less efforts and use of
computational resources.
CONTENTS
CERTIFICATE
ACKNOWLEDGEMENT
ABSTRACT
Title
Page no.
1. INTRODUCTION ...................................................................................................... 1
1.1. AUTOMATED NUMBER PLATE RECOGNITION........................................... 1
2. LITERATURE SURVEY ........................................................................................... 4
3. EXISTING SYSTEM.................................................................................................. 6
4. PROPOSED SYSTEM................................................................................................ 7
4.1. IMAGE ACQUISITION ...................................................................................... 8
4.2. PRE-PROCESSING............................................................................................. 8
4.3. EDGE DETECTION............................................................................................ 9
4.3.1 CANNY ALGORITHM INTRODCUTION ............................................. 9
4.3.2 CANNY EDGE DETECTION................................................................ 10
4.3.3 SMOOTHING ........................................................................................ 11
4.3.4 IMAGE GRADIENT .............................................................................. 12
4.3.5 FINDING EDGE DETECTION ............................................................. 12
4.3.6 NON MAXIMAL SUPPREISSION ....................................................... 13
4.3.7 DOUBLE THRESHOLDING ................................................................. 14
4.3.8 EDGE TRACKING BY HYSTERISIS ................................................... 14
4.4 MORPHOLOGICAL IMAGE .......................................................................... 15
4.5 EROSION ........................................................................................................ 17
LIST OF FIGURES
Fig. no.
Page no.
LIST OF TABLES
Table no.
Page no.
2013-14
CHAPTER 1
INTRODUCTION
With increasing number of vehicles on roads, it is getting difficult to manually
enforce laws and traffic rules for smooth traffic flow. Toll-booths are constructed on
freeways and parking structures, where the car has to stop to pay the toll or parking fees.
Also, Traffic Management systems are installed on freeways to check for vehicles moving
at speeds not permitted by law. All these processes have a scope of improvement. In the
centre of all these systems lies a vehicle. In order to automate these processes and make
them more effective, a system is required to easily identify a vehicle. The important
question here is how to identify a particular vehicle? The obvious answer to this question
is by using the vehicles number plate.
Vehicles in each country have a unique license number, which is written on its
license plate. This number distinguishes one vehicle from the other, which is useful
especially when both are of same make and model. An automated system can be
implemented to identify the license plate of a vehicle and extract the characters from the
region containing a license plate. The license plate number can be used to retrieve more
information about the vehicle and its owner, which can be used for further processing. Such
an automated system should be small in size, portable and be able to process data at
sufficient rate.
Page 1
2013-14
With the rapid development of highway and the wide use of vehicle, people have
started to pay more and more attention on the advanced, efficient and accurate intelligent
transportation systems (ITSs).
The automated number plate recognition (ANPR) task is quite challenging from
vehicle images due to the view point changes, when vehicle bodies and license plate have
similar colour, multi-style plate formats, and the non-uniform outdoor illumination
conditions during image acquisition. The ANPR is used widely for detecting speeding cars,
security control in restricted areas, unattended parking zones, traffic law enforcement, and
electronic toll collection, etc. The major steps to accomplish the proposed work can be
given as
1. Image acquisition
2. Pre-Processing
3. Edge Detection
4. Character Segmentation
5. Character Recognition and matching with database
The proposed system is to deal with the problem in toll collection in highways. The
human intervention makes the system very much prone to mistakes and inefficient thats
why we propose the system which will automatically capture the vehicles image and also
pre-process it by removing the effect of noise and blur with the help of image preprocessing activities. This pre-processed image which is the partial output is given to next
process i.e. for finding the region of interest which is our number plate. This process will
detect the number plate from the image taken. This partially processed image which is the
output of the previous step will be given to the next step which is of sharpening of the edges
of number plate. This sharpening is done with the help of Canny Edge detection algorithm
which along with sharpening of edges also enhances the quality of image using Gaussian
kernel as its filtering part. The sharpened image is than inputted to segmentation algorithm
which separates out individual characters from the output of previous step. From that we
will find out individual characters that are present in the number plate and we will match
them individually with the help of Artificial Neural Networking agents which will be
already trained with thousands of sample images.
Page 2
2013-14
The final output of the system will be the digitalized form of the numbers of the
number plate of vehicle and ultimately the toll amount is deducted automatically from the
prepaid card assigned to each vehicle.
After the toll amount is deducted a corresponding message will be sent to the mobile
number of vehicle owner which will be present in the database.
To ensure security, if the vehicle number is found to have cases registered against
it (Blacklisted) then it is not allowed to pass the toll booth and a message is sent to the
owner and the police simultaneously.
The messages will be sent using GSM Module. The contents of message will be as follows:
1. Vehicle Number.
2. Status of the vehicle.
3. Balance Amount in prepaid card.
4. Amount Deducted.
Page 3
2013-14
CHAPTER 2
LITERATURE SURVEY
This section includes the work already done on this system by various researchers
using different methodologies and algorithms. Following is the brief description of some
of them:
1. Car Plate Recognition Using the Template Matching Method is proposed by
M.I.Khalil
Page 4
2013-14
The tag can be read only at very short distances, typically a few feet at most. This
greatly limits the device for certain applications.
The tag is typically more expensive, often costing Rs.1500/- or more each
5. Vehicle License Plate Detection Method Based on Sliding Concentric Windows and
Histogram is proposed by Kaushik Deb,ETAL: A new method is adopted in this paper to
analyse road images which often contain vehicles and extract LP from natural properties
by finding vertical and horizontal edges from vehicle region.
6. Vertical Edges-based Car License Plate Detection Method is proposed by Abbas M. AlGhaili,ETAL.This method proposes a fast method for Car License Plate Detection (CLPD)
which presents three main contributions. The first one is that we propose a fast Vertical
Edge Detection Algorithm (VEDA) based on the contrast between the gray scale values,
which enhances the speed of CLPD method. The second contribution is that our proposed
CLPD method processes very low-resolution images taken by a web-camera.
7. Vehicles RC Plate Tracking based on Image Processing Applications is proposed by
Amina Khatra. This method describes a real time technique for identifying vehicle licenseplate and interpretation of the registration code from a captured image. The proposed
algorithm is divided into three stages: extraction of vehicle license plate from captured
vehicle image, segmentation of license plate characters and recognition of the license plate
characters for interpretation of vehicle registration code. Finally, a control algorithm is also
developed to choose between the recognition processes and reconstruct the registration
code from recognized characters.
Dept. of TCE, DSCE
Page 5
2013-14
CHAPTER 3
EXISTING SYSTEM
Vehicle enters the Toll
Booth
Operator inputs
Vehicle number
Toll is collected
through cash
At present, toll payment system in India is manual and drivers are using pay by cash
method to cross the toll booth. The flowchart for existing system is shown above.
The disadvantages of the system are as follows:
It is time consuming and drivers have to wait for long time for crossing the booth.
Page 6
2013-14
CHAPTER 4
PROPOSED SYSTEM
INPUT IMAGE FROM
CAMERA
PRE-PROCESSING
EDGE DETECTION
DEDUCT AMOUNT
Yes
DO NOT OPEN
TOLL BOOTH
GATE
SEND A MESSAGE
TO OWNER AND
HIGHWAY PATROL
CHARACTER
SEGMENTATION
PRE-RECOGNITION
CHARACTER
ENHANCEMENT
CHARACTER
RECOGNITION AND
MATCHING WITH
CHARACTER
DATABASE
OUTPUT VEHICLE
NUMBER
MATCHING WITH
VEHICLE DATABASE
Page 7
2013-14
4.2 PRE-PROCESSING
Pre-processing has to be performed by taking into account the background
illumination conditions and the number plate localization algorithms. It is important to
eliminate as much background noise as possible, contrast enhancement and de-blurring in
the pre-processing step itself to optimize the localization algorithm and also save the
processing time. For pre-processing we are going to use some MATLAB function which
will help in pre-processing of the image [1].
The algorithm described here is independent of the type of colours in image and
relies mainly on the gray level of an image for processing and extracting the required
information. Colour components like Red, Green and Blue value are not used throughout
this algorithm. So, if the input image is a coloured image represented by 3-dimensional
array in MATLAB, it is converted to a 2-dimensional gray image before further processing.
The Pre-processed image is shown below:
Page 8
2013-14
Page 9
2013-14
The aim is to develop an algorithm that is optimal with regards to the following criteria:
Detection: The probability of detecting real edge points should be maximized while
the probability of falsely detecting non-edge points should be minimized. This
corresponds to maximizing the signal-to-noise ratio.
Localization: The detected edges should be as close as possible to the real edges.
Number of responses: One real edge should not result in more than one detected
edge (one argue that this is implicitly included in the first requirement).
Edge detection consists of creating a binary image from a gray scale image where
non -background pixel values correspond to object boundaries. Edges can be detected with
the help of gradient/derivative type operators. As such they tend to be sensitive to noise so
an effective edge detection method depends on the nature of the image and the
characteristics of the noise [3].
Page 10
2013-14
Input
Image
4.3.3 SMOOTHING
In order to implement the canny edge detector algorithm, a series of steps must be
followed. The first step is to filter out any noise in the original image before trying to locate
and detect any edges. And because the Gaussian filter can be computed using a simple
mask, it is used exclusively in the Canny algorithm. Once a suitable mask has been
calculated, the Gaussian smoothing can be performed using standard convolution methods.
A convolution mask is usually much smaller than the actual image. As a result, the mask is
slid over the image, manipulating a square of pixels at a time. The larger the width of the
Gaussian mask, the lower is the detector's sensitivity to noise. The localization error in the
detected edges also increases slightly as the Gaussian width is increased. The Gaussian
mask used in implementation is shown below.
Page 11
2013-14
The magnitude, or edge strength, of the gradient is then approximated using the formula:
|G|= |Gx| + |Gy|
Page 12
2013-14
Then, it can be seen by looking at pixel a, there are only four possible directions
when describing the surrounding pixels 0 degrees (in the horizontal direction), 45 degrees
(along the positive diagonal), 90 degrees (in the vertical direction), or 135 degrees (along
the negative diagonal). So now the edge orientation has to be resolved into one of these
four directions depending on which direction it is closest to (e.g. if the orientation angle is
found be 3 degrees, make it zero degrees). Think of this as taking a semicircle and dividing
it into 5 regions.
Page 13
2013-14
Page 14
2013-14
The pattern of ones and zeros specifies the shape of the structuring element.
An origin of the structuring element is usually one of its pixels, although generally
the origin can be outside the structuring element.
Page 15
2013-14
A common practice is to have odd dimensions of the structuring matrix and the
origin defined as the centre of the matrix. Structuring elements play in morphological image
processing the same role as convolution kernels in linear image filtering.
Fig 4.9 Fitting and hitting of a binary image with structuring elements s 1 and s2.
Page 16
2013-14
Zero-valued pixels of the structuring element are ignored, i.e. indicate points where the
corresponding image value is irrelevant.
4.5 EROSION
Erosion is one of the two basic operators in the area of mathematical morphology,
the other being dilation. It is typically applied to binary images, but there are versions that
work on grayscale images. The basic effect of the operator on a binary image is to erode
away the boundaries of regions of foreground pixels (i.e. white pixels, typically). Thus
areas of foreground pixels shrink in size, and holes within those areas become larger.
The erosion operator takes two pieces of data as inputs. The first is the image which
is to be eroded. The second is a (usually small) set of coordinate points known as
a structuring element (also known as a kernel). [5]
It is this structuring element that determines the precise effect of the erosion on the
input image. The mathematical definition of erosion for binary images is as follows:
Suppose that X is the set of Euclidean coordinates corresponding to the input binary
image, and that K is the set of coordinates for the structuring element.
Page 17
2013-14
Then the erosion of X by K is simply the set of all points x such that Kx is a subset
of X.
The mathematical definition for grayscale erosion is identical except in the way in
which the set of coordinates associated with the input image is derived. In addition, these
coordinates are 3-D rather than 2-D.
As an example of binary erosion, suppose that the structuring element is a 33
square, with the origin at its center as shown in Figure 1. Note that in this and subsequent
diagrams, foreground pixels are represented by 1's and background pixels by 0's.
Page 18
2013-14
Most implementations of this operator will expect the input image to be binary,
usually with foreground pixels at intensity value 255, and background pixels at intensity
value 0. Such an image can often be produced from a grayscale image using thresholding.
It is important to check that the polarity of the input image is set up correctly for the erosion
implementation being used.
The structuring element may have to be supplied as a small binary image, or in a
special matrix format, or it may simply be hardwired into the implementation, and not
require specifying at all. In this latter case, a 33 square structuring element is normally
assumed which gives the shrinking effect described above. The effect of an erosion using
this structuring element on a binary image is shown in Figure 2.
Page 19
2013-14
Fig 4.13 The graphs show a vertical cross-section through a graylevel image.
Page 20
2013-14
Page 21
2013-14
Page 22
2013-14
The letters NNET receives a 130x1 vector in the form of figures. It passes through
the first log sigmoid hidden layer which contains 17 neurons and finally it enters the output
log-sigmoid layer which contains 14 neurons, leading to the vector a2. The output 14x1
vector values correspond to the sequence of letters (, , , , , , , , , , , , ,
) and are between 0 and 1 (due to the log-sigmoid function). [7]
It can be said that each value represents the probability that the input signature is
classified to a specific number. The final result is provided through a competitive transfer
function which returns the index with the optimum value. The numbers NNET works
identically to the letters network, except that it uses 22 neurons in the hidden layer and 10
neurons in the output layer, corresponding to the sequence of numbers (1, 2, 3, 4, 5, 6, 7, 8,
9, and 0). Both NNETs were initially trained with the Gradient descent method using
adaptive learning and a single set of letters and signatures.
Then, the learning was continued by applying artificial (random) noise to the
signatures, in order to increase the ability of the system to recognize disturbed digits.
Finally, in order to preserve the networks ability to classify the standard (initial) signatures,
it was further trained using the initial signatures set.
Page 23
2013-14
The output of this section will contain vehicle number in digitized form which will
form the input to hardware section.
Page 24
2013-14
CHAPTER 5
PIC18F13K50 Microcontroller
MAX232
CONNECTOR DB9
Page 25
2013-14
single
integrated
circuit
containing
processor
core,
memory,
and
programmable input/output peripherals. Program memory in the form of NOR flash or OTP
ROM is also often included on chip, as well as a typically small amount of RAM.
Microcontrollers are designed for embedded applications, in contrast to the
microprocessors used in personal computers or other general purpose applications.
Microcontrollers are used in automatically controlled products and devices, such as
automobile engine control systems, implantable medical devices, remote controls, office
machines, appliances, power tools, toys and other embedded systems. By reducing the size
and cost compared to a design that uses a separate microprocessor, memory, and
input/output devices, microcontrollers make it economical to digitally control even more
devices and processes. Mixed signal microcontrollers are common, integrating analog
components needed to control non-digital electronic systems. We have used PIC18F13K50
microcontroller for interfacing the GSM Module in order to send the message to vehicle
owners as the pass the toll booth. The features of the PIC18FK50 microcontroller is given
below which makes it efficient to use for our project.
Page 26
2013-14
Up to 5 PWM Outputs
Page 27
2013-14
5.2 GSM-300
GSM stands for Global System for Mobile Communications. It is a standard set
developed by the European Telecommunications Standards Institute (ETSI) to describe
protocols for second generation (2G) digital cellular networks used by mobile phones.
A Modem is a device which modulates and demodulates signals as required to meet
the communication requirements. It modulates an analog carrier signal to encode digital
information, and also demodulates such a carrier signal to decode the transmitted
information. A GSM Modem is a device that modulates and demodulates the GSM signals
and in this particular case 2G signals. The modem we are using is SIMCOM SIM300.
Page 28
2013-14
Page 29
2013-14
Security Applications
Sensor Monitoring
5.3 MAX232 IC
The MAX232 is an IC, first created in 1987 by Maxim Integrated Products, that
converts signals from an RS-232 serial port to signals suitable for use in TTL compatible
digital logic circuits. The MAX232 is a dual driver/receiver and typically converts the RX,
TX, CTS and RTS signals.
The drivers provide RS-232 voltage level outputs (approx. 7.5 V) from a single
+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for
implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V
to + 5 V range, as power supply design does not need to be made more complicated just for
driving the RS-232 in this case.
Page 30
2013-14
The receivers reduce RS-232 inputs (which may be as high as 25 V), to standard
5 V TTL levels. These receivers have a typical threshold of 1.3 V, and a typical hysteresis of
0.5 V.
Page 31
2013-14
5.4 RS-232
In telecommunications, RS-232 is a standard for serial communication transmission
of data. It formally defines the signals connecting between a DTE (data terminal equipment)
such as a computer terminal, and a DCE (data circuit-terminating equipment, originally
defined as data communication equipment), such as a modem. The RS-232 standard is
commonly used in computer serial ports. The standard defines the electrical characteristics
and timing of signals, the meaning of signals, and the physical size and pinout of
connectors. The current version of the standard is TIA-232-F Interface between Data
Terminal Equipment and Data Circuit-Terminating Equipment Employing Serial Binary
Data Interchange, issued in 1997.
An RS-232 serial port was once a standard feature of a personal computer, used for
connections to modems, printers, mice, data storage, uninterruptible power supplies, and
other peripheral devices. However, RS-232 is hampered by low transmission speed, large
voltage swing, and large standard connectors. In modern personal computers, USB has
displaced RS-232 from most of its peripheral interface roles. Many computers do not come
equipped with RS-232 ports and must use either an external USB-to-RS-232 converter or
an internal expansion card with one or more serial ports to connect to RS-232 peripherals.
RS-232 devices are still found, especially in industrial machines, networking equipment,
and scientific instruments.
Page 32
2013-14
DB9 connectors were commonly used for serial peripheral devices like keyboards,
mice, joysticks, etc. Also they are used on DB9 cable assemblies for data connectivity.
Today, the DB9 has mostly been replaced by more modern interfaces such as USB,
PS/2, Fire wire, and others. However, there are still many legacy devices that use the DB9
interface for serial communication.
SIG.
Signal Name
DTE (PC)
DCD
in
RXD
Receive Data
in
TXD
Transmit Data
out
DTR
out
GND
Signal Ground
DSR
in
RTS
Request to Send
out
CTS
Clear to Send
in
RI
Ring Indicator
in
Page 33
2013-14
Fig 5.5 The DTE (PC) has the male connector (shown below), and the DCE
(peripheral) has the female.
Page 34
2013-14
78xx series ICs do not require additional components to provide a constant, regulated
source of power, making them easy to use, as well as economical and efficient uses of
space. Other voltage regulators may require additional components to set the output
voltage level, or to assist in the regulation process. Some other designs (such as
aswitched-mode power supply) may need substantial engineering expertise to
implement.
78xx series ICs have built-in protection against a circuit drawing too much power. They
have protection against overheating and short-circuits, making them quite robust in
most applications. In some cases, the current-limiting features of the 78xx devices can
provide protection not only for the 78xx itself, but also for other parts of the circuit.
Page 35
2013-14
CHAPTER 6
SOFTWARE DESCRIPTION
6.1 MATLAB R2013a
MATLAB is a high-level language and interactive environment for numerical
computation, visualization, and programming. Using MATLAB, you can analyse data,
develop algorithms, and create models and applications. The language, tools, and built-in
math functions enable you to explore multiple approaches and reach a solution faster than
with spreadsheets or traditional programming languages, such as C/C++ or Java. You can
use MATLAB for a range of applications, including signal processing and communications,
image and video processing, control systems, test and measurement, computational finance,
and computational biology. More than a million engineers and scientists in industry and
academia use MATLAB, the language of technical computing.
Key Features
Built-in graphics for visualizing data and tools for creating custom plots
Development tools for improving code quality and maintainability and maximizing
performance
Page 36
2013-14
Key Features
Import existing MPLAB v8 projects and use either IDE for the same source
Supports the ability to enter File Code Templates with license headers or template
code
MPLAB can Track Changes within your own system using local history
Within MPLAB, a user can configure their own Code Format Style
Page 37
2013-14
CHAPTER 7
APPLICATIONS
Automatic Number Plate Recognition systems are valuable tools for meeting
several policing aims including reducing terrorism and criminal offense,
reducing targeted visitors casualties and for making better use of safety
resources.
Complete monitoring of car parks areas, logistic centres, border crossing and
airports.
Page 38
2013-14
CHAPTER 8
Eco-friendly.
8.2 DISADVANTAGES
Page 39
2013-14
CHAPTER 9
In both cases, the status of the vehicle, the balance amount in the prepaid card and the
vehicle owners number is found out by comparing the vehicle number with a database.
Page 40
2013-14
9.3 CONCLUSION
In this report, we have discussed about the processing of vehicle image acquired from the
camera and extracting the region of interest from which the final number, in alpha numeric
form, is obtained. This number is compared with the database and the toll is deducted from
the prepaid card account. A corresponding message is sent to the mobile of the owner. In
case of theft, the vehicle number would be blacklisted and if the respective vehicle
approaches toll collection booth it can be found out and the vehicle can be withheld. With
this we have added a security feature to our system. This method is efficient if the vehicle
number plates are standardized and also subjected to proper lighting. This method is cost
effective and can be integrated with the existing system in India without much changes.
This method also reduces the waiting time and hence avoids long queues of vehicles piled
up at the toll collection centre. Hence we have proposed a technique to enhance the toll
collection system with limited resources.
Page 41
2013-14
REFERENCES
[1] Amina Khatra, Vehicles RC Plate Tracking based on Image Processing
Applications, International Journal of Scientific Engineering and Research (IJSER)
Volume 1 Issue 4, December 2013
[2] Pranoti Salunke, ETAL, Automated Toll Collection System Using RFID,IOSR
Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 22788727Volume 9, Issue 2 (Jan. - Feb. 2013)
[3] Rupali Kate, Dr. Chitode. J. S, Number Plate Recognition Using Segmentation,
International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9,
November- 2012 ISSN: 2278-0181
[4] Asif Ali Laghari, ETAL, RFID Based Toll Deduction System, .J. Information
Technology and Computer Science, 2012, 4, 40-46, Published Online April 2012 in MECS
[5] Abbas M. Al-Ghaili, ETAL, Vertical Edges-based Car License Plate Detection
Method, 2012, IEEE. Manuscript received January 25, 2012.
[6] Md. Farhad Ismail, M.A.R. Sarkar, Development of a Model for Electronic Toll
Collection System I.J. Intelligent Systems and Applications, 2012, 1, 39-45
Matching Method,
[8] Kumar Parasuraman, SVM Based License Plate Recognition System, 2010 IEEE
International Conference on Computational Intelligence and Computing Research
Page 42
2013-14
[9] Kaushik Deb, ETAL, Vehicle License Plate Detection Method Based on Sliding
Concentric Windows and Histogram, JOURNAL OF COMPUTERS, VOL. 4, NO. 8,
AUGUST 2009
[11] Mrs. J. V. Bagade, ETAL, Automatic Number Plate Recognition System: Machine
Learning Approach
[12] Yu-fai Fung, ETAL, Image Processing Application in Toll Collection, IAENG
International Journal of Computer Science, 32:4, IJCS_32_4_15
Page 43