SlideShare a Scribd company logo
1 of 15
: Presented by
Akanksha Upadhyaya
Research Scholar, AIIT,
Amity University
Under the Guidance of:
• Dr. Vinod Shokeen
• Dr. Garima Srivastava
 Rationale of study
 Overview: about the problem
 Purpose of study
 Research Questions
 Introduction to related terms
 Review brief
 Findings
 Conclusion and Future scope
 References
• To explore various counterfeit detection techniques along with
their respective accuracy rate.
• Part of PhD work
RATIONALE OF STUDY
Currency counterfeiting is always been a challenging term for financial
system of any country. The problem of counterfeiting majorly affects the
economical as well as financial growth of a country; the race is going on
between the counterfeiters and the banks. To resolve the issue various
researchers came across with variety of techniques and proposed solutions
mostly focused on Machine learning and Image processing areas.
PURPOSE OF STUDY
1. To identify counterfeit detection techniques from the area of machine
learning, image processing and pattern recognition.
2. To identify the respective accuracy rate and a feature on which the
technique was implemented.
• What are the various techniques which have been implemented using
a country specific feature?
• What is the accuracy rate of each implementation?
• Which is the area taken into consideration most of the time.
•Counterfeiting
•Accuracy rate
•Soiled currency
•Machine learning: Supervised vs. Unsupervised
•Image processing and pattern recognition
1. Abba Almu and Aminu Bui Muhammad, 2017, created application based on features
comparison of Nigerian currency Naira, denomination 100, 200, 500 and 1000 with an
accuracy rate of detection 77.7%.
2. Jayant Kumar Nayak et. al., 2015, implemented counterfeit detection of currency using
Chan-Vese segmentation and back propagation algorithm on Indian rupee of
denomination value 5, 10, 20, 50, 100, 500. The accuracy of soiled currency detection was
97% and 100% for average quality notes.
3. Snigdha Kamal et. al. et. al., 2015, used SURF Descriptor and SVM Classifier on Central
Numeral, Ashoka emblem, Identification mark and color band of Indian rupee valued 500 and
achieved 97.02% accuracy.
4. Lamsal S, Shakya A., 2015, classified counterfeit Nepal currency from genuine one by
implementing Image classification based on color and texture using Skew, mean, standard
deviation, entropy and correlation value. The classification model achieved accuracy of
95%.
5. Ballado et. al, 2015, used Canny Edge detection on Philippine currency Peso 500, 1000 and
incorporated OVD patch as an additional security feature. It was basically a GUI based
program implemented using MATLAB, with an accuracy rate of 100%
6. Ankush Roy et.al., 2014, implemented SVM and ANN on security thread, Ink, printing
technique and artwork of Indian currency and achieved 100% accuracy.
7. Singh, S. et. al., 2014, implemented counterfeit detection of currency using SIFT, SURF
and ORB-FREAK for visually impaired for Indian denomination and achieved 96.7%.
8. Vishnu R & Omman B, 2015, worked on Pattern matching on similarity of feature
extracted, dominant color and shape detection of 6 security features Color, shape, Centre,
Ashoka emblem, RBI seal, Signature of Indian denomination 50, 100, 500, 1000 and
achieved 97% accurate detection.
9. Abbas Yaseri and Sayed Mahmoud Anisheh, 2013, implemented Wiener filter,
Fourier Mellin transform and SVM Classifier on currency dataset of 150 banknotes of 101
different denominations from 23 countries and achieved 98.7% accuracy.
10. In 2012 Subra Mukherjee et. al. And F. M. Hasanuzzaman worked on different Image
processing technique i.e. Fourier descriptor on Identification mark of India rupee
20,50,100,500,1000 and SURF on images of seven categories US bill 1, 2, 5, 10, 20, 50, 100
respectively. They achieved 97% and 100% accuracy respectively.
• Image processing and pattern recognition area is the base area for feature extraction.
• There are some techniques which are specifically from the application area of Image
processing and pattern recognition and using those techniques the researchers achieved
the accuracy rate ranges from 77% to 100%.
• Few of the area are those which are the combination of machine learning and Image
processing and therein the accuracy rate ranges from 96% to 100%.
• The variation in accuracy rate is due to various factors such as choice of feature, type
of note, number of features considered, country specific currency security feature, cost
efficiency of the program.
• This paper is an effort to suggest various
techniques proposed by various
researchers in terms of accuracy rate by
considering a particular feature from
denomination values of particular
country’s currency.
• Image processing and pattern
recognition is the dominant area
followed by Machine Learning.
• Currency’s security features need
periodical up-gradation due to up
gradation of printing and scanning
technology.
• The areas where few researches have
been conducted are data mining
prediction techniques like map reduce,
Apriori association rule or by means
of any statistical model which could
provide a solution for this complex
issue.
1. NCRB compedium Report (2015-2016), crime report, Retrived from http://ncrb.gov.in/Stat Publications/CII/CII2015/FILES/CrimeInIndia2015.pdf
2. Santhanam, K., Sekaran, S., Vaikundam, S., & Kumarasamy, A. M. (2013, September). Counterfeit currency detection technique using image processing,
polarization principle and holographic technique. In Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on
(pp. 231-235). IEEE.
3. Alekhya, D., Surya Prabha, G. D., & Durga Rao, G. V. (2014). Fake currency detection using image processing and other standard methods. IJRCCT, 3(1),
128-131.
4. Thakur, M., & Kaur, A. (2014). Various fake currency detection techniques. International Journal for Technological Research in Engineering, 1(11), 1309-1313.
5. Jadhav S., Khanai R, (2016) Authentication And Counterfeit Detection Of Currency Using Image Processing. In International Conference on Recent
Innovations in Engineering and Management (ICRIEM-16), pp. 709-715.
6. Ahmed, Z., Yasmin, S., Islam, M. N., & Ahmed, R. U. (2014, December). Image processing based Feature extraction of Bangladeshi banknotes. In Software,
Knowledge, Information Management and Applications (SKIMA), 8th International Conference on (pp. 1-8). IEEE.
7. Sneha R, Deepika P K , Nagaveni S, Swetha Shree D , Asha K S.(2017) "Automatic counterfeit currency detection using Image Processing." International
Research Journal of Engineering and Technology (IRJET) Vol. 4, Issue 5.
8. Pilania, Eshita, and Bhavika Arora.(2016) "Recognition of Fake Currency Based on Security Thread Feature of Currency.", International Journal Of Engineering
And Computer Science, Volume 5 Issues, pp. 17136-17140.
9. Muthukrishnan, R., & Radha, M. (2011). Edge detection techniques for image segmentation. International Journal of Computer Science & Information
Technology, 3(6), 259.
10. Atchaya, S., K. Harini, G. Kaviarasi, and B. Swathi.(2016) "Fake Currency Detection Using Image Processing.", International Journal of Trend in Research and
Development, special issue, pp72-73.
11. Kumar, G., & Bhatia, P. K. (2014, February). A detailed review of feature extraction in image processing systems. In Advanced Computing & Communication
Technologies (ACCT), Fourth International Conference on (pp. 5-12). IEEE.
12. Visani, C., & Jadeja, N. (2017) A Study on Different Machine Learning Techniques for Spam Review Detection, IEEE.
13. Alshayeji, Mohammad H., Mohammad Al-Rousan, and Dunya T. Hassoun. (2015) "Detection method for counterfeit currency based on bit-plane slicing
technique." International Journal of Multimedia and Ubiquitous Engineering Vol.10, Issue11,pp. 225-242.
14. Mukherjee S. "Artificial neural network to recognize an Indian currency note using unique identification mark. (2015) " Journal of Applied and Fundamental
Sciences Vol 1, Issue 2, pp. 213-220.
15. Roy, Ankush, Biswajit Halder, Utpal Garain, and David S. Doermann. (2015) "Machine-assisted authentication of paper currency: an experiment on Indian
banknotes." International Journal on Document Analysis and Recognition (IJDAR) Vol 18, Issue 3, pp. 271-285.
16. Asadizanjani, N., Dunn, N., Gattigowda, S., Tehranipoor, M., & Forte, D. (2016, November). A database for counterfeit electronics and automatic defect
detection based on image processing and machine learning. ISTFA.
17. Ballado, A. H., JC Dela Cruz, G. O. Avendaño, N. M. Echano, J. E. Ella, M. E. M. Medina, and B. K. C. Paquiz. (2015) "Philippine currency paper bill
counterfeit detection through image processing using Canny Edge Technology." In Humanoid, Nanotechnology, Information Technology, Communication and
Control, Environment and Management (HNICEM), International Conference on, pp. 1-4. IEEE.
18. Kavya, B. R., and Devendran B. (2015) "Indian currency detection and denomination using SIFT." International Journal of Science Enineering and Technology.
Vol 4, Issue 6, pp.1909-1911.
19. Prasanthi, B. Sai, and D. Rajesh Setty. (2015) "Indian paper currency authentication system—A quick authentication system." International Journal of Scientific
and Engineering Research, Vol 6, Issue 9, pp. 1249-1256.
20. Elmurngi, E., & Gherbi, A. (2017). An empirical study on detecting fake reviews using machine learning techniques.
21. Lamsal S, and Shakya A (2015) "Counterfeit paper banknote identification based on color and texture.", Proceedings of the IOE Graduate Conference, pp.
160-168.
22. Kamal, Snigdha, Singh S, Chawla, Goel N, and Balasubramanian R.(2015) "Feature extraction and identification of Indian currency notes." In Computer
Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Fifth National Conference on, pp. 1-4. IEEE.
23. Almu, A., & Muhammad, A. B. (2017). Image-Based Processing Of Naira Currency Recognition. Annals. Computer Science Series, 15(1).
24. Ahmed, Z, Yasmin S, Islam N, and Ahmed R U. (2014) "Image processing based Feature extraction of Bangladeshi banknotes." In Software, Knowledge,
Information Management and Applications (SKIMA), 2014 8th International Conference on, pp. 1-8. IEEE.
25. Rahman S, Banik P, Naha S.,(2014) “LDA based paper currency recognition system using edge histogram descriptor”. International conference on Computer
and Information Technology (ICCIT), 17th International Conference on, pp. 326-331. IEEE.
26. Akbar M, Awaluddin AS, Putra AA, Widyarto S. (2013) “Original and Counterfeit Money Detection Based on Edge Detection”, International Conference on
Instrumentation, Communication, Information Technology and Biomedical Engineering.
27. Nayak, J. K., Majhi, C., Srivastav, A. K., & Dash, A. K. (2015, December). Neural network approach for Indian currency recognition. In India Conference
(INDICON), Annual IEEE (pp. 1-6). IEEE.
28. Grijalva, F., Rodriguez, J. C., Larco, J., & Orozco, L. (2010, September). Smartphone recognition of the US banknotes' denomination, for visually impaired
people. In ANDESCON, IEEE (pp. 1-6). IEEE.
29. Santhanam K, Sekaran S, Vaikundam S, Kumarasamy AM.(2013) “Counterfeit currency detection technique using image processing, polarization principle and
holographic technique”, Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on, pp. 231-235. IEEE.
30. Singh, S., Choudhury, S., Vishal, K., & Jawahar, C. V. (2014, August). Currency recognition on mobile phones. In Pattern Recognition (ICPR), 22nd
International Conference on(pp. 2661-2666). IEEE.
31. Mirza R, Nanda V. (2012) “Design and implementation of Indian paper currency authentication system based on feature extraction by edge based
segmentation using Sobel operator”, International Journal of Engineering Research and Development. Vol 3, Issue 2, pp.:41-46.
32. Omatu S, Yoshioka M, Kosaka Y. (2009) “Reliable banknote classification using neural networks”,Advanced Engineering Computing and Applications in
Sciences, ADVCOMP'09. Third International Conference on, pp. 35-40, IEEE, Chhotu Kumar, Anil Kumar Dudyala, (2015, March) “Bank Note Authentication
Using Decision Tree rules and Machine Learning Techniques”, IEEE International Conference on Advances in Computer Engineering and Applications
(ICACEA).
33. Debnath, K. K., Ahmed, S. U., Shahjahan, M., & Murase, K. (2010). A paper currency recognition system using negatively correlated neural network ensemble.
Journal of Multimedia, 5(6), 560-567.
34. Hassanpour, H., & Farahabadi, P. M. (2009). Using Hidden Markov Models for paper currency recognition. Expert Systems with Applications, 36(6), 10105-
10111.
35. Hasanuzzaman, F. M., Yang, X., & Tian, Y. (2012). Robust and effective component-based banknote recognition for the blind. IEEE Transactions on Systems,
Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1021-1030.
36. Mann Manisha, Shukla S.K.,Gupta Shruti (2015, June) “A comparative study on security features of banknotes of various countries”International Journal of
Multidisciplinary Research and Development (83-91) Volume: 2, Issue: 6.
37. Anahita Ghazvini, Jamilu Awwalu, Azuraliza Abu Bakar, (2014, November), “Comparative Analysis of Algorithms in Supervised Classification: A case Study of
Bank Notes Dataset”, International Journal of Computer Trends and Technology (IJCTT), pg. no. 39-43,volume 17 number 1, ISSN: 2231-2803.
38. Ballado, A. H., Cruz, J. D., Avendaño, G. O., Echano, N. M., Ella, J. E., Medina, M. E. M., & Paquiz, B. K. C. (2015, December). Philippine currency paper bill
counterfeit detection through image processing using Canny Edge Technology. In Humanoid, Nanotechnology, Information Technology, Communication and
Control, Environment and Management (HNICEM), 2015 International Conference (pp. 1-4). IEEE.
39. Yaseri, A., & Anisheh, S. M. (2013). A novel paper currency recognition using Fourier mellin transform, hidden Markov model and support vector machine.
International Journal of Computer Applications, 61(7).
40. Nur Syhuda Mohamad, Burairah Hussin, A.S. Shibghatullah, A.S.H. Basari, (2015, 15-16 October) “Banknote Authentication using Artificial Neural Network”,
International Symposium on Research in Innovation and Sustainability, pg. no. 1865-1868, ISSN 1013-5316.
41. Kamal, S., Chawla, S. S., Goel, N., & Raman, B. (2015, December). Feature extraction and identification of Indian currency notes. In Computer Vision, Pattern
Recognition, Image Processing and Graphics (NCVPRIPG), Fifth National Conference (pp. 1-4). IEEE.
42. Masato Aoba, Testsuo Kikuchi, Yoshiyasu Takefuji, (2003, May), “Euro Banknote Recognition System using three-layered Perceptron and RBF Networks”,
IPSJ Transactions on Mathematical Modeling and its applications, pg. no. 99-109, Volume 44 No. SIG 7(TOM 8).
43. B.Sai Prasanthi, D.Rajesh Setty (2015, September), “Indian Paper currency authentication system- A quick authentication system”, International Journal of
Scientifica & Engineering Research, pg. no. 1249-1256, Volume 6, Issue 9, ISSN: 2229-5518.
44. Vishnu, R., & Omman, B. (2014, December). Principal features for Indian currency recognition. In India Conference (INDICON), 2014 Annual IEEE (pp. 1-8).
IEEE.
45. M. F. Santos, P. Cortez1, J. Pereira & H. Quintela (2006) data mining techniques, “Corporate bankruptcy prediction using data mining techniques”, Data Mining
VII: Data, Text and Web Mining and their Business Applications, WIT Transactions on Information and Communication Technologies, Vol 37, ISSN 1743-3517,
Pg 349-357..
3.-various-Counterfeit-Currency-Detection-techniques_telmisr2018 (1).pptx

More Related Content

Similar to 3.-various-Counterfeit-Currency-Detection-techniques_telmisr2018 (1).pptx

Automated Identification of Road Identifications using CNN and Keras
Automated Identification of Road Identifications using CNN and KerasAutomated Identification of Road Identifications using CNN and Keras
Automated Identification of Road Identifications using CNN and KerasIRJET Journal
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation istdeep sharma
 
Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Fellowship at Vodafone FutureLab
 
Iranian cashes recognition using
Iranian cashes recognition usingIranian cashes recognition using
Iranian cashes recognition usingcsandit
 
September 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image ProcessingSeptember 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image Processingsipij
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...Editor IJCATR
 
June 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image ProcessingJune 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image Processingsipij
 
Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022AIRCC Publishing Corporation
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistanceijscai
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds IJSCAI Journal
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSijscai
 
July 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image ProcessingJuly 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image Processingsipij
 
November 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image ProcessingNovember 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image Processingsipij
 
December 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image ProcessingDecember 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image Processingsipij
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyJanuary 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...CSCJournals
 
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONPROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONcscpconf
 
Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition csandit
 

Similar to 3.-various-Counterfeit-Currency-Detection-techniques_telmisr2018 (1).pptx (20)

Automated Identification of Road Identifications using CNN and Keras
Automated Identification of Road Identifications using CNN and KerasAutomated Identification of Road Identifications using CNN and Keras
Automated Identification of Road Identifications using CNN and Keras
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...Estimating Number of People in ITU-EEB as an Application of People Counting T...
Estimating Number of People in ITU-EEB as an Application of People Counting T...
 
Iranian cashes recognition using
Iranian cashes recognition usingIranian cashes recognition using
Iranian cashes recognition using
 
September 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image ProcessingSeptember 2021 - Top 10 Read Articles in Signal & Image Processing
September 2021 - Top 10 Read Articles in Signal & Image Processing
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
 
June 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image ProcessingJune 2021: Top Read Articles in Signal & Image Processing
June 2021: Top Read Articles in Signal & Image Processing
 
Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
 
July 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image ProcessingJuly 2021: Top Read Articles in Signal & Image Processing
July 2021: Top Read Articles in Signal & Image Processing
 
November 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image ProcessingNovember 2021: Top Read Articles in Signal & Image Processing
November 2021: Top Read Articles in Signal & Image Processing
 
December 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image ProcessingDecember 2021: Top Read Articles in Signal & Image Processing
December 2021: Top Read Articles in Signal & Image Processing
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyJanuary 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
 
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...
 
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONPROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
 
Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition Projection Profile Based Number Plate Localization and Recognition
Projection Profile Based Number Plate Localization and Recognition
 

More from Abdullah Azzeh

Ch14-Part4-ImageRetrieval.pdf
Ch14-Part4-ImageRetrieval.pdfCh14-Part4-ImageRetrieval.pdf
Ch14-Part4-ImageRetrieval.pdfAbdullah Azzeh
 
Chao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptChao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptAbdullah Azzeh
 
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptx
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptxbank-note-counterfeiting-powerpoint-1-lesson-1-1.pptx
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptxAbdullah Azzeh
 

More from Abdullah Azzeh (11)

CEDARFOX-020907.pdf
CEDARFOX-020907.pdfCEDARFOX-020907.pdf
CEDARFOX-020907.pdf
 
52312340.pdf
52312340.pdf52312340.pdf
52312340.pdf
 
Ch14-Part4-ImageRetrieval.pdf
Ch14-Part4-ImageRetrieval.pdfCh14-Part4-ImageRetrieval.pdf
Ch14-Part4-ImageRetrieval.pdf
 
Chao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.pptChao. 16- Document Examination-Csi- 14s.ppt
Chao. 16- Document Examination-Csi- 14s.ppt
 
Document Analysis.pdf
Document Analysis.pdfDocument Analysis.pdf
Document Analysis.pdf
 
12150145.ppt
12150145.ppt12150145.ppt
12150145.ppt
 
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptx
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptxbank-note-counterfeiting-powerpoint-1-lesson-1-1.pptx
bank-note-counterfeiting-powerpoint-1-lesson-1-1.pptx
 
269688509.pdf
269688509.pdf269688509.pdf
269688509.pdf
 
0dtslides.pdf
0dtslides.pdf0dtslides.pdf
0dtslides.pdf
 
112_QD_1 (1).ppt
112_QD_1 (1).ppt112_QD_1 (1).ppt
112_QD_1 (1).ppt
 
art forgery- 13s.pptx
art forgery- 13s.pptxart forgery- 13s.pptx
art forgery- 13s.pptx
 

Recently uploaded

一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书F La
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理bd2c5966a56d
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 

Recently uploaded (20)

一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 

3.-various-Counterfeit-Currency-Detection-techniques_telmisr2018 (1).pptx

  • 1. : Presented by Akanksha Upadhyaya Research Scholar, AIIT, Amity University Under the Guidance of: • Dr. Vinod Shokeen • Dr. Garima Srivastava
  • 2.  Rationale of study  Overview: about the problem  Purpose of study  Research Questions  Introduction to related terms  Review brief  Findings  Conclusion and Future scope  References
  • 3. • To explore various counterfeit detection techniques along with their respective accuracy rate. • Part of PhD work RATIONALE OF STUDY
  • 4. Currency counterfeiting is always been a challenging term for financial system of any country. The problem of counterfeiting majorly affects the economical as well as financial growth of a country; the race is going on between the counterfeiters and the banks. To resolve the issue various researchers came across with variety of techniques and proposed solutions mostly focused on Machine learning and Image processing areas.
  • 5. PURPOSE OF STUDY 1. To identify counterfeit detection techniques from the area of machine learning, image processing and pattern recognition. 2. To identify the respective accuracy rate and a feature on which the technique was implemented.
  • 6. • What are the various techniques which have been implemented using a country specific feature? • What is the accuracy rate of each implementation? • Which is the area taken into consideration most of the time.
  • 7. •Counterfeiting •Accuracy rate •Soiled currency •Machine learning: Supervised vs. Unsupervised •Image processing and pattern recognition
  • 8. 1. Abba Almu and Aminu Bui Muhammad, 2017, created application based on features comparison of Nigerian currency Naira, denomination 100, 200, 500 and 1000 with an accuracy rate of detection 77.7%. 2. Jayant Kumar Nayak et. al., 2015, implemented counterfeit detection of currency using Chan-Vese segmentation and back propagation algorithm on Indian rupee of denomination value 5, 10, 20, 50, 100, 500. The accuracy of soiled currency detection was 97% and 100% for average quality notes. 3. Snigdha Kamal et. al. et. al., 2015, used SURF Descriptor and SVM Classifier on Central Numeral, Ashoka emblem, Identification mark and color band of Indian rupee valued 500 and achieved 97.02% accuracy. 4. Lamsal S, Shakya A., 2015, classified counterfeit Nepal currency from genuine one by implementing Image classification based on color and texture using Skew, mean, standard deviation, entropy and correlation value. The classification model achieved accuracy of 95%. 5. Ballado et. al, 2015, used Canny Edge detection on Philippine currency Peso 500, 1000 and incorporated OVD patch as an additional security feature. It was basically a GUI based program implemented using MATLAB, with an accuracy rate of 100%
  • 9. 6. Ankush Roy et.al., 2014, implemented SVM and ANN on security thread, Ink, printing technique and artwork of Indian currency and achieved 100% accuracy. 7. Singh, S. et. al., 2014, implemented counterfeit detection of currency using SIFT, SURF and ORB-FREAK for visually impaired for Indian denomination and achieved 96.7%. 8. Vishnu R & Omman B, 2015, worked on Pattern matching on similarity of feature extracted, dominant color and shape detection of 6 security features Color, shape, Centre, Ashoka emblem, RBI seal, Signature of Indian denomination 50, 100, 500, 1000 and achieved 97% accurate detection. 9. Abbas Yaseri and Sayed Mahmoud Anisheh, 2013, implemented Wiener filter, Fourier Mellin transform and SVM Classifier on currency dataset of 150 banknotes of 101 different denominations from 23 countries and achieved 98.7% accuracy. 10. In 2012 Subra Mukherjee et. al. And F. M. Hasanuzzaman worked on different Image processing technique i.e. Fourier descriptor on Identification mark of India rupee 20,50,100,500,1000 and SURF on images of seven categories US bill 1, 2, 5, 10, 20, 50, 100 respectively. They achieved 97% and 100% accuracy respectively.
  • 10. • Image processing and pattern recognition area is the base area for feature extraction. • There are some techniques which are specifically from the application area of Image processing and pattern recognition and using those techniques the researchers achieved the accuracy rate ranges from 77% to 100%. • Few of the area are those which are the combination of machine learning and Image processing and therein the accuracy rate ranges from 96% to 100%. • The variation in accuracy rate is due to various factors such as choice of feature, type of note, number of features considered, country specific currency security feature, cost efficiency of the program.
  • 11. • This paper is an effort to suggest various techniques proposed by various researchers in terms of accuracy rate by considering a particular feature from denomination values of particular country’s currency. • Image processing and pattern recognition is the dominant area followed by Machine Learning. • Currency’s security features need periodical up-gradation due to up gradation of printing and scanning technology. • The areas where few researches have been conducted are data mining prediction techniques like map reduce, Apriori association rule or by means of any statistical model which could provide a solution for this complex issue.
  • 12. 1. NCRB compedium Report (2015-2016), crime report, Retrived from http://ncrb.gov.in/Stat Publications/CII/CII2015/FILES/CrimeInIndia2015.pdf 2. Santhanam, K., Sekaran, S., Vaikundam, S., & Kumarasamy, A. M. (2013, September). Counterfeit currency detection technique using image processing, polarization principle and holographic technique. In Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on (pp. 231-235). IEEE. 3. Alekhya, D., Surya Prabha, G. D., & Durga Rao, G. V. (2014). Fake currency detection using image processing and other standard methods. IJRCCT, 3(1), 128-131. 4. Thakur, M., & Kaur, A. (2014). Various fake currency detection techniques. International Journal for Technological Research in Engineering, 1(11), 1309-1313. 5. Jadhav S., Khanai R, (2016) Authentication And Counterfeit Detection Of Currency Using Image Processing. In International Conference on Recent Innovations in Engineering and Management (ICRIEM-16), pp. 709-715. 6. Ahmed, Z., Yasmin, S., Islam, M. N., & Ahmed, R. U. (2014, December). Image processing based Feature extraction of Bangladeshi banknotes. In Software, Knowledge, Information Management and Applications (SKIMA), 8th International Conference on (pp. 1-8). IEEE. 7. Sneha R, Deepika P K , Nagaveni S, Swetha Shree D , Asha K S.(2017) "Automatic counterfeit currency detection using Image Processing." International Research Journal of Engineering and Technology (IRJET) Vol. 4, Issue 5. 8. Pilania, Eshita, and Bhavika Arora.(2016) "Recognition of Fake Currency Based on Security Thread Feature of Currency.", International Journal Of Engineering And Computer Science, Volume 5 Issues, pp. 17136-17140. 9. Muthukrishnan, R., & Radha, M. (2011). Edge detection techniques for image segmentation. International Journal of Computer Science & Information Technology, 3(6), 259. 10. Atchaya, S., K. Harini, G. Kaviarasi, and B. Swathi.(2016) "Fake Currency Detection Using Image Processing.", International Journal of Trend in Research and Development, special issue, pp72-73. 11. Kumar, G., & Bhatia, P. K. (2014, February). A detailed review of feature extraction in image processing systems. In Advanced Computing & Communication Technologies (ACCT), Fourth International Conference on (pp. 5-12). IEEE. 12. Visani, C., & Jadeja, N. (2017) A Study on Different Machine Learning Techniques for Spam Review Detection, IEEE. 13. Alshayeji, Mohammad H., Mohammad Al-Rousan, and Dunya T. Hassoun. (2015) "Detection method for counterfeit currency based on bit-plane slicing technique." International Journal of Multimedia and Ubiquitous Engineering Vol.10, Issue11,pp. 225-242. 14. Mukherjee S. "Artificial neural network to recognize an Indian currency note using unique identification mark. (2015) " Journal of Applied and Fundamental Sciences Vol 1, Issue 2, pp. 213-220. 15. Roy, Ankush, Biswajit Halder, Utpal Garain, and David S. Doermann. (2015) "Machine-assisted authentication of paper currency: an experiment on Indian banknotes." International Journal on Document Analysis and Recognition (IJDAR) Vol 18, Issue 3, pp. 271-285. 16. Asadizanjani, N., Dunn, N., Gattigowda, S., Tehranipoor, M., & Forte, D. (2016, November). A database for counterfeit electronics and automatic defect detection based on image processing and machine learning. ISTFA. 17. Ballado, A. H., JC Dela Cruz, G. O. Avendaño, N. M. Echano, J. E. Ella, M. E. M. Medina, and B. K. C. Paquiz. (2015) "Philippine currency paper bill counterfeit detection through image processing using Canny Edge Technology." In Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), International Conference on, pp. 1-4. IEEE. 18. Kavya, B. R., and Devendran B. (2015) "Indian currency detection and denomination using SIFT." International Journal of Science Enineering and Technology. Vol 4, Issue 6, pp.1909-1911.
  • 13. 19. Prasanthi, B. Sai, and D. Rajesh Setty. (2015) "Indian paper currency authentication system—A quick authentication system." International Journal of Scientific and Engineering Research, Vol 6, Issue 9, pp. 1249-1256. 20. Elmurngi, E., & Gherbi, A. (2017). An empirical study on detecting fake reviews using machine learning techniques. 21. Lamsal S, and Shakya A (2015) "Counterfeit paper banknote identification based on color and texture.", Proceedings of the IOE Graduate Conference, pp. 160-168. 22. Kamal, Snigdha, Singh S, Chawla, Goel N, and Balasubramanian R.(2015) "Feature extraction and identification of Indian currency notes." In Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Fifth National Conference on, pp. 1-4. IEEE. 23. Almu, A., & Muhammad, A. B. (2017). Image-Based Processing Of Naira Currency Recognition. Annals. Computer Science Series, 15(1). 24. Ahmed, Z, Yasmin S, Islam N, and Ahmed R U. (2014) "Image processing based Feature extraction of Bangladeshi banknotes." In Software, Knowledge, Information Management and Applications (SKIMA), 2014 8th International Conference on, pp. 1-8. IEEE. 25. Rahman S, Banik P, Naha S.,(2014) “LDA based paper currency recognition system using edge histogram descriptor”. International conference on Computer and Information Technology (ICCIT), 17th International Conference on, pp. 326-331. IEEE. 26. Akbar M, Awaluddin AS, Putra AA, Widyarto S. (2013) “Original and Counterfeit Money Detection Based on Edge Detection”, International Conference on Instrumentation, Communication, Information Technology and Biomedical Engineering. 27. Nayak, J. K., Majhi, C., Srivastav, A. K., & Dash, A. K. (2015, December). Neural network approach for Indian currency recognition. In India Conference (INDICON), Annual IEEE (pp. 1-6). IEEE. 28. Grijalva, F., Rodriguez, J. C., Larco, J., & Orozco, L. (2010, September). Smartphone recognition of the US banknotes' denomination, for visually impaired people. In ANDESCON, IEEE (pp. 1-6). IEEE. 29. Santhanam K, Sekaran S, Vaikundam S, Kumarasamy AM.(2013) “Counterfeit currency detection technique using image processing, polarization principle and holographic technique”, Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on, pp. 231-235. IEEE. 30. Singh, S., Choudhury, S., Vishal, K., & Jawahar, C. V. (2014, August). Currency recognition on mobile phones. In Pattern Recognition (ICPR), 22nd International Conference on(pp. 2661-2666). IEEE. 31. Mirza R, Nanda V. (2012) “Design and implementation of Indian paper currency authentication system based on feature extraction by edge based segmentation using Sobel operator”, International Journal of Engineering Research and Development. Vol 3, Issue 2, pp.:41-46. 32. Omatu S, Yoshioka M, Kosaka Y. (2009) “Reliable banknote classification using neural networks”,Advanced Engineering Computing and Applications in Sciences, ADVCOMP'09. Third International Conference on, pp. 35-40, IEEE, Chhotu Kumar, Anil Kumar Dudyala, (2015, March) “Bank Note Authentication Using Decision Tree rules and Machine Learning Techniques”, IEEE International Conference on Advances in Computer Engineering and Applications (ICACEA). 33. Debnath, K. K., Ahmed, S. U., Shahjahan, M., & Murase, K. (2010). A paper currency recognition system using negatively correlated neural network ensemble. Journal of Multimedia, 5(6), 560-567. 34. Hassanpour, H., & Farahabadi, P. M. (2009). Using Hidden Markov Models for paper currency recognition. Expert Systems with Applications, 36(6), 10105- 10111. 35. Hasanuzzaman, F. M., Yang, X., & Tian, Y. (2012). Robust and effective component-based banknote recognition for the blind. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1021-1030.
  • 14. 36. Mann Manisha, Shukla S.K.,Gupta Shruti (2015, June) “A comparative study on security features of banknotes of various countries”International Journal of Multidisciplinary Research and Development (83-91) Volume: 2, Issue: 6. 37. Anahita Ghazvini, Jamilu Awwalu, Azuraliza Abu Bakar, (2014, November), “Comparative Analysis of Algorithms in Supervised Classification: A case Study of Bank Notes Dataset”, International Journal of Computer Trends and Technology (IJCTT), pg. no. 39-43,volume 17 number 1, ISSN: 2231-2803. 38. Ballado, A. H., Cruz, J. D., Avendaño, G. O., Echano, N. M., Ella, J. E., Medina, M. E. M., & Paquiz, B. K. C. (2015, December). Philippine currency paper bill counterfeit detection through image processing using Canny Edge Technology. In Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), 2015 International Conference (pp. 1-4). IEEE. 39. Yaseri, A., & Anisheh, S. M. (2013). A novel paper currency recognition using Fourier mellin transform, hidden Markov model and support vector machine. International Journal of Computer Applications, 61(7). 40. Nur Syhuda Mohamad, Burairah Hussin, A.S. Shibghatullah, A.S.H. Basari, (2015, 15-16 October) “Banknote Authentication using Artificial Neural Network”, International Symposium on Research in Innovation and Sustainability, pg. no. 1865-1868, ISSN 1013-5316. 41. Kamal, S., Chawla, S. S., Goel, N., & Raman, B. (2015, December). Feature extraction and identification of Indian currency notes. In Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Fifth National Conference (pp. 1-4). IEEE. 42. Masato Aoba, Testsuo Kikuchi, Yoshiyasu Takefuji, (2003, May), “Euro Banknote Recognition System using three-layered Perceptron and RBF Networks”, IPSJ Transactions on Mathematical Modeling and its applications, pg. no. 99-109, Volume 44 No. SIG 7(TOM 8). 43. B.Sai Prasanthi, D.Rajesh Setty (2015, September), “Indian Paper currency authentication system- A quick authentication system”, International Journal of Scientifica & Engineering Research, pg. no. 1249-1256, Volume 6, Issue 9, ISSN: 2229-5518. 44. Vishnu, R., & Omman, B. (2014, December). Principal features for Indian currency recognition. In India Conference (INDICON), 2014 Annual IEEE (pp. 1-8). IEEE. 45. M. F. Santos, P. Cortez1, J. Pereira & H. Quintela (2006) data mining techniques, “Corporate bankruptcy prediction using data mining techniques”, Data Mining VII: Data, Text and Web Mining and their Business Applications, WIT Transactions on Information and Communication Technologies, Vol 37, ISSN 1743-3517, Pg 349-357..