Next Article in Journal
Parameters Derived from and/or Used with Digital Elevation Models (DEMs) for Landslide Susceptibility Mapping and Landslide Risk Assessment: A Review
Next Article in Special Issue
Ambient Population and Larceny-Theft: A Spatial Analysis Using Mobile Phone Data
Previous Article in Journal
An Improved Hybrid Segmentation Method for Remote Sensing Images
Previous Article in Special Issue
Comparing Residents’ Fear of Crime with Recorded Crime Data—Case Study of Ostrava, Czech Republic
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

How Is the Confidentiality of Crime Locations Affected by Parameters in Kernel Density Estimation?

1
College of Civil Engineering, Nanjing Forestry University, Nanjing 210037, China
2
National Engineering Research Center of Biomaterials, Nanjing Forestry University, Nanjing 210037, China
3
Department of Geography and GIS, University of Cincinnati, Cincinnati, OH 45221, USA
*
Author to whom correspondence should be addressed.
ISPRS Int. J. Geo-Inf. 2019, 8(12), 544; https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi8120544
Submission received: 5 October 2019 / Revised: 10 November 2019 / Accepted: 27 November 2019 / Published: 29 November 2019
(This article belongs to the Special Issue Using GIS to Improve (Public) Safety and Security)

Abstract

:
Kernel density estimation (KDE) is widely adopted to show the overall crime distribution and at the same time obscure exact crime locations due to the confidentiality of crime data in many countries. However, the confidential level of crime locational information in the KDE map has not been systematically investigated. This study aims to examine whether a kernel density map could be reverse-transformed to its original map with discrete crime locations. Using the Epanecknikov kernel function, a default setting in ArcGIS for density mapping, the transformation from a density map to a point map was conducted with various combinations of parameters to examine its impact on the deconvolution process (density to point location). Results indicate that if the bandwidth parameter (search radius) in the original convolution process (point to density) was known, the original point map could be fully recovered by a deconvolution process. Conversely, when the parameter was unknown, the deconvolution process would be unable to restore the original point map. Experiments on four different point maps—a random point distribution, a simulated monocentric point distribution, a simulated polycentric point distribution, and a real crime location map—show consistent results. Therefore, it can be concluded that the point location of crime events cannot be restored from crime density maps as long as parameters such as the search radius parameter in the density mapping process remain confidential.

1. Introduction

Kernel density estimation (KDE) is widely adopted to show the overall crime distribution and at the same time obscure exact crime locations due to the confidentiality of crime data in many countries [1,2,3,4,5,6]. In the field of crime prediction, KDE is widely used to generate hotspots, which are then used to guide police for targeted intervention. Compared to the city-wide patrol practice, hotspot-targeted patrol strategies could save police resources and deter crime [7,8]. Another benefit of KDE is that it could maintain the confidentiality of crime locations due to its ability to obscure locational information [4,9,10,11,12,13,14].
Compared to the large body of research and applications for density maps, the confidential level of crime locational information in KDE maps has not been systematically investigated [9,11,15,16]. This study aims to examine whether a kernel density map could be reverse-transformed to its original map with discrete crime locations. Considering the fact that the predictability of density maps could be affected by the bandwidth for KDE, the impact of KDE’s parameters on the confidentiality of density maps will be extensively examined in our current literature [17,18]. The conclusions are expected to answer whether—and to what extent—the locational information of a kernel density map is retained.

2. Literature Review

One important goal for crime prediction research is to identify crime hotspots. Crimes are not evenly distributed but concentrated within limited areas, which are usually called hotspots [7,10,19,20,21,22,23,24,25]. KDE is a popular method for crime mapping and hotspot detection [26]. Hotspot maps can also be used to indicate future crime risk [27,28]. Due to the attractiveness of hotspots to potential offenders [29,30,31,32,33,34], targeted intervention could help reduce and prevent future crime. Compared to the random patrol strategy, characterized as “a drop in the bucket” over a whole city, the hotspots provide targets for proactive policing patrol, saving great police effort and improving the efficiency of crime prevention initiatives [35,36,37].
The confidentiality of crime locations is of concern in many countries. Crime locations could lead to revealing victims’ locations, disclosing opportunity information to potential offenders, or even imparting experience to potential offenders [14,38]. To avoid such problems, various types of location protecting techniques have been used to protect these privacies [4,5,9,11,13,14]. Geocoding of crime events to a street segment or a city block can encrypt their precise geographic locations [4,5,6]. Transforming a point map to a density map can help mask the exact location of crime events [4,5,11,16,39]. KDE is one of the most commonly used locational protecting methods due to its outstanding ability to obscure location information and at the same time show the spatial distribution patterns of crimes [15,26,40,41].
With the aim of testing the confidentiality of crime locations in density maps, several research works have aimed to recover point maps from density maps [16]. For example, Lee, Chun and Griffith proposed a geometric center-based method to recover point maps [16], while Seidl, et al., evaluated the confidential level of masked maps [15]. Both studies were conducted on the spatial domain, and their recovering accuracies are extremely low for smooth density surfaces. It is acknowledged that most KDE calculations were conducted in the frequency domain rather than spatial domain [42,43,44]. Therefore, the confidentiality of density maps generated in the frequency domain should be examined in the frequency domain rather than the spatial domain. More importantly, the smoothness of density maps is closely related to the parameters (e.g., bandwidth) of kernel functions. The impact of the parameters of a kernel function on the confidentiality level of density map needs to be further investigated.

3. Research Questions and Methodology

To fill the aforementioned gap, this research aims to design a series of experiments to answer the following questions:
  • Question 1: How does kernel function’s parameter affect the confidential level of density maps?
  • Question 2: How does crime distribution pattern affect the confidential level of density maps?
  • Question 3: To what extent can a density map be recovered?

3.1. Convolution and Deconvolution

The process of transforming a point map to an undulated density map is a convolution process. Convolution can be mathematically interpreted as an operation on two functions to generate a third function that expresses how the shape of one is modified by another (Figure 1). In contrast, the process of transforming a density map to a point map is called deconvolution. A kernel function will be used to transform a density surface to a point map in this process. Deconvolution is used to remove the effect of one function on another and thus recover the original data. Convolution could be expressed with the formula [45,46]
g = f h
where g is the processed data, f is the original data, and h is the kernel function. Deconvolution is used to eliminate the effect of kernel function on a density map using algorithms to reverse the effects of convolution on point data. Deconvolution is usually performed in the frequency domain by computing the Fourier transformation of h and g separately. When ignoring the absence of noise, deconvolution could be computed as:
F = G / H
where F, G, and H are the Fourier transforms of f, g, and h respectively. Following this calculation, F will be transformed to the estimated deconvolved signal or image f by inverse Fourier transform.
If the noise is considered, a deconvolution could be expressed as
g = f h + n
where n is the noise [47]. Correspondingly, its Fourier transformation could be expressed as
G = F H + N
where N is the fourier transformation of noise. To calculate this equation, we could use
F ^ = W G
where F ^ is the recovered map.
W = H * | H | 2 + K
where H * is the Fourier transformation of the kernel function used for generating the density map; K = | F | 2 | N | 2 . If K = 0 then W = 1 H , Equation (5) equals Equation (2). If K | H | , then high frequencies are attenuated. In this process, least squares are used to narrow the results’ error: F ^ F .
In this research, when the parameters are known for deconvolution, Equation (2) will be used to derive the original map. When the parameters are unknown for deconvolution, Equation (3) will be used to recover the original map. The errors caused by mismatching parameter values between convolution and deconvolution will be considered as noise, n .

3.2. Experimental Design

The experiment in this study is illustrated in a flowchart in Figure 2. Three maps containing a pre-specified number of points (such as 100) with different spatial distribution patterns will be generated (Figure 3). The three simulated point maps include a random point map, a monocentric point map and a polycentric distribution. A convolution process will be carried out on each map to create a density map, followed by a deconvolution process converting the density map back to the point map. The confidentiality of the density map will be analyzed through the accuracy evaluation of the recovered map in comparison to the original point map. Following the three simulated maps, real crime data will be used to test whether a kernel density map could be recovered to the original point map.
As a common type of kernel function used in ArcGIS (ESRI, Redlands, CA, USA), the Epanecknikov kernel will be adopted in this study [48]:
f ( x ) = 1 n h t = 1 n K ( x x t h )
where h is the bandwidth, n is the number of events, x x t is the distance from the center to each incident t, and K is the quadratic kernel function:
K ( x ) = 3 4 ( 1 x 2 ) ,   | x | 1
The bandwidth is the shorter one between the width or height of the output extent in the output spatial reference, divided by 30 (in the versions before 10.2.1 of ArcGIS Desktop). In the versions after 10.2.1, the default bandwidth was changed to be calculated using a new function [49]:
Bandwidth = 0.9 min ( S D ,   1 l n ( 2 ) D m ) n 0.2
where SD is the standard distance calculated by the standard deviation of distances between each pair of points. D m is the medium distance. The bandwidth in the past ArcGIS versions was determined by the width of the study area while the bandwidth in the new versions was determined by the distribution pattern of points.
In a deconvolution process, the bandwidth cannot be acquired because there are no points in a density map. Therefore, the bandwidth calculation method in the past ArcGIS versions will be adopted in our current study. In order to assess the accuracy of recovered maps, two indicators will be adopted. Mean Integrated Squared Error (MISE) was proposed by Delaigle and Gijbels to assess the accuracy of the recovered map after deconvolution [50].
MISE ( h ) = 1 B b = 1 B [ f x ^ ( x ; h ) f x ( x ) ] 2 d x
where B is the number of cells in the map, f x ^ ( x ; h ) and f x ( x ) represent the recovered map after deconvolution and the original point map respectively. h is the selected bandwidth.
The capture rate (CR), as a common index in crime prediction literature, was previously utilized to evaluate the accuracy of crime prediction map [26]. CR is the percentage of crime events for a measured data time period falling into the areas where crimes are predicted to occur.
C R = n 100 N 100
where N is the maximum number of crimes that could be captured in the prediction area, n is the number of crimes in areas where crimes are predicted to occur. The standard deviation is calculated by the standard deviation of all cell values in the recovered map. In our current research, this indicator is used to evaluate the scale of error distribution.

4. Experimental Results

The deconvolution process with unknown bandwidth is implemented. The maximum bandwidth is set to half of the dimension of the original point map. For each bandwidth value for kernel convolution, all possible bandwidth values will be applied to the deconvolution, and this process is repeated for all possible bandwidth values for kernel convolution. The accuracy of the recovered point map in deconvolution will be compared to the original point map by the error (MISE) and capture rate (CR) for each combination of bandwidth in convolution and bandwidth in deconvolution. The MISE and CR values are recorded in a two dimensional matrix (Figure 4).
Figure 4a,b indicate the error and capture rate of the recovered random point map for the random point map. When the bandwidth for deconvolution is the same as that used in convolution, the point map could be recovered with a very high accuracy (Figure 4a diagonal values < 0.01, Figure 4b diagonal values = 1). In contrast, when the bandwidth for deconvolution is different from that of convolution, the original map cannot be exactly recovered due to the great noise values (Figure 4a, non-diagonal values: [0.37, 29.31]; Figure 4b, non-diagonal values: [0,0.07]).
The results of the monocentric distribution (Figure 4c,d) are similar to those of the random distribution. When the bandwidth is known, the original point map can be recovered from a density map at high accuracy (Figure 4c, diagonal values <0.01; Figure 4d, diagonal values = 1). In contrast, when the bandwidth is unknown, the accuracy of the recovered map would be very low (Figure 4c, non-diagonal values: [0.62, 25.38]; Figure 4d, non-diagonal values: [0,0.12]).
Likewise, the results of the polycentric distribution (Figure 4e,f) are similar to those of the random distribution. When the bandwidth is known, the original point map could be recovered from a density map at high accuracy (Figure 4e, diagonal values <0.01; Figure 4f, diagonal values = 1). In contrast, when the bandwidth is unknown, the accuracy of the recovered map would be very low (Figure 4e, non-diagonal values: [0.62, 24.22]; Figure 4f, non-diagonal values: [0,0.08]).
Other than the diagonal cells, the rest of the cells on the accuracy maps (Figure 4a–f) do not show any discernable pattern, thus making the minimization of the errors impossible. Therefore, when the bandwidth is unknown for convolution process, the original point map cannot be restored by a deconvolution process in frequency domain.

5. Case Study

5.1. Data Source and Study Area

The research area is N city, one of the largest cities in southeast China. The downtown area of N city consists of four administrative districts and 7.17 million people. As one of the most populated cities in China, the population density of the research area is 6367 persons per square kilometer. For two districts located in the city center, the population density is over 21,000 persons per square kilometer, which is comparable to the population density in the center urban area of Beijing and Shanghai. Additionally, as a regional political, economic and transportation center, N city is one of the biggest cities in the Yangtze River Delta Region. The floating population (relocated from nearby cities) of N city is around 2 million. The population and economic characteristics has allowed the economy of N city to develop rapidly. These characteristics make N city highly representative in China (Figure 5).
The current research uses an official crime dataset provided by the local Public Security Bureau. The full dataset includes a total of 9965 burglary records from 1st January 2015 to 30th December 2017. Each record of the data includes location (XY coordinates) and the occurrence date.

5.2. Deconvolution Analysis with Crime Data

In this experiment, we will first generate the scatter plot with criminal points and then convert the point map to the density map which is usually provided in patrol practice. Secondly, the deconvolution process will be conducted to convert a density map into a grid map. Finally, the error of recovered maps will be statistically analyzed.
Figure 6a indicates that the burglary events are concentrated in the central longitudinal axis area of N city. The maximum bandwidth size is set to 10 km, which is nearly half of the dimension of the study area.
If the BT is known for deconvolution, the map could be accurately restored (Figure 6b,d). The accuracies of the recovered map (Figure 6e,f) indicate a similar pattern to those of the simulated data (Figure 4a,c,e). If the parameters for deconvolution are known, the accuracies of the recovered maps is very high (Figure 6e, diagonal values <0.1; Figure 6f, diagonal values = 1). However, if the parameters for deconvolution are unknown, the accuracies of the recovered maps are very low (Figure 6e, non-diagonal values: [1.82, 126.04]; Figure 6f, non-diagonal values: [0.005, 0.1506]).

6. Discussion

With the above results of the experiments and the case study, let us revisit the research questions set forth earlier in the paper. With regard to Question 1, the deconvolution process varied significantly with the change of parameters. In the frequency domain, even a small difference of bandwidth could introduce a great error to the convolution/deconvolution process. Therefore, the possibility of recovering a density map to a point map largely depends on whether the parameters can be inferred. The results indicate that the errors vary as a function of the bandwidth. Importantly, the error distribution does not apparently indicate any pattern which might be helpful to infer the bandwidth used in convolution. This situation makes it more difficult to restore a point map from a kernel density map. In summary, the parameters exert a great impact on the convolution and deconvolution process.
With regard to Question 2, the point distribution pattern does not affect the accuracy of the deconvoluted maps. Three different point distribution patterns were used in this study. The results indicated that the error did not change much with the changed crime distribution patterns. When the bandwidth for deconvolution was known, the point map could be recovered, while when the bandwidth for deconvolution was unknown, the recovered point map was drastically different from the original point map.
With regard to Question 3, the impact of parameters on deconvolution was very small. A point map can be recovered from a density map at a high accuracy level when parameters are known for deconvolution. In contrast, a point map is nearly impossible to recover from a density map when the parameters are unknown. The impact of the parameter adopted in the convolution process was thoroughly examined. The answer agrees with the statement in the previous literature that “KDE could protect locational privacy” very well when parameters for deconvolution are unknown [13].
The results using real crime data indicate similar results: the errors of point maps generated by unknown parameters are much larger than the others. Importantly, the errors did not indicate a significant pattern for parameter change. The highest capture rate of non-diagonal units could reach 15.06%. Importantly, the high capture rate occurred when the bandwidth for convolution was very large and bandwidth for deconvolution was very small. It could be inferred that most of the captured crimes were captured by hotspots because a large bandwidth would generate a smooth surface and a small bandwidth could remove the high-frequency information, leaving the low-frequency information (e.g., the smoothness hotspots) as a “recovered map”. Therefore, the accuracy of recovered maps is still at a low accuracy level. The locational information of crimes was still confidentially preserved. Such a confidentiality rate indicates that most of the locational information of crimes were masked at a high level.

7. Conclusions

The confidentiality of crime locations is of concern in many countries. KDE can help to mask the exact location of crime events by transforming a point map to a density map. However, an accurate recovery of point locations from a density map (i.e., a reverse transformation) may reveal the original point locations. With the aim of testing the confidentiality of crime locations in density maps, this study investigated the impact of parameters for the deconvolution process from a density map to a point map.
Using the default kernel function in ArcGIS, the possibility of transferring a density map to a point map was first examined using known parameters for deconvolution followed by using unknown parameters for deconvolution. The experimental results indicate that, although the point distribution pattern and the parameters of kernel function changed, the point map could be recovered at a high accuracy when the parameters for deconvolution were known. When the parameters for deconvolution were unknown, the errors of the recovered point maps were very large compared to the original point map. Using two widely used indicators in the crime prediction research field, the MISE index indicated that the values of recovered maps are on a much higher level of accuracy compared to the original map, while the CR value indicated that a low percentage of points was correctly predicted by the recovered point maps. More importantly, the number of points and the point distributions differed to the original point map to a large extent. In summary, KDE performs well at preserving locational information because it is nearly impossible to recover a density map to a point map with unknown parameters.

Author Contributions

Conceptualization and methodology, Lin Liu and Zengli Wang; supervision, Lin Liu; investigation, Zengli Wang, Lin Liu, Hanlin Zhou, and Minxuan Lan; validation, Zengli Wang, Lin Liu, Hanlin Zhou, and Minxuan Lan; writing, review and editing, Lin Liu and Zengli Wang.

Funding

This research was funded by the National Natural Science Foundation of China (No. 41501488).

Acknowledgments

The authors would also like to acknowledge the Public Security Bureau of N city for providing crime data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bowers, K.J.; Johnson, S.D.; Pease, K. Prospective hot-spotting: The future of crime mapping? Br. J. Criminol. 2004, 44, 641–658. [Google Scholar] [CrossRef]
  2. Gorr, W.; Olligschlaeger, A.; Thompson, Y. Short-term forecasting of crime. Int. J. Forecast. 2003, 19, 579–594. [Google Scholar] [CrossRef]
  3. Groff, E.R.; La Vigne, N.G. Forecasting the future of predictive crime mapping. Crime Prev. Stud. 2002, 13, 29–58. [Google Scholar]
  4. Armstrong, M.P.; Rushton, G.; Zimmerman, D.L. Geographically masking health data to preserve confidentiality. Stat. Med. 1999, 18, 497–525. [Google Scholar] [CrossRef]
  5. Hampton, K.H.; Fitch, M.K.; Allshouse, W.B.; Doherty, I.A.; Gesink, D.C.; Leone, P.A.; Serre, M.L.; Miller, W.C. Mapping health data: Improved privacy protection with donut method geomasking. Am. J. Epidemiol. 2010, 172, 1062–1069. [Google Scholar] [CrossRef] [PubMed]
  6. Groß, M.; Rendtel, U.; Schmid, T.; Schmon, S.; Tzavidis, N. Estimating the density of ethnic minorities and aged people in Berlin: Multivariate kernel density estimation applied to sensitive georeferenced administrative data protected via measurement error. J. R. Stat. Soc. Ser. A 2017, 180, 161–183. [Google Scholar] [CrossRef]
  7. Sherman, L.W.; Weisburd, D. General deterrent effects of police patrol in crime “hot spots”: A randomized, controlled trial. Justice Q. 1995, 12, 625–648. [Google Scholar] [CrossRef]
  8. Ratcliffe, J.H.; Taniguchi, T.; Groff, E.R.; Wood, J.D. The Philadelphia foot patrol experiment: A randomized controlled trial of police patrol effectiveness in violent crime hotspots. Criminology 2011, 49, 795–831. [Google Scholar] [CrossRef]
  9. Shi, X.; Alford-Teaster, J.; Onega, T. Kernel density estimation with geographically masked points. In Proceedings of the 2009 17th International Conference on Geoinformatics, Fairfax, VA, USA, 12–14 August 2009; pp. 1–4. [Google Scholar]
  10. Weisburd, D.; Maher, L.; Sherman, L.; Buerger, M.; Cohn, E.; Petrisino, A. Contrasting crime general and crime specific theory: The case of hot spots of crime. Adv. Criminol. Theory 1992, 4, 45–69. [Google Scholar]
  11. Zandbergen, P.A. Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Adv. Med. 2014, 2014, 1–14. [Google Scholar] [CrossRef]
  12. Biron, L. Crime and everyday life: Insight and implications for society. Can. J. Criminol. 1995, 37, 263–266. [Google Scholar]
  13. Kwan, M.-P.; Casas, I.; Schmitz, B. Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartogr. Int. J. Geogr. Inf. Geovis. 2004, 39, 15–28. [Google Scholar] [CrossRef]
  14. Kounadi, O.; Leitner, M. Defining a threshold value for maximum spatial information loss of masked geo-data. ISPRS Int. J. Geo-Inf. 2015, 4, 572–590. [Google Scholar] [CrossRef]
  15. Seidl, D.E.; Paulus, G.; Jankowski, P.; Regenfelder, M. Spatial obfuscation methods for privacy protection of household-level data. Appl. Geogr. 2015, 63, 253–263. [Google Scholar] [CrossRef]
  16. Lee, M.; Chun, Y.; Griffith, D.A. An evaluation of kernel smoothing to protect the confidentiality of individual locations. Int. J. Urban Sci. 2019, 23, 335–351. [Google Scholar] [CrossRef]
  17. Turlach, B.A. Bandwidth Selection in Kernel Density Estimation: A Review; CORE and Institut de Statistique: Louvain-la-Neuve, Belgium, 1993. [Google Scholar]
  18. Chainey, S. Examining the influence of cell size and bandwidth size on kernel density estimation crime hotspot maps for predicting spatial patterns of crime. Bull. Geogr. Soc. Liege 2013, 60, 7–19. [Google Scholar]
  19. Weisburd, D.; Green, L. Policing drug hot spots: The Jersey City drug market analysis experiment. Justice Q. 1995, 12, 711–735. [Google Scholar] [CrossRef]
  20. Weisburd, D.; Wyckoff, L.A.; Ready, J.; Eck, J.E.; Hinkle, J.C.; Gajewski, F. Does crime just move around the corner? A controlled study of spatial displacement and diffusion of crime control benefits. Criminology 2006, 44, 549–592. [Google Scholar] [CrossRef]
  21. Wang, Z.; Liu, X. Analysis of burglary hot spots and near-repeat victimization in a large Chinese city. ISPRS Int. J. Geo-Inf. 2017, 6, 148. [Google Scholar] [CrossRef]
  22. Wang, Z.; Liu, L.; Zhou, H.; Lan, M. Crime Geographical Displacement: Testing Its Potential Contribution to Crime Prediction. ISPRS Int. J. Geo-Inf. 2019, 8, 383. [Google Scholar] [CrossRef]
  23. Wang, Z.; Zhang, H. Understanding the spatial distribution of crime in hot crime areas. Singap. J. Trop. Geogr. 2019, 40, 1–14. [Google Scholar] [CrossRef]
  24. Wang, Z.; Zhang, H. Could crime risk be propagated across crime types? ISPRS Int. J. Geo-Inf. 2019, 8, 203. [Google Scholar] [CrossRef]
  25. Zhou, H.; Liu, L.; Lan, M.; Yang, B.; Wang, Z. Assessing the Impact of Nightlight Gradients on Street Robbery and Burglary in Cincinnati of Ohio State, USA. Remote Sens. 2019, 11, 1958. [Google Scholar] [CrossRef]
  26. Chainey, S.; Tompson, L.; Uhlig, S. The utility of hotspot mapping for predicting spatial patterns of crime. Secur. J. 2008, 21, 4–28. [Google Scholar] [CrossRef]
  27. Mohler, G.O.; Short, M.B.; Brantingham, P.J.; Schoenberg, F.P.; Tita, G.E. Self-exciting point process modeling of crime. J. Am. Stat. Assoc. 2011, 106, 100–108. [Google Scholar] [CrossRef]
  28. Xu, C.; Liu, L.; Zhou, S.; Ye, X.; Jiang, C. The spatio-temporal patterns of street robbery in DP peninsula. Acta Geogr. Sin. 2013, 68, 1714–1723. [Google Scholar]
  29. McCord, E.S.; Ratcliffe, J.H.; Garcia, R.M.; Taylor, R.B. Nonresidential crime attractors and generators elevate perceived neighborhood crime and incivilities. J. Res. Crime Delinq. 2007, 44, 295–320. [Google Scholar] [CrossRef]
  30. Brantingham, P.L.; Brantingham, P.J. Criminality of place: Crime generators and crime attractors. Eur. J. Crim. Policy Res. 1995, 3, 1–26. [Google Scholar] [CrossRef]
  31. Brantingham, P.L.; Brantingham, P.J. Environment, routine and situation: Toward a pattern theory of crime. In Routine Activity and Rational Choice; Clarke, R.V., Felson, M., Eds.; Transaction Publications: New Brunswick, NJ, USA, 1993; Volume 5, pp. 259–294. [Google Scholar]
  32. Brantingham, P.J.; Brantingham, P.L. Crime pattern theory. In Environmental Criminology and Crime Analysis; Wortley, R., Mazerolle, L., Eds.; Willan: Cullompton, Devon, UK, 2008; pp. 78–93. [Google Scholar]
  33. Short, M.B.; Brantingham, P.J.; Bertozzi, A.L.; Tita, G.E. Dissipation and displacement of hotspots in reaction-diffusion models of crime. Proc. Natl. Acad. Sci. USA 2010, 107, 3961–3965. [Google Scholar] [CrossRef]
  34. Brantingham, P.J.; Brantingham, P.L. Environmental Criminology; Sage Publications: Beverly Hills, CA, USA, 1981. [Google Scholar]
  35. Sampson, R.J.; Cohen, J. Deterrent effects of the police on crime: A replication and theoretical extension. Law Soc. Rev. 1988, 22, 163. [Google Scholar] [CrossRef]
  36. Di Tella, R.; Schargrodsky, E. Do police reduce crime? Estimates using the allocation of police forces after a terrorist attack. Am. Econ. Rev. 2004, 94, 115–133. [Google Scholar] [CrossRef]
  37. Gottfredson, M.R.; Hirschi, T. A General Theory of Crime; Stanford University Press: Standford, CA, USA, 1990. [Google Scholar]
  38. Curtis, A.J.; Mills, J.W.; Leitner, M. Spatial confidentiality and GIS: Re-engineering mortality locations from published maps about Hurricane Katrina. Int. J. Health Geogr. 2006, 5, 44. [Google Scholar] [CrossRef] [PubMed]
  39. Wieland, S.C.; Cassa, C.A.; Mandl, K.D.; Berger, B. Revealing the spatial distribution of a disease while preserving privacy. Proc. Natl. Acad. Sci. USA 2008, 105, 17608–17613. [Google Scholar] [CrossRef] [PubMed]
  40. Cai, Q.; Rushton, G.; Bhaduri, B. Validation tests of an improved kernel density estimation method for identifying disease clusters. J. Geogr. Syst. 2012, 14, 243–264. [Google Scholar] [CrossRef]
  41. Xie, Z.; Yan, J. Detecting traffic accident clusters with network kernel density estimation and local spatial statistics: An integrated approach. J. Transp. Geogr. 2013, 31, 64–71. [Google Scholar] [CrossRef]
  42. Qiu, P. A nonparametric procedure for blind image deblurring. Comput. Stat. Data Anal. 2008, 52, 4828–4841. [Google Scholar] [CrossRef] [Green Version]
  43. Gramacki, A.; Gramacki, J. FFT-based fast computation of multivariate kernel density estimators with unconstrained bandwidth matrices. J. Comput. Graph. Stat. 2017, 26, 459–462. [Google Scholar] [CrossRef]
  44. Gramacki, A.; Gramacki, J. FFT-based fast bandwidth selector for multivariate kernel density estimation. Comput. Stat. Data Anal. 2017, 106, 27–45. [Google Scholar] [CrossRef] [Green Version]
  45. Boyd, S.; Parikh, N.; Chu, E.; Peleato, B.; Eckstein, J. Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends Mach. Learn. 2011, 3, 1–122. [Google Scholar] [CrossRef]
  46. Rudin, L.I.; Osher, S.; Fatemi, E. Nonlinear total variation based noise removal algorithms. Phys. D Nonlinear Phenom. 1992, 60, 259–268. [Google Scholar] [CrossRef]
  47. Wiener, N. Extrapolation, Interpolation, and Smoothing of Stationary Time Series; MIT Press: Cambridge, MA, USA; New York, NY, USA, 1949. [Google Scholar]
  48. Epanechnikov, V.A. Non-parametric estimation of a multivariate probability density. Theory Probab. Its Appl. 1969, 14, 153–158. [Google Scholar] [CrossRef]
  49. Silverman, B.W. Density Estimation for Statistics and Data Analysis; Chapman and Hall: London, UK, 1986. [Google Scholar]
  50. Delaigle, A.; Gijbels, I. Practical bandwidth selection in deconvolution kernel density estimation. Comput. Stat. Data Anal. 2004, 45, 249–267. [Google Scholar] [CrossRef]
Figure 1. Density map and point map.
Figure 1. Density map and point map.
Ijgi 08 00544 g001
Figure 2. Flowchart of confidentiality analysis of density maps. MISE: Mean Integrated Squared Error; CR: capture rate.
Figure 2. Flowchart of confidentiality analysis of density maps. MISE: Mean Integrated Squared Error; CR: capture rate.
Ijgi 08 00544 g002
Figure 3. Three simulated point distribution maps. (a) Random, (b) monocentric, (c) polycentric.
Figure 3. Three simulated point distribution maps. (a) Random, (b) monocentric, (c) polycentric.
Ijgi 08 00544 g003
Figure 4. The errors of deconvolution with unknown parameters (BT: bandwidth of transformation in convolution; BRT: bandwidth of reverse transformation in deconvolution). Figure (a) and (b) are the results produced by randomly distributed points. Figure (c) and (d) are the results produced by monocentric points. Figure (e) and (f) are the results produced by polycentric points. (a) MISE. Diagonal values <0.01; Non-diagonal values: [0.37, 29.31]. (b) Capture rate. Diagonal values = 1; non-diagonal values: [0,0.07]. (c) MISE. Diagonal values <0.01; non-diagonal values: [0.62, 25.38]. (d) Capture rate. Diagonal values = 1; Non-diagonal values: [0,0.12]. (e) MISE. Diagonal values <0.01; non-diagonal values: [0.62, 24.22]. (f) Capture rate. Diagonal values = 1; Non-diagonal values: [0,0.08].
Figure 4. The errors of deconvolution with unknown parameters (BT: bandwidth of transformation in convolution; BRT: bandwidth of reverse transformation in deconvolution). Figure (a) and (b) are the results produced by randomly distributed points. Figure (c) and (d) are the results produced by monocentric points. Figure (e) and (f) are the results produced by polycentric points. (a) MISE. Diagonal values <0.01; Non-diagonal values: [0.37, 29.31]. (b) Capture rate. Diagonal values = 1; non-diagonal values: [0,0.07]. (c) MISE. Diagonal values <0.01; non-diagonal values: [0.62, 25.38]. (d) Capture rate. Diagonal values = 1; Non-diagonal values: [0,0.12]. (e) MISE. Diagonal values <0.01; non-diagonal values: [0.62, 24.22]. (f) Capture rate. Diagonal values = 1; Non-diagonal values: [0,0.08].
Ijgi 08 00544 g004
Figure 5. The study area.
Figure 5. The study area.
Ijgi 08 00544 g005
Figure 6. Results of recovered crime map. (a) Burglaries in N city. (b) Grid map of burglary in N city. (c) Kernel density map. BT = 0.8 km. (d) Restored map. BT = BRT. (e) MISE. Diagonal values <0.01; non-diagonal values: [1.82, 126.04]. (f) Capture rate. Diagonal values = 1; non-diagonal values: [0.005, 0.1506].
Figure 6. Results of recovered crime map. (a) Burglaries in N city. (b) Grid map of burglary in N city. (c) Kernel density map. BT = 0.8 km. (d) Restored map. BT = BRT. (e) MISE. Diagonal values <0.01; non-diagonal values: [1.82, 126.04]. (f) Capture rate. Diagonal values = 1; non-diagonal values: [0.005, 0.1506].
Ijgi 08 00544 g006

Share and Cite

MDPI and ACS Style

Wang, Z.; Liu, L.; Zhou, H.; Lan, M. How Is the Confidentiality of Crime Locations Affected by Parameters in Kernel Density Estimation? ISPRS Int. J. Geo-Inf. 2019, 8, 544. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi8120544

AMA Style

Wang Z, Liu L, Zhou H, Lan M. How Is the Confidentiality of Crime Locations Affected by Parameters in Kernel Density Estimation? ISPRS International Journal of Geo-Information. 2019; 8(12):544. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi8120544

Chicago/Turabian Style

Wang, Zengli, Lin Liu, Hanlin Zhou, and Minxuan Lan. 2019. "How Is the Confidentiality of Crime Locations Affected by Parameters in Kernel Density Estimation?" ISPRS International Journal of Geo-Information 8, no. 12: 544. https://0-doi-org.brum.beds.ac.uk/10.3390/ijgi8120544

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop