SlideShare a Scribd company logo
1 of 9
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3577
Brightness Preserving Bi-Histogram Equalization for Preprocessing in
Counterfeit Indian Currency Notes Detection
Fathima Hibath Sudheer1, Dr. Priya S2, Mr. Sreekumar K3
1Mtech Student in Image Processing, Model Engineering College, Thrikkakara, Kochi, India
2Professor, Dept. of Computer Engineering, Model Engineering College, Thrikkakara, Kochi, India
3Assistant Professor, Department of Computer Engineering, Model Engineering College, Thrikkakara, Kochi, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract ā€“ The rise of color printing technology has
increased the rate of fake currency note printing of identical
notes on a very large scale. Few years back, Indian
government has announced the demonetization of all Rs
500 and Rs 1000, in reserve bank notes of Mahatma Gandhi
series. Indian government has introduced a new Rs 500 and
Rs 2000, to reduce illegitimate activity in India. Even then
the new notes of counterfeit or bogus currency are
distributed in the society. The main purpose of this work is
to identify counterfeit currencies among the real. From the
currency, the strip lines or continuous lines are detected
from real and counterfeit note by using edge detection
techniques. LAB techniques are used to saturate the value of
an input image. This proposed system focuses on pre-
processing stage of the Counterfeit Indian Currency Notes
Detection which includes image adjustment, image filtering
using bilateral filter, image smoothening using Brightness
Preserving Bi-Histogram Equalization (BBHE) and
converting RGB image to LAB color space image.
Key Words: Counterfeit Banknote Detection Methods,
Digital Image Processing Method, Image adjustment,
Image filtering, Smoothening and RGB to LAB
conversion.
1. INTRODUCTION
Research areas for currency are banknote recognition,
counterfeit banknote detection, serial number recognition,
and ļ¬tness classiļ¬cation shown in Figure: 1.
Figure 1: Research areas for currency.
Banknote recognition generally concerns with the
classiļ¬cation of banknotes by denomination, i.e., the
currency amount of a note of a speciļ¬c country. This
classiļ¬cation can also enable recognition of the year of
printing and input direction of the classiļ¬ed
denomination. In some studies, the scope of recognition is
extended to the simultaneous recognition of two or more
Indian currencies.
Counterfeit banknote detection generally concerns with
the methods for distinguishing between genuine and fake
notes.
Banknote serial number is the unique alphanumerical
identifier engraved on each banknote in the banknote
production process. It contains the name of the issuing
bank and the serial information of each denomination. All
banknotes have its own idiomatic serial number and it can
be used to outline its source and circulation route and can
thus be efficiently used to identify counterfeit banknotes.
Fitness classiļ¬cation of the banknotes generally concerns
the methods for classifying banknotes according to their
physical conditions, such as soiling. Banknotes of same
denomination may exhibit ļ¬t or unļ¬t conditions, which
include soiling and creases, depending on circulation
intensity and climate conditions. In order to conserve the
robustness of banknotes in circulation, automated self-
service terminals, such as ATMs, need to be equipped with
a ļ¬tness classiļ¬cation function to sort out and retrieve
unļ¬t banknotes. Retrieving the unļ¬t banknotes is also
necessary for preventing banknote classiļ¬cation errors.
Within research areas, this work concentrates on
Counterfeit banknote detection. For the last few years, as a
result of the great technological advancement in color
printing, duplicating and scanning, counterfeiting
problems have become more serious. In the past, only the
printing house has the ability to make a counterfeit note,
but today it is possible for any person to print counterfeit
bank notes simply by using a computer and a laser printer
at the home. Therefore the issue of efficiently verifying
counterfeit banknotes from real ones via automatic
machines has become more important. Counterfeit notes
are the problem of almost every country but India has
been hit really hard and has become a very acute problem.
There is a need to design the system that will helpful for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3578
the recognition of paper currency notes with fast speed
and in less time.
The Indian government announced the new rules to
eliminate the bogus currency. The Reserve Bank of India is
the only one that has the full authority to issue banknotes.
There is no proper way to deal with them for a common
person; the common person is also prey to this currency.
Some of the eļ¬€ects that the bogus money has on society
include a reduction in the value of substantial money and
inļ¬‚ation due to more artiļ¬cial money getting circulated in
the society or the economy, and which in turn dampen our
economy and growth. Then the decrease in the
acceptability of paper money occurs. These are several
techniques used by Reserve Bank of India to identify
artiļ¬cial currency.
In every year, Reserve Bank of India faces the counterfeit
currency notes or destroyed notes. Handling of the large
volume of counterfeit notes imposes additional problems.
Therefore, involving machines with the assistance to the
human experts makes notes identiļ¬cation process simpler
and eļ¬ƒcient. For the detection of forged notes, it needs to
identify the denomination every time they use the device
which consists of ultraviolet light. The bank employees
keep the fake paper currency note on the device and try to
ļ¬nd whether the watermark identiļ¬cation, serial number
and other characteristics of the notes are proper to check
its authentication.
2. RELATED WORKS
B.Sai Prasanthi, D. Rajesh Setty ā€Indian Paper Currency
Authentication System using Image processingā€[1].In this
article, the authentication of Indian paper currency is
described by applying image processing techniques.
Generally, six features are extracted including
identiļ¬cation mark, security thread, watermark, numeral,
ļ¬‚oral design, micro lettering from the image of the
currency. The process begins with image acquisition and
ends at a comparison of features. The system designed is a
low-cost system. The system extracts the features even the
note has scribblings on it. Also, the system will extracts
features even the test image sizes are diļ¬€erent when
compared to the reference image.
Rubeena Mirza, Vinti Nandaā€Design and Implementation
of Indian Paper Currency Authentication System Based on
Feature Extraction by Edge Based Segmentation Using
Sobel Operatorā€[2].In this paper, the authentication of
Indian paper currency is described by applying various
image processing techniques. Generally, three features are
extracted including identiļ¬cation mark, security thread,
and watermark from the image of the currency. The
process begins with image acquisition and ends at a
comparison of features. The features are extracted using
edge-based segmentation by Sobel operator and work well
in the whole process with less computation time. The
complete methodology works for the Indian denomination
100, 500 and 1000. The method is very simple and easy to
implement. If the hardware part of image acquisition is
designed then it surely helps us to minimize the problem
of counterfeiting currency.
Sandeep Kaur, Seema Baghla, Sunil Kumarā€Enhancement
of Sift algorithm to check the authenticity of Indian
Currencyā€[3]. SIFT algorithm has been used to analyze the
external features of an image by various researchers in the
past. The currency detection is the application of image
analysis, in which the SIFT algorithm along with the
nearest neighbor classiļ¬er has been applied to analyze
external features of the checking the originality of
currency notes. In the present work, a method using the
SIFT algorithm with Bayesian classiļ¬er and DWT has been
proposed for checking the originality of currency notes.
The value of Peak signal to noise ratio (PSNR), root mean
square error (RMSE), fault detection rate (FDR) and
accuracy values of the proposed and existing algorithm
(SIFT algorithm with nearest neighbor classiļ¬er) are
compared to validate the proposed system. The results
conļ¬rmed that the proposed technique is better as
compared to the existing technique for checking the
originality of the currency notes.
Deepak M. P, Prajwala N. B ā€Identiļ¬cation of Fake Notes
and Denomination Recognitionā€[4]. The Indian currency
system has diļ¬€erent denominations that are unique in one
feature or the other. These features are color, size or some
identiļ¬cation marks, etc. This system recognizes and
transforms the framework in order to diminish human
energy, and to consequently perceive the measure of the
money esteem and to change over it to diļ¬€erent monetary
forms without human supervision. Our proposed work
diļ¬€erentiates white paper and the currency, by detecting
colors of diļ¬€erent currencies. We have used a feature
extraction mechanism to identify various identiļ¬cation
patterns and also the denominations in the currency. As
our intention to achieve a simple however productive
calculation that would be helpful for the most extreme
number of monetary standards, using MatLab, we have
developed an eļ¬ƒcient system for the monetary standards
10,20,50,100,500 and 2000 which produces 98.8
accuracies.
Prashant Dhar, Md. Burhan Uddin Chowdhury, Tonoy
Biswas ā€Paper Currency Detection System Based on
Combined SURF and LBP Featuresā€[5].Proposed a new
paper currency detection system for Bangladeshi paper
currency using combined SURF and LBP features. The
prediction is made by SVM classiļ¬er. SVM performs very
well in this case. Paper currency detection is a vital
application for surveillance systems. Very few works have
been done on this application. Here we proposed a new
method to detect paper currency. We considered only
paper currencies of Bangladesh. It is quite a challenging
task to detect currency in diļ¬€erent positions from
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3579
diļ¬€erent environments. This proposed system can detect
currency in rotated positions also. This proposed system
can also calculate the total amount of currency that exists
in an image. We achieved an overall accuracy of 92.6we
will try to improve the performance for the rotated
position of currency. We will focus on folding notes and
overlapped notes. We will try to consider all possible sorts
of notes. Moreover, we should investigate with other local
or global features so as to improve performance better.
Navya Krishna G, Sai Pooja G, Naga Sri Ram B, Yamini
Radha V, Rajarajeswari P ā€Recognition of Fake Currency
Note using Convolutional Neural Networksā€[6].In this
paper, proposed a model which demonstrates the
feasibility of using CNN with the VGG 16 architecture.
Although the generated data set was small and did not
represent the real-world scenario of counterfeit currency
data-set, it was very helpful throughout the experiment.
The process of detection of fake notes is quick and easy
under the trained model. By this, we can also assure that
under real and large data set, the model AFCRS can be
well-trained and also provides accurate results, which can
help the people in recognizing the currency note whether
it is counterfeit or original. Future research may include
the deployment of the model in smartphones as an
application and make society and people more
comfortable in recognizing counterfeit currency. This
model can also be compared with various architectures of
CNN which may have a low error rate than the present
model and can be combined by applying image pre-
processing techniques like and edge-detection to crop the
currency note out of an image which will present better
results.
Fumiaki Takeda and Sigeru Omatuā€ High Speed Paper
Currency Recognition by Neural Networksā€[7]. In this
paper, we have applied NN to paper currency recognition
and showed the eļ¬€ectiveness compared with a
conventional manual method. Furthermore, we have
proposed a structure reduction method of the NN using
random masks and showed its eļ¬€ectiveness for time series
data and its Fourier power spectra. Finally, we also
introduced a new evaluation method for reliability and
showed its eļ¬€ectiveness using real data. We expect that
the present method will promote compactness, high-speed
transaction, and low cost of paper currency recognition
machines.
Gouri Sanjay Tele, Akshay Prakash Kathalkar, Sneha
Mahakalkar, Bharat Sahoo, Vaishnavi Dhamane ā€Detection
of Fake Indian Currencyā€[8].In this paper, a technique for
verifying Indian paper currency. The approach gives an
eļ¬ƒcient method for fake currency detection based on
physical appearance. The work will surely be very useful
for minimizing the counterfeit currency. Through this
application, we are able to see the missing parameters
which the fake note doesnā€™t have as compared to the
original notes. Original Currency is being detected using
the Image Processing Technique.
3. COUNTERFEIT BANKNOTE DETECTION
3.1 Counterfeit Banknote Detection Methods:
Figure 2: Counterfeit banknote detection methods
A. Commonly Used Method for Detecting Fake Currency
1. See-through Register
The small floral design printed on both front (hollow) and
back (filled up) of the note in the middle of the vertical
band next to the Watermark has an accurate back to back
registration. The design will appear as the floral design
when seen against the light.
2. Watermarking
The Mahatma Gandhi Series of the banknotes include the
Mahatma Gandhi watermark with a light and shade effect
and multi-directional lines in the watermark window.
3. Fluorescence
Number panels of the notes are printed in the fluorescent
ink. The notes also have optical fibers. Both can be seen
when the notes are exposed to the ultra-violet lamp.
4. Security Thread
The Rs.500 and Rs.100 notes have a security thread with
the similar visible features and inscription ā€œBharatā€ (in
Hindi), and ā€œRBIā€. When held against the light, the security
thread on Rs.2000, Rs.500 and Rs.100 can be seen as one
continuous line. The Rs.5, Rs.10, Rs.20, and Rs.50 notes
contain a readable, fully embedded windowed security
thread with inscription ā€œBharatā€ (in Hindi), and ā€œRBIā€. The
security thread appears on the left of the Mahatma's
portrait.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3580
5. Intaglio Printing
The portrait of Mahatma Gandhi, the Reserve Bank seal,
guarantee and promise clause, Ashoka Pillar Emblem on
the left, RBI Governor's signature is printed on intaglio i.e.
in raised prints, which can feel by touch, in Rs. 20, Rs. 50,
Rs. 100, Rs.500 and Rs.2000 notes.
6. Latent image
On the opposite side of Rs.2000, Rs.500, Rs.100, Rs.50 and
Rs.20 notes, a vertical band on the right side of the
Mahatma Gandhiā€™s portrait contains a latent image
showing the respective denominational value in the
numeral. The latent image is apparent only when the note
is held horizontally at eye level.
7. Micro lettering
This feature sees between the vertical band and Mahatma
Gandhi portrait. It always contains the word "RBIā€Ÿ in Rs.5
and Rs.10. The notes of Rs.20 and above also hold the
denominational value of the notes in micro letters. This
feature can see well under a magnifying glass.
8. Identification Mark
Each note has a unique mark. A special feature in intaglio
has been presented on the left of the watermark window
on all notes except Rs.10/- note. This feature is in different
shapes for different denominations (Rs.20-Vertical
Rectangle, Rs.50- Square, Rs.100-Triangle, Rs.500-Circle,
and Rs.1000- Diamond) and helps the visually impaired to
identify the denomination.
9. Optically Variable Ink
This is a new feature included in the Rs.2000 and Rs.500
notes with revised color scheme. The numeral 2000 and
500 on the opposite of Rs.2000 and Rs.500 notes
respectively are printed in optically variable ink viz., a
color-shifting ink. The color of the numeral 2000/500
appears green when the note is held flat but would change
to blue when the note is held at an angle.
B. Digital Image Processing Method for Detecting
counterfeit Currency.
Design flow of the counterfeit currency detection system
includes eight stages: Image acquisition, pre-processing,
gray scale conversion, edge detection, image
segmentation, feature extraction, comparison and output
[9]. This system works on two images, one is testing
currency image on which authentication is to performed
and the other is the original currency image.
1. Image Acquisition
There are various ways to acquire images such as with the
help of a camera or scanner. The acquired image should
retain all the features [9].
2. Pre-Processing
Pre-processing of the image is those operations that are
normally required prior to the main data analysis and
extraction of information. The aim of image pre-
processing is to suppress undesired distortions or to
enhance some image features that are important for
further processing or to analysis. It includes:
2.1 Image Adjusting
When we get the image from a scanner, the size of the
image is too big. In order to reduce the calculation, we
decrease the size of the image. Image Adjusting is done by
using image interpolation. Interpolation is the technique
mostly used for tasks such as zooming, rotating, shrinking,
and geometric corrections.
2.2 Image smoothening
While using a camera or a scanner and perform image
transfers, some noise will appear on the image. Image
noise is the random variation of the brightness in images.
Removing the noise is a major step when image processing
is being performed. Although, noise may affect
segmentation and pattern matching. When performing the
smoothing process on a pixel, the neighbor of the pixel is
used to do some transforming. After that, the new value of
the pixel is created. The neighbor of the pixel is consisting
of some other pixels and they build up a matrix, the size of
the matrix is an odd number, the target pixel is located on
the middle of the matrix. Convolution is used to perform
image smoothing. Image smoothening can also be done
with the help of a median filter which gives more effective
than convolution when the goal is to simultaneously
reduce the noise preserving edges. The median filter
replaces a pixel via the median pixel of all the
neighborhoods [9].
3. Gray-scale conversion
The image acquired is in RGB color. It is converted into
gray scale because it carries only the intensity information
which is easy to process instead of processing three
components R (Red), G(Green), B(Blue) [1].
4. Edge detection
Edge detection is an essential technique in image
processing and computer vision, particularly in the areas
of feature detection and feature extraction, which aims at
identifying points in a digital image at which the image
brightness alters sharply or, more formally, has
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3581
discontinuities. Edge detection is one of the major steps in
image processing, image analysis, image pattern
recognition, and computer vision techniques [8].
5. Image segmentation
Image segmentation sub divides the image into its
component regions or objects. A level to which sub
division is carried depends on problem being solved.
Segmentation algorithm for monochrome images
generally based on one of the two basic properties of
image intensity values:
ā€¢ Discontinuity
ā€¢ Similarity.
The approach in the first category is to partition an image
based on abrupt changes in intensity such as edges in an
image. The approach in the second category is based on
partitioning an image into regions that are similar
according to a set of predefined criteria [8].
6. Feature Extraction
In pattern recognition and in image processing, feature
extraction is the special form of dimensionality reduction
method. This method captures the visual content of
images for indexing and retrieval. If input data to an
algorithm is too large to be processed and it is assumed to
be notoriously redundant (much data but not much
information) then the input data will be converted into a
reduced representation set of features (also named feature
vector). If attributes are extracted are chosen carefully, it
is expected that the attributes set will extract the relevant
information from the input data in order to perform the
desired task using this reduced representation instead of
using the full-size input. Feature extraction involves
simplifying the number of resources required to describe
the large set of data.
Visual attributes of images are of two types:
ļ‚· Domain-specific attributes include fingerprints,
human faces.
ļ‚· General attributes include color, texture, and
shape.
Figure 2: Flow Chart of Digital Image Processing Method to
Detect Fake Notes.
There are two types of attributes distinguish under the
shape attribute extraction:
ā€¢ Global attributes include moment invariant,
aspect ratio and circularity.
ā€¢ Local attributes include boundary segments [1].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3582
Figure 3: Feature Extraction Approach
7. Comparison
Finally, the extracted features of test currency image are
compared with the extracted features of the original
currency image, if it matches then the currency is original
otherwise fake [1].
C. MATLAB technique:
In this technique, one can split red, blue, green components
of a picture and name them as r1, g1, b1 which correspond
to image i.e. original currency note. Consider the second
image that is noted to be tested. Split this image to
components r2, b2, g2. Construct a new image with
components as r1, g2, b1 or r2, g1, b1 or b2, g1, b1. But
r1,g2,b1 combination is most preferred because the human
eye is sensitive to green component and most of our
images contain maximum green component so that our
output image will be much easier to identify counterfeit
note more effectively. After that compare newly
constructed images with image1. Calculate the threshold
value of equivalence by calculating the standard deviation.
If equivalence is above 40% then one can consider it as an
original note. Here consider 40% of the value because note
may be damaged. Parameters for a measure of comparing
images are Mean Square Error (MSE), Peak Signal to Noise
Ratio (PSNR in dB), and structural Content (SC). When
combining two various components of two images then if a
note to be tested is original then only at the place of a
number we get variation. But in case of fake note after
applying the same code, one can observe that the image
overlapping is not done correctly. One can also see that the
resultant image is blurred indicating fake note. So one can
confirm that it is a fake note [12].
D. Counterfeit Detection Pen:
A counterfeit pen is simply an inexpensive device that is
designed to determine if a currency note is original or fake.
The pen includes a tincture of iodine as ink which, when
drawn over a note, will remain amber or brown. According
to the manufacturer, the ink will turn black if the note is
fake.
1. Working of counterfeit pen:
The iodine in the pen respond with starch, which is the
primary component that makes a white paper look
brighter. Most corporate paper, made from wood pulp, is
brown unless bleached and starched. If there is no
presence of starch in the paper then the pen will indicate -
by remaining amber- that the note is original.
2. How counterfeiters defeat this pen:
The iodine in the pen respond with starch that makes
white paper look brighter. Most unless bleached and
starched. If there is no starch present in the paper then the
pen will indicate ā€“ by remaining amber - that the note is
original [12].
E. Other techniques:
Another anti-counterfeit device for the money is an
Ultraviolet counterfeit detection scanner. Best used in the
highly lit point of sale locations, the UV detector identifies
ultraviolet security features present in most currencies. By
simply placing the note in the detector, counterfeit
currency is immediately identified, without the need for an
employee to closely examine the note [12].
These are the different techniques for counterfeit banknote
detection. The most efficient technique is digital image
processing method.
4. PROPOSED SYSTEM
The steps involved in Image Enhancement for Fake Indian
Currency Notes Detection are shown in figure 4.
Figure 4: Block diagram for proposed system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3583
4.1 Input Image:
In this ļ¬rst stage of any vision system is the input image
stage. After the image has been obtained, the various
methods of processing can be applied to the image to
perform many diļ¬€erent tasks. Performing input images in
image processing is always the ļ¬rst step in the workļ¬‚ow
sequence because, without an image, no processing is
possible. There are various techniques to acquire images
such as with the help of a camera or scanner. The input
image should retain all the features. Here input image is
the RGB image of currency taken under the UV light.
4.2 Image Adjustment:
Image Adjusting is one of the most pre-processing
techniques, which is done with the help of image
interpolation. Interpolation is the technique widely used
for tasks such as zooming, rotating, shrinking, and
geometric corrections. Removing the noise is a major step
when image processing is being performed. However, the
noise may affect segmentation and pattern matching.
When performing the smoothing process on a pixel, the
neighbor of the pixel is used to do some transforming.
After that, a new value of the pixel is created [13].
4.3 Image Filtering:
In this system, filtering is done for removing noise. Here
the bilateral filter is used for noise removal. It is a non-
linear, edge-preserving and noise-reducing smoothing
filter for images. It substitutes the intensity of each pixel
with the weighted average of intensity values from the
nearby pixels. This weight can be based on Gaussian
distribution. Crucially, the weights depend not only on
Euclidean distance of the pixels but also on the
radiometric differences (e.g., range differences, such as
color intensity, depth distance, etc.). This preserves the
sharp edges.
4.4 Image Smoothening:
Smoothening is done using Brightness Preserving Bi-
Histogram Equalization (BBHE). BBHE firstly decomposes
an image into two sub-images based on the mean of the
input images. One of the sub-images is the set of samples
less than or equal to the mean whereas the other one is
the set of samples greater than the mean. Then the BBHE
equalizes the sub-images independently based on their
respective histograms with the constraint that the samples
in the formal set are mapped into the ranges from the
minimum gray level to the input mean and the samples in
the latter set are mapped into the ranges from the mean to
the maximum gray level. In other words, one of the sub-
images is equalized over the range up to the mean, based
on the respective histogram. Thus, resulting equalized
sub-images are bounded by each other around the input
mean, which has an effect of preserving mean brightness.
Figure 5: BBHE algorithm
4.5 RGB to LAB Color Space Conversion:
The next implementation in the proposed method is to
convert the RGB color space to L*a*b* color space. For this
proposed work L*a*b* color space is selected which is a
homogeneous space for visual perception. The difference
between the two points in the L*a*b* color space is the
same as the human visual system. Since the L*a*b* model
is a three-dimensional model, it can only be represented
properly in three-dimensional space [14] - [2]. The
solution to convert digital images from the RGB space to
the L*a*b* color space is given by the following formula
[14].
L* = 116 f(Y/Yn) ā€“ 16
a* = 500[f(X/Xn)-f(Y/Yn)]
b* = 200[f(Y/Yn)-f(Z/Zn)]
X, Y, Z, Xn, Yn, and Zn are coordinates of CIEXYZ Color
space. The solution to convert the digital images from the
RGB space to the CIEXYZ color space is the following
formula.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3584
X 0.608 0.174 0.201 R
Y = 0.299 0.587 0.114 G
Z 0.000 0.066 1.117 B
Xn, Yn, and Zn respectively correspond to the white value
of the parameter.
F(x) = X^1/3 x>0.008856
7.787x+16/116 x<= 0.008856
Color space conversion is translation of the representation
of a color from one basis to another. This typically occurs
in context of converting an image that is represented in
one color space to another color space.
5. EXPERIMENTAL RESULTS
In this project, the RGB image of currency note is given as
input image and various preprocessing methods has been
applied such as Bilateral filtering , Brightness Preserving
Bi-Histogram Equalization (BBHE) and then converted
equalized image to LAB color space.
Figure 6: Noise removal using bilateral filtering
Figure 7: Histogram Equalization.
Figure 8: Brightness Preserving Bi-Histogram Equalization
Figure 9: Converting equalized RGB image to LAB color
space.
6. CONCLUSION
Pre-processing is a necessary step in any computer vision
system, which includes extraction of information from the
RGB image taken under UV light. According to the
requirement, various different pre-processing techniques
are used and developed. In this proposed work, we use
different pre-processing methods such as image
adjustment, image filtering using the bilateral filter, image
smoothening using Brightness Preserving Bi-Histogram
Equalization (BBHE) and converting RGB image to LAB
color space image. This system provides better
performance for processing than the existing method.
REFERENCES
[1] Rubeena Mirza, Vinti Nanda ā€Design and
Implementation of Indian Paper Currency
Authentication System Based on Feature Extraction by
Edge Based Segmentation Using Sobel Operatorā€
International Journal of Engineering Research and
Development e-ISSN: 2278-067X, p-ISSN: 2278-800X,
www.ijerd.com Volume 3, Issue 2 (August 2012), PP.
41-46.
[2] Sandeep Kaur,Seema Baghla, Sunil Kumar
ā€Enhancement of Sift algorithm to check authenticity
of Indian Currencyā€ International Journal of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3585
Computational Intelligence Research ISSN 0973-1873
Volume 13, Number 5 (2017), pp. 945-953 c
Research India Publications
http://www.ripublication.com
[3] Prashengit Dhar, Md. Burhan Uddin Chowdhury,
Tonoy Biswas ā€Paper Currency Detection System
Based on Combined SURF and LBP Featuresā€ 2018
2nd Int. Conf. on Innovations in Science, Engineering
and Technology (ICISET) 27-28 October 2018,
Chittagong, Bangladesh.
[4] Navya Krishna G, Sai Pooja G, Naga Sri Ram B, Yamini
Radha V, Rajarajeswari P ā€Recognition of Fake
Currency Note using Convolutional Neural Networksā€
International Journal of Innovative Technology and
Exploring Engineering (IJITEE) ISSN: 2278-3075,
Volume-8 Issue-5 March, 2019
[5] G Chinmay Bhurke, Meghana Sirdeshmukh, Prof. Mrs.
M.S.Kanitkar ,ā€œCurrency Recognition Using Image
Processing s,ā€ International Journal of Innovative
Research in Computer and Communication
Engineering,, vol.III, May 2015 .
[6] https://www.overleaf.com/project/5dc917fb52bc02
0001f5387d K. Kang ;C. Lee], Fake banknote detection
using multispectral images,ā€™ International Conference
on Information, Intelligence, Systems Applications
(IISA), 19 December 2016.
[7] Binod Prasad Yadav, C. S. Patil, R. R. Karhe, P.H Patil,
An automatic recognition of fake Indian paper
currency note using MATLAB,ā€ International Journal
of Engineering Science and Innovative Technology
(IJESIT) Volume 3, Issue 4, July 2014
[8] D.Alekhya ,G.DeviSuryaPrabha , G.VenkataDurgaRao,
Fake Currency Detection Using Image Processing and
Other Standard Methodsā€, International Journal of
Research in Computer and Communication
Technology, may 2015.
[9] Amol A. Shirsath and S. D. Bharkad, Survey Of
Currency Recognition System Using Image Processing,
International Journal of Computational Engineering
Research, Vol, 03, Issue 7M. Young, The Technical
Writerā€™s Handbook. Mill Valley, CA: University Science,
1989.
[10] Rubeena Mirza and Vinti Nanda, Paper Currency
Verification System Based on Characteristic Extraction
Using Image Processing, International Journal of
Engineering and Advanced Technology (IJEAT) ISSN:
2249 ā€“ 8958, Volume-1, Issue-3, February 2012.
[11] PM.Deborah., PC.Soniya Prathap, ā€œDetection of Fake
currency using Image processing,ā€ IJISET -
International Journal of Innovative Science,
Engineering Technology, vol I, 10 December 2014.
[12] Chun Chen;ā€œComputer image processing technology
and algorithmsā€., Beijing: Tsinghua University Press,
2003.
[13] R. Fisher, K Dawson-Howe, A. Fitzgibbon, C.
Robertson, E. Trucco (2005). Dictionary of Computer
Vision and Image Processing. John Wiley. ISBN 0-470-
01526-8.
[14] G Chinmay Bhurke, Meghana Sirdeshmukh, Prof. Mrs.
M.S.Kanitkar ,ā€œCurrency Recognition Using Image
Processing s,ā€ International Journal of Innovative
Research in Computer and Communication
Engineering,, vol.III, May 2015 .
[15] Sagar S. Lawade, Gayatri S. Hedau, Apurva C.
Ramgirwar, Fake Currency detection using image
processing,ā€ International Journal of Research in
Computer and Communication Technology, vol III,
may 2014

More Related Content

What's hot

IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET Journal
Ā 
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule NetworkIRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule NetworkIRJET Journal
Ā 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
Ā 
Online Handwriting Recognition using HMM
Online Handwriting Recognition using HMMOnline Handwriting Recognition using HMM
Online Handwriting Recognition using HMMrahulmonikasharma
Ā 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
Ā 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
Ā 

What's hot (7)

IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
Ā 
Indian currency
Indian currencyIndian currency
Indian currency
Ā 
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule NetworkIRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
Ā 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
Ā 
Online Handwriting Recognition using HMM
Online Handwriting Recognition using HMMOnline Handwriting Recognition using HMM
Online Handwriting Recognition using HMM
Ā 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
Ā 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
Ā 

Similar to IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing in Counterfeit Indian Currency Notes Detection

automatic3.pdf.pdf
automatic3.pdf.pdfautomatic3.pdf.pdf
automatic3.pdf.pdfRashmibansal15
Ā 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detectionijtsrd
Ā 
Indian Currency Identification Using Image Processing
Indian Currency Identification Using Image ProcessingIndian Currency Identification Using Image Processing
Indian Currency Identification Using Image ProcessingINFOGAIN PUBLICATION
Ā 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
Ā 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image ProcessingIRJET Journal
Ā 
IRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET Journal
Ā 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition systemeSAT Journals
Ā 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processingFatima Akhtar
Ā 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
Ā 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistanceijscai
Ā 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds IJSCAI Journal
Ā 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSijscai
Ā 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random ForestIRJET Journal
Ā 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
Ā 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
Ā 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
Ā 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionIRJET Journal
Ā 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET Journal
Ā 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sectorsuhasmcomplex
Ā 

Similar to IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing in Counterfeit Indian Currency Notes Detection (20)

automatic3.pdf.pdf
automatic3.pdf.pdfautomatic3.pdf.pdf
automatic3.pdf.pdf
Ā 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
Ā 
Indian Currency Identification Using Image Processing
Indian Currency Identification Using Image ProcessingIndian Currency Identification Using Image Processing
Indian Currency Identification Using Image Processing
Ā 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Ā 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
Ā 
IRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image Processing
Ā 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
Ā 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
Ā 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
Ā 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
Ā 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
Ā 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
Ā 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
Ā 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
Ā 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
Ā 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Ā 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
Ā 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud Detection
Ā 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
Ā 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
Ā 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
Ā 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
Ā 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
Ā 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
Ā 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
Ā 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
Ā 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
Ā 
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
Ā 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
Ā 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
Ā 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
Ā 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
Ā 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
Ā 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
Ā 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
Ā 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
Ā 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
Ā 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
Ā 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
Ā 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
Ā 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Ā 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Ā 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Ā 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Ā 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Ā 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Ā 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Ā 
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of ā€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
Ā 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Ā 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Ā 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Ā 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Ā 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Ā 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Ā 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
Ā 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Ā 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Ā 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Ā 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Ā 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Ā 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerAnamika Sarkar
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĆ£o Esperancinha
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Ā 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
Ā 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Ā 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
Ā 

IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing in Counterfeit Indian Currency Notes Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3577 Brightness Preserving Bi-Histogram Equalization for Preprocessing in Counterfeit Indian Currency Notes Detection Fathima Hibath Sudheer1, Dr. Priya S2, Mr. Sreekumar K3 1Mtech Student in Image Processing, Model Engineering College, Thrikkakara, Kochi, India 2Professor, Dept. of Computer Engineering, Model Engineering College, Thrikkakara, Kochi, India 3Assistant Professor, Department of Computer Engineering, Model Engineering College, Thrikkakara, Kochi, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract ā€“ The rise of color printing technology has increased the rate of fake currency note printing of identical notes on a very large scale. Few years back, Indian government has announced the demonetization of all Rs 500 and Rs 1000, in reserve bank notes of Mahatma Gandhi series. Indian government has introduced a new Rs 500 and Rs 2000, to reduce illegitimate activity in India. Even then the new notes of counterfeit or bogus currency are distributed in the society. The main purpose of this work is to identify counterfeit currencies among the real. From the currency, the strip lines or continuous lines are detected from real and counterfeit note by using edge detection techniques. LAB techniques are used to saturate the value of an input image. This proposed system focuses on pre- processing stage of the Counterfeit Indian Currency Notes Detection which includes image adjustment, image filtering using bilateral filter, image smoothening using Brightness Preserving Bi-Histogram Equalization (BBHE) and converting RGB image to LAB color space image. Key Words: Counterfeit Banknote Detection Methods, Digital Image Processing Method, Image adjustment, Image filtering, Smoothening and RGB to LAB conversion. 1. INTRODUCTION Research areas for currency are banknote recognition, counterfeit banknote detection, serial number recognition, and ļ¬tness classiļ¬cation shown in Figure: 1. Figure 1: Research areas for currency. Banknote recognition generally concerns with the classiļ¬cation of banknotes by denomination, i.e., the currency amount of a note of a speciļ¬c country. This classiļ¬cation can also enable recognition of the year of printing and input direction of the classiļ¬ed denomination. In some studies, the scope of recognition is extended to the simultaneous recognition of two or more Indian currencies. Counterfeit banknote detection generally concerns with the methods for distinguishing between genuine and fake notes. Banknote serial number is the unique alphanumerical identifier engraved on each banknote in the banknote production process. It contains the name of the issuing bank and the serial information of each denomination. All banknotes have its own idiomatic serial number and it can be used to outline its source and circulation route and can thus be efficiently used to identify counterfeit banknotes. Fitness classiļ¬cation of the banknotes generally concerns the methods for classifying banknotes according to their physical conditions, such as soiling. Banknotes of same denomination may exhibit ļ¬t or unļ¬t conditions, which include soiling and creases, depending on circulation intensity and climate conditions. In order to conserve the robustness of banknotes in circulation, automated self- service terminals, such as ATMs, need to be equipped with a ļ¬tness classiļ¬cation function to sort out and retrieve unļ¬t banknotes. Retrieving the unļ¬t banknotes is also necessary for preventing banknote classiļ¬cation errors. Within research areas, this work concentrates on Counterfeit banknote detection. For the last few years, as a result of the great technological advancement in color printing, duplicating and scanning, counterfeiting problems have become more serious. In the past, only the printing house has the ability to make a counterfeit note, but today it is possible for any person to print counterfeit bank notes simply by using a computer and a laser printer at the home. Therefore the issue of efficiently verifying counterfeit banknotes from real ones via automatic machines has become more important. Counterfeit notes are the problem of almost every country but India has been hit really hard and has become a very acute problem. There is a need to design the system that will helpful for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3578 the recognition of paper currency notes with fast speed and in less time. The Indian government announced the new rules to eliminate the bogus currency. The Reserve Bank of India is the only one that has the full authority to issue banknotes. There is no proper way to deal with them for a common person; the common person is also prey to this currency. Some of the eļ¬€ects that the bogus money has on society include a reduction in the value of substantial money and inļ¬‚ation due to more artiļ¬cial money getting circulated in the society or the economy, and which in turn dampen our economy and growth. Then the decrease in the acceptability of paper money occurs. These are several techniques used by Reserve Bank of India to identify artiļ¬cial currency. In every year, Reserve Bank of India faces the counterfeit currency notes or destroyed notes. Handling of the large volume of counterfeit notes imposes additional problems. Therefore, involving machines with the assistance to the human experts makes notes identiļ¬cation process simpler and eļ¬ƒcient. For the detection of forged notes, it needs to identify the denomination every time they use the device which consists of ultraviolet light. The bank employees keep the fake paper currency note on the device and try to ļ¬nd whether the watermark identiļ¬cation, serial number and other characteristics of the notes are proper to check its authentication. 2. RELATED WORKS B.Sai Prasanthi, D. Rajesh Setty ā€Indian Paper Currency Authentication System using Image processingā€[1].In this article, the authentication of Indian paper currency is described by applying image processing techniques. Generally, six features are extracted including identiļ¬cation mark, security thread, watermark, numeral, ļ¬‚oral design, micro lettering from the image of the currency. The process begins with image acquisition and ends at a comparison of features. The system designed is a low-cost system. The system extracts the features even the note has scribblings on it. Also, the system will extracts features even the test image sizes are diļ¬€erent when compared to the reference image. Rubeena Mirza, Vinti Nandaā€Design and Implementation of Indian Paper Currency Authentication System Based on Feature Extraction by Edge Based Segmentation Using Sobel Operatorā€[2].In this paper, the authentication of Indian paper currency is described by applying various image processing techniques. Generally, three features are extracted including identiļ¬cation mark, security thread, and watermark from the image of the currency. The process begins with image acquisition and ends at a comparison of features. The features are extracted using edge-based segmentation by Sobel operator and work well in the whole process with less computation time. The complete methodology works for the Indian denomination 100, 500 and 1000. The method is very simple and easy to implement. If the hardware part of image acquisition is designed then it surely helps us to minimize the problem of counterfeiting currency. Sandeep Kaur, Seema Baghla, Sunil Kumarā€Enhancement of Sift algorithm to check the authenticity of Indian Currencyā€[3]. SIFT algorithm has been used to analyze the external features of an image by various researchers in the past. The currency detection is the application of image analysis, in which the SIFT algorithm along with the nearest neighbor classiļ¬er has been applied to analyze external features of the checking the originality of currency notes. In the present work, a method using the SIFT algorithm with Bayesian classiļ¬er and DWT has been proposed for checking the originality of currency notes. The value of Peak signal to noise ratio (PSNR), root mean square error (RMSE), fault detection rate (FDR) and accuracy values of the proposed and existing algorithm (SIFT algorithm with nearest neighbor classiļ¬er) are compared to validate the proposed system. The results conļ¬rmed that the proposed technique is better as compared to the existing technique for checking the originality of the currency notes. Deepak M. P, Prajwala N. B ā€Identiļ¬cation of Fake Notes and Denomination Recognitionā€[4]. The Indian currency system has diļ¬€erent denominations that are unique in one feature or the other. These features are color, size or some identiļ¬cation marks, etc. This system recognizes and transforms the framework in order to diminish human energy, and to consequently perceive the measure of the money esteem and to change over it to diļ¬€erent monetary forms without human supervision. Our proposed work diļ¬€erentiates white paper and the currency, by detecting colors of diļ¬€erent currencies. We have used a feature extraction mechanism to identify various identiļ¬cation patterns and also the denominations in the currency. As our intention to achieve a simple however productive calculation that would be helpful for the most extreme number of monetary standards, using MatLab, we have developed an eļ¬ƒcient system for the monetary standards 10,20,50,100,500 and 2000 which produces 98.8 accuracies. Prashant Dhar, Md. Burhan Uddin Chowdhury, Tonoy Biswas ā€Paper Currency Detection System Based on Combined SURF and LBP Featuresā€[5].Proposed a new paper currency detection system for Bangladeshi paper currency using combined SURF and LBP features. The prediction is made by SVM classiļ¬er. SVM performs very well in this case. Paper currency detection is a vital application for surveillance systems. Very few works have been done on this application. Here we proposed a new method to detect paper currency. We considered only paper currencies of Bangladesh. It is quite a challenging task to detect currency in diļ¬€erent positions from
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3579 diļ¬€erent environments. This proposed system can detect currency in rotated positions also. This proposed system can also calculate the total amount of currency that exists in an image. We achieved an overall accuracy of 92.6we will try to improve the performance for the rotated position of currency. We will focus on folding notes and overlapped notes. We will try to consider all possible sorts of notes. Moreover, we should investigate with other local or global features so as to improve performance better. Navya Krishna G, Sai Pooja G, Naga Sri Ram B, Yamini Radha V, Rajarajeswari P ā€Recognition of Fake Currency Note using Convolutional Neural Networksā€[6].In this paper, proposed a model which demonstrates the feasibility of using CNN with the VGG 16 architecture. Although the generated data set was small and did not represent the real-world scenario of counterfeit currency data-set, it was very helpful throughout the experiment. The process of detection of fake notes is quick and easy under the trained model. By this, we can also assure that under real and large data set, the model AFCRS can be well-trained and also provides accurate results, which can help the people in recognizing the currency note whether it is counterfeit or original. Future research may include the deployment of the model in smartphones as an application and make society and people more comfortable in recognizing counterfeit currency. This model can also be compared with various architectures of CNN which may have a low error rate than the present model and can be combined by applying image pre- processing techniques like and edge-detection to crop the currency note out of an image which will present better results. Fumiaki Takeda and Sigeru Omatuā€ High Speed Paper Currency Recognition by Neural Networksā€[7]. In this paper, we have applied NN to paper currency recognition and showed the eļ¬€ectiveness compared with a conventional manual method. Furthermore, we have proposed a structure reduction method of the NN using random masks and showed its eļ¬€ectiveness for time series data and its Fourier power spectra. Finally, we also introduced a new evaluation method for reliability and showed its eļ¬€ectiveness using real data. We expect that the present method will promote compactness, high-speed transaction, and low cost of paper currency recognition machines. Gouri Sanjay Tele, Akshay Prakash Kathalkar, Sneha Mahakalkar, Bharat Sahoo, Vaishnavi Dhamane ā€Detection of Fake Indian Currencyā€[8].In this paper, a technique for verifying Indian paper currency. The approach gives an eļ¬ƒcient method for fake currency detection based on physical appearance. The work will surely be very useful for minimizing the counterfeit currency. Through this application, we are able to see the missing parameters which the fake note doesnā€™t have as compared to the original notes. Original Currency is being detected using the Image Processing Technique. 3. COUNTERFEIT BANKNOTE DETECTION 3.1 Counterfeit Banknote Detection Methods: Figure 2: Counterfeit banknote detection methods A. Commonly Used Method for Detecting Fake Currency 1. See-through Register The small floral design printed on both front (hollow) and back (filled up) of the note in the middle of the vertical band next to the Watermark has an accurate back to back registration. The design will appear as the floral design when seen against the light. 2. Watermarking The Mahatma Gandhi Series of the banknotes include the Mahatma Gandhi watermark with a light and shade effect and multi-directional lines in the watermark window. 3. Fluorescence Number panels of the notes are printed in the fluorescent ink. The notes also have optical fibers. Both can be seen when the notes are exposed to the ultra-violet lamp. 4. Security Thread The Rs.500 and Rs.100 notes have a security thread with the similar visible features and inscription ā€œBharatā€ (in Hindi), and ā€œRBIā€. When held against the light, the security thread on Rs.2000, Rs.500 and Rs.100 can be seen as one continuous line. The Rs.5, Rs.10, Rs.20, and Rs.50 notes contain a readable, fully embedded windowed security thread with inscription ā€œBharatā€ (in Hindi), and ā€œRBIā€. The security thread appears on the left of the Mahatma's portrait.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3580 5. Intaglio Printing The portrait of Mahatma Gandhi, the Reserve Bank seal, guarantee and promise clause, Ashoka Pillar Emblem on the left, RBI Governor's signature is printed on intaglio i.e. in raised prints, which can feel by touch, in Rs. 20, Rs. 50, Rs. 100, Rs.500 and Rs.2000 notes. 6. Latent image On the opposite side of Rs.2000, Rs.500, Rs.100, Rs.50 and Rs.20 notes, a vertical band on the right side of the Mahatma Gandhiā€™s portrait contains a latent image showing the respective denominational value in the numeral. The latent image is apparent only when the note is held horizontally at eye level. 7. Micro lettering This feature sees between the vertical band and Mahatma Gandhi portrait. It always contains the word "RBIā€Ÿ in Rs.5 and Rs.10. The notes of Rs.20 and above also hold the denominational value of the notes in micro letters. This feature can see well under a magnifying glass. 8. Identification Mark Each note has a unique mark. A special feature in intaglio has been presented on the left of the watermark window on all notes except Rs.10/- note. This feature is in different shapes for different denominations (Rs.20-Vertical Rectangle, Rs.50- Square, Rs.100-Triangle, Rs.500-Circle, and Rs.1000- Diamond) and helps the visually impaired to identify the denomination. 9. Optically Variable Ink This is a new feature included in the Rs.2000 and Rs.500 notes with revised color scheme. The numeral 2000 and 500 on the opposite of Rs.2000 and Rs.500 notes respectively are printed in optically variable ink viz., a color-shifting ink. The color of the numeral 2000/500 appears green when the note is held flat but would change to blue when the note is held at an angle. B. Digital Image Processing Method for Detecting counterfeit Currency. Design flow of the counterfeit currency detection system includes eight stages: Image acquisition, pre-processing, gray scale conversion, edge detection, image segmentation, feature extraction, comparison and output [9]. This system works on two images, one is testing currency image on which authentication is to performed and the other is the original currency image. 1. Image Acquisition There are various ways to acquire images such as with the help of a camera or scanner. The acquired image should retain all the features [9]. 2. Pre-Processing Pre-processing of the image is those operations that are normally required prior to the main data analysis and extraction of information. The aim of image pre- processing is to suppress undesired distortions or to enhance some image features that are important for further processing or to analysis. It includes: 2.1 Image Adjusting When we get the image from a scanner, the size of the image is too big. In order to reduce the calculation, we decrease the size of the image. Image Adjusting is done by using image interpolation. Interpolation is the technique mostly used for tasks such as zooming, rotating, shrinking, and geometric corrections. 2.2 Image smoothening While using a camera or a scanner and perform image transfers, some noise will appear on the image. Image noise is the random variation of the brightness in images. Removing the noise is a major step when image processing is being performed. Although, noise may affect segmentation and pattern matching. When performing the smoothing process on a pixel, the neighbor of the pixel is used to do some transforming. After that, the new value of the pixel is created. The neighbor of the pixel is consisting of some other pixels and they build up a matrix, the size of the matrix is an odd number, the target pixel is located on the middle of the matrix. Convolution is used to perform image smoothing. Image smoothening can also be done with the help of a median filter which gives more effective than convolution when the goal is to simultaneously reduce the noise preserving edges. The median filter replaces a pixel via the median pixel of all the neighborhoods [9]. 3. Gray-scale conversion The image acquired is in RGB color. It is converted into gray scale because it carries only the intensity information which is easy to process instead of processing three components R (Red), G(Green), B(Blue) [1]. 4. Edge detection Edge detection is an essential technique in image processing and computer vision, particularly in the areas of feature detection and feature extraction, which aims at identifying points in a digital image at which the image brightness alters sharply or, more formally, has
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3581 discontinuities. Edge detection is one of the major steps in image processing, image analysis, image pattern recognition, and computer vision techniques [8]. 5. Image segmentation Image segmentation sub divides the image into its component regions or objects. A level to which sub division is carried depends on problem being solved. Segmentation algorithm for monochrome images generally based on one of the two basic properties of image intensity values: ā€¢ Discontinuity ā€¢ Similarity. The approach in the first category is to partition an image based on abrupt changes in intensity such as edges in an image. The approach in the second category is based on partitioning an image into regions that are similar according to a set of predefined criteria [8]. 6. Feature Extraction In pattern recognition and in image processing, feature extraction is the special form of dimensionality reduction method. This method captures the visual content of images for indexing and retrieval. If input data to an algorithm is too large to be processed and it is assumed to be notoriously redundant (much data but not much information) then the input data will be converted into a reduced representation set of features (also named feature vector). If attributes are extracted are chosen carefully, it is expected that the attributes set will extract the relevant information from the input data in order to perform the desired task using this reduced representation instead of using the full-size input. Feature extraction involves simplifying the number of resources required to describe the large set of data. Visual attributes of images are of two types: ļ‚· Domain-specific attributes include fingerprints, human faces. ļ‚· General attributes include color, texture, and shape. Figure 2: Flow Chart of Digital Image Processing Method to Detect Fake Notes. There are two types of attributes distinguish under the shape attribute extraction: ā€¢ Global attributes include moment invariant, aspect ratio and circularity. ā€¢ Local attributes include boundary segments [1].
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3582 Figure 3: Feature Extraction Approach 7. Comparison Finally, the extracted features of test currency image are compared with the extracted features of the original currency image, if it matches then the currency is original otherwise fake [1]. C. MATLAB technique: In this technique, one can split red, blue, green components of a picture and name them as r1, g1, b1 which correspond to image i.e. original currency note. Consider the second image that is noted to be tested. Split this image to components r2, b2, g2. Construct a new image with components as r1, g2, b1 or r2, g1, b1 or b2, g1, b1. But r1,g2,b1 combination is most preferred because the human eye is sensitive to green component and most of our images contain maximum green component so that our output image will be much easier to identify counterfeit note more effectively. After that compare newly constructed images with image1. Calculate the threshold value of equivalence by calculating the standard deviation. If equivalence is above 40% then one can consider it as an original note. Here consider 40% of the value because note may be damaged. Parameters for a measure of comparing images are Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR in dB), and structural Content (SC). When combining two various components of two images then if a note to be tested is original then only at the place of a number we get variation. But in case of fake note after applying the same code, one can observe that the image overlapping is not done correctly. One can also see that the resultant image is blurred indicating fake note. So one can confirm that it is a fake note [12]. D. Counterfeit Detection Pen: A counterfeit pen is simply an inexpensive device that is designed to determine if a currency note is original or fake. The pen includes a tincture of iodine as ink which, when drawn over a note, will remain amber or brown. According to the manufacturer, the ink will turn black if the note is fake. 1. Working of counterfeit pen: The iodine in the pen respond with starch, which is the primary component that makes a white paper look brighter. Most corporate paper, made from wood pulp, is brown unless bleached and starched. If there is no presence of starch in the paper then the pen will indicate - by remaining amber- that the note is original. 2. How counterfeiters defeat this pen: The iodine in the pen respond with starch that makes white paper look brighter. Most unless bleached and starched. If there is no starch present in the paper then the pen will indicate ā€“ by remaining amber - that the note is original [12]. E. Other techniques: Another anti-counterfeit device for the money is an Ultraviolet counterfeit detection scanner. Best used in the highly lit point of sale locations, the UV detector identifies ultraviolet security features present in most currencies. By simply placing the note in the detector, counterfeit currency is immediately identified, without the need for an employee to closely examine the note [12]. These are the different techniques for counterfeit banknote detection. The most efficient technique is digital image processing method. 4. PROPOSED SYSTEM The steps involved in Image Enhancement for Fake Indian Currency Notes Detection are shown in figure 4. Figure 4: Block diagram for proposed system.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3583 4.1 Input Image: In this ļ¬rst stage of any vision system is the input image stage. After the image has been obtained, the various methods of processing can be applied to the image to perform many diļ¬€erent tasks. Performing input images in image processing is always the ļ¬rst step in the workļ¬‚ow sequence because, without an image, no processing is possible. There are various techniques to acquire images such as with the help of a camera or scanner. The input image should retain all the features. Here input image is the RGB image of currency taken under the UV light. 4.2 Image Adjustment: Image Adjusting is one of the most pre-processing techniques, which is done with the help of image interpolation. Interpolation is the technique widely used for tasks such as zooming, rotating, shrinking, and geometric corrections. Removing the noise is a major step when image processing is being performed. However, the noise may affect segmentation and pattern matching. When performing the smoothing process on a pixel, the neighbor of the pixel is used to do some transforming. After that, a new value of the pixel is created [13]. 4.3 Image Filtering: In this system, filtering is done for removing noise. Here the bilateral filter is used for noise removal. It is a non- linear, edge-preserving and noise-reducing smoothing filter for images. It substitutes the intensity of each pixel with the weighted average of intensity values from the nearby pixels. This weight can be based on Gaussian distribution. Crucially, the weights depend not only on Euclidean distance of the pixels but also on the radiometric differences (e.g., range differences, such as color intensity, depth distance, etc.). This preserves the sharp edges. 4.4 Image Smoothening: Smoothening is done using Brightness Preserving Bi- Histogram Equalization (BBHE). BBHE firstly decomposes an image into two sub-images based on the mean of the input images. One of the sub-images is the set of samples less than or equal to the mean whereas the other one is the set of samples greater than the mean. Then the BBHE equalizes the sub-images independently based on their respective histograms with the constraint that the samples in the formal set are mapped into the ranges from the minimum gray level to the input mean and the samples in the latter set are mapped into the ranges from the mean to the maximum gray level. In other words, one of the sub- images is equalized over the range up to the mean, based on the respective histogram. Thus, resulting equalized sub-images are bounded by each other around the input mean, which has an effect of preserving mean brightness. Figure 5: BBHE algorithm 4.5 RGB to LAB Color Space Conversion: The next implementation in the proposed method is to convert the RGB color space to L*a*b* color space. For this proposed work L*a*b* color space is selected which is a homogeneous space for visual perception. The difference between the two points in the L*a*b* color space is the same as the human visual system. Since the L*a*b* model is a three-dimensional model, it can only be represented properly in three-dimensional space [14] - [2]. The solution to convert digital images from the RGB space to the L*a*b* color space is given by the following formula [14]. L* = 116 f(Y/Yn) ā€“ 16 a* = 500[f(X/Xn)-f(Y/Yn)] b* = 200[f(Y/Yn)-f(Z/Zn)] X, Y, Z, Xn, Yn, and Zn are coordinates of CIEXYZ Color space. The solution to convert the digital images from the RGB space to the CIEXYZ color space is the following formula.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3584 X 0.608 0.174 0.201 R Y = 0.299 0.587 0.114 G Z 0.000 0.066 1.117 B Xn, Yn, and Zn respectively correspond to the white value of the parameter. F(x) = X^1/3 x>0.008856 7.787x+16/116 x<= 0.008856 Color space conversion is translation of the representation of a color from one basis to another. This typically occurs in context of converting an image that is represented in one color space to another color space. 5. EXPERIMENTAL RESULTS In this project, the RGB image of currency note is given as input image and various preprocessing methods has been applied such as Bilateral filtering , Brightness Preserving Bi-Histogram Equalization (BBHE) and then converted equalized image to LAB color space. Figure 6: Noise removal using bilateral filtering Figure 7: Histogram Equalization. Figure 8: Brightness Preserving Bi-Histogram Equalization Figure 9: Converting equalized RGB image to LAB color space. 6. CONCLUSION Pre-processing is a necessary step in any computer vision system, which includes extraction of information from the RGB image taken under UV light. According to the requirement, various different pre-processing techniques are used and developed. In this proposed work, we use different pre-processing methods such as image adjustment, image filtering using the bilateral filter, image smoothening using Brightness Preserving Bi-Histogram Equalization (BBHE) and converting RGB image to LAB color space image. This system provides better performance for processing than the existing method. REFERENCES [1] Rubeena Mirza, Vinti Nanda ā€Design and Implementation of Indian Paper Currency Authentication System Based on Feature Extraction by Edge Based Segmentation Using Sobel Operatorā€ International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 41-46. [2] Sandeep Kaur,Seema Baghla, Sunil Kumar ā€Enhancement of Sift algorithm to check authenticity of Indian Currencyā€ International Journal of
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 Ā© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3585 Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 945-953 c Research India Publications http://www.ripublication.com [3] Prashengit Dhar, Md. Burhan Uddin Chowdhury, Tonoy Biswas ā€Paper Currency Detection System Based on Combined SURF and LBP Featuresā€ 2018 2nd Int. Conf. on Innovations in Science, Engineering and Technology (ICISET) 27-28 October 2018, Chittagong, Bangladesh. [4] Navya Krishna G, Sai Pooja G, Naga Sri Ram B, Yamini Radha V, Rajarajeswari P ā€Recognition of Fake Currency Note using Convolutional Neural Networksā€ International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-5 March, 2019 [5] G Chinmay Bhurke, Meghana Sirdeshmukh, Prof. Mrs. M.S.Kanitkar ,ā€œCurrency Recognition Using Image Processing s,ā€ International Journal of Innovative Research in Computer and Communication Engineering,, vol.III, May 2015 . [6] https://www.overleaf.com/project/5dc917fb52bc02 0001f5387d K. Kang ;C. Lee], Fake banknote detection using multispectral images,ā€™ International Conference on Information, Intelligence, Systems Applications (IISA), 19 December 2016. [7] Binod Prasad Yadav, C. S. Patil, R. R. Karhe, P.H Patil, An automatic recognition of fake Indian paper currency note using MATLAB,ā€ International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014 [8] D.Alekhya ,G.DeviSuryaPrabha , G.VenkataDurgaRao, Fake Currency Detection Using Image Processing and Other Standard Methodsā€, International Journal of Research in Computer and Communication Technology, may 2015. [9] Amol A. Shirsath and S. D. Bharkad, Survey Of Currency Recognition System Using Image Processing, International Journal of Computational Engineering Research, Vol, 03, Issue 7M. Young, The Technical Writerā€™s Handbook. Mill Valley, CA: University Science, 1989. [10] Rubeena Mirza and Vinti Nanda, Paper Currency Verification System Based on Characteristic Extraction Using Image Processing, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 ā€“ 8958, Volume-1, Issue-3, February 2012. [11] PM.Deborah., PC.Soniya Prathap, ā€œDetection of Fake currency using Image processing,ā€ IJISET - International Journal of Innovative Science, Engineering Technology, vol I, 10 December 2014. [12] Chun Chen;ā€œComputer image processing technology and algorithmsā€., Beijing: Tsinghua University Press, 2003. [13] R. Fisher, K Dawson-Howe, A. Fitzgibbon, C. Robertson, E. Trucco (2005). Dictionary of Computer Vision and Image Processing. John Wiley. ISBN 0-470- 01526-8. [14] G Chinmay Bhurke, Meghana Sirdeshmukh, Prof. Mrs. M.S.Kanitkar ,ā€œCurrency Recognition Using Image Processing s,ā€ International Journal of Innovative Research in Computer and Communication Engineering,, vol.III, May 2015 . [15] Sagar S. Lawade, Gayatri S. Hedau, Apurva C. Ramgirwar, Fake Currency detection using image processing,ā€ International Journal of Research in Computer and Communication Technology, vol III, may 2014