SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1354
Fake Currency Detection App
Ravindra R. Ghugare 1, Prathmesh Shendge2, Dinesh Takale3,Rohit J. Yadav4
1Asst. Professor, Dept. of Computer Engineering Bharati Vidyapeeth College of Engineering, Navi Mumbai,
Maharashtra, India.
2,3,4Student, Dept. of Computer Engineering Bharati Vidyapeeth College of Engineering, Navi Mumbai,
Maharashtra, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - The main purpose of this project is to obtain a
false-positive income using Machine Learning. This process
can be automated on mobile using the application software.
Basic logic is developed using image acquisition, image
segmentation, feature extraction and comparison. Enlarged
images of the real currency are transferred to the Machine
learning dataset. The features of the note to be tested are
compared to a dataset made from an actual enlarged image
and determine whether it is real money or fake. The most
important challenge is to repeatthesystematicandsystematic
review process to reduce error and time.
In recent years, a large number of counterfeit coins have been
printed & at the same time other illegal rings are producing
and selling counterfeit coins, resulting in massive loss and
damage to society. So, it is a color to be able to get fake money.
We propose a new proposal for obtaining fake Indian notes
using their images. A coin image is represented in a space of
differences, which is a vector space created by comparing an
image with a set of real money proteins. Each scale measures
the differences between the image presented and the model
presented. In order to find the differences between the two
images, the key points of the location of each image are
identified and explained. Based on the characteristics of the
currency, the corresponding key points between the two
images can be clearly identified. The posting process is also
proposed to remove key points. Due to the limited number of
non-real-world funds, SVM is designed to detect fake cash, so
only real money is needed to train a classifier.
1. INTRODUCTION
Currency duplication (counterfeit currency) is a vulnerable
threat on economy. It is now a common phenomenon due to
advanced technology of printing and scanning. Country has
been facing serious problem by the increasing rate of fake
notes in the market. The Reserve bank of India estimates
that there is at least Rs.2 trillion of fake rupees note in
circulation throughout India. To get rid of this problem
various fake note detection methods are available around
the world and most of these are hardware based and costly.
This machine is mostly available only in banks which is not
reachable every time by average citizen. the problem is in
acute situation and people want easier way to deal with it.
Fake Currency Detection App is developed for recognizing
fake currency from the App. As, there are number ofandroid
mobile phone users in the country and increases per day; to
provide an android application regarding fake currency
detection is a good idea. The App designed to check the
Indian currency note & coins. The system will display
currency is genuine or fake.
1.1 Commonly Used Methods to Detect Fake Notes
i. Check by Registration: A small floral design is printed in
the center of a vertical band near the watermark. The
flowers on the front are empty and the back is full. The floral
design is now back in print. The design will see it as a single
floral design when viewed against light.
ii. Water marking: The mahatma Gandhi watermark is
present in bank notes. The mahatma Gandhi watermark has
shadow effect and multidirectional lines in the watermark.
iii. Flexible Ink: It is a flexible ink that can be used for a
safety feature; this type of feature is at Rs.200, 500, and Rs.
2000 bank note. Variable ink as a security feature of a bank
note was introduced in Nov.2000. The value of the program
is printed with the help of optical conversion ink. The color
of 2000 or 500 numbers seems green, when the note is
bright but changes color to blue when held at an angle.
iv. Fluorescence: Fluorescent ink is used to printnumerical
panels of notes. The note also contains fiber optical. A
number panel on fluorescent ink and fiber optical ink can be
seen when exposed to UV light.
v. Security anointing: The security cord is in2000with500
notes, shown on the left of Mahatma Gandhi's photo. In the
security fence the visual aspect of RBI and BHARAT. When
the note is held to light, the safety line can be seen as a single
continuous line.
vi. Latent Image: The last image shows the correctprogram
number by number. On the left side of the notes, the front
image is to the right of the Mahatma Gandhi statue in a
vertical pattern. When the note is held horizontally at eye
level then the resulting image is displayed.
vii. Micro Letters: A small letter appears between the
Mahatma Gandhi image and the vertical band. A small letter
contains the amount of an index of a bank note in lowercase.
The value of the program can be clearly seen under the
magnifying glass.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1355
viii. Identity Document: Each note has its own unique
identifier. There are various instances of different branding
tags (Rs.200-H, Rs.500-square and Rs.2000- Square). A type
of identification is located to the left of the water sign.
Figure.1. Security Features of Indian Currency
2. LITERATURE REVIEW
Previous notable work in the Fake Currency Detection App
involved the use of a different method of obtaining false
money. Some of these functions are discussed below.
2.1 Functional Call for obtaining fake notes by Neha N.
21-year-old Mysore engineering student Neha N. has
launched a mobile app that can tell real-time notes without
their partners. According to Neha's research, a cache notes
when caught in the light, shows you a picture of Mahatma
Gandhi and that appears in faxes but not as bright as the
original text. In addition, all real notes with magnetic
marking markers and will be ultraviolet light, Neha
developed an app to get such a look.
2.2 Working Call for obtaining false notes by SJEC
students
Students of the Ministry of Technology and Communication
from St Joseph Engineering College (SJEC) have designed a
fake note detector that can check the authenticity of Indian
currency notes. The device can check notes with the help of
security features found in the note. It is able to find out the
true currency and track the serial number.
2.3 A Functional Call for obtaining fake notes by Ninaad
Pai
As a Project Manager, he worked on the strategies for the
recognition of pre-existing characters. Design and
development of image recognition function to text
conversion of serial numbers to Indian federal agencies for
fraud detection
3. Work Flow
4. CONCLUSION
The main motive behind the development of thisapplication
is to provide a better way for people to find outaboutmoney
using an easily accessible device.
5. REFERENCES
[1] International Journal on Future Revolution in Computer
Science & Communication ISSN: 2454-4248865– 868.
[2] Sun. Ke, -Detection of Counterfeit Coins and Assessment
of Coin Qualities‖ IEEE Conference 2015.
[3] Megha Thakur, Amrit Kaur, “Various Fake Currency
Detection Techniques”, International Journal For
Technological Research In Engineering Volume 1, Issue 11,
July-2014.
[4] K. Satish1 , Y.K.Viswanadham2, I LeelaPriya, ”Money to
ATM Fake Currency Detection",K. Sathish et al, / (IJCSIT)
International Journal of Computer Science and Information
Technologies, Vol. 3 (5) , 2012,5046-5050.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1356
[5]. www.wikipedia.com.
[6]. www.engineergarage.com.
[7]. www.8051project.info.
[8]. www.fadooengineers.com.
[9]. www.nevonprojects.com.

More Related Content

What's hot

Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identifer
RutwikShitole1
 

What's hot (14)

IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Published pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajalPublished pdf-2072-6-2072 kajal
Published pdf-2072-6-2072 kajal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
IRJET-Survey on Note to Coin Converter
IRJET-Survey on Note to Coin ConverterIRJET-Survey on Note to Coin Converter
IRJET-Survey on Note to Coin Converter
 
Atm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identiferAtm security using_fingerprint_biometric_identifer
Atm security using_fingerprint_biometric_identifer
 
Review: Biometric and GSM Security for Lockers
Review: Biometric and GSM Security for LockersReview: Biometric and GSM Security for Lockers
Review: Biometric and GSM Security for Lockers
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
 
IRJET- Fingerprient based Vehicle Starter
IRJET-  	  Fingerprient based Vehicle StarterIRJET-  	  Fingerprient based Vehicle Starter
IRJET- Fingerprient based Vehicle Starter
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 

Similar to IRJET - Fake Currency Detection App

Similar to IRJET - Fake Currency Detection App (20)

automatic3.pdf.pdf
automatic3.pdf.pdfautomatic3.pdf.pdf
automatic3.pdf.pdf
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 
IRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image Processing
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using Python
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
 
IRJET- Digitization not a Choice but a Necessity for the Indian Banking Industry
IRJET- Digitization not a Choice but a Necessity for the Indian Banking IndustryIRJET- Digitization not a Choice but a Necessity for the Indian Banking Industry
IRJET- Digitization not a Choice but a Necessity for the Indian Banking Industry
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
Forey: An Android Application for the Visually Impaired
Forey: An Android Application for the Visually ImpairedForey: An Android Application for the Visually Impaired
Forey: An Android Application for the Visually Impaired
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
IRJET- My Expenses
IRJET- My ExpensesIRJET- My Expenses
IRJET- My Expenses
 
IRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall AssistantIRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall Assistant
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud Connection
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET - E-Wallet
IRJET - E-WalletIRJET - E-Wallet
IRJET - E-Wallet
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 

IRJET - Fake Currency Detection App

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1354 Fake Currency Detection App Ravindra R. Ghugare 1, Prathmesh Shendge2, Dinesh Takale3,Rohit J. Yadav4 1Asst. Professor, Dept. of Computer Engineering Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India. 2,3,4Student, Dept. of Computer Engineering Bharati Vidyapeeth College of Engineering, Navi Mumbai, Maharashtra, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The main purpose of this project is to obtain a false-positive income using Machine Learning. This process can be automated on mobile using the application software. Basic logic is developed using image acquisition, image segmentation, feature extraction and comparison. Enlarged images of the real currency are transferred to the Machine learning dataset. The features of the note to be tested are compared to a dataset made from an actual enlarged image and determine whether it is real money or fake. The most important challenge is to repeatthesystematicandsystematic review process to reduce error and time. In recent years, a large number of counterfeit coins have been printed & at the same time other illegal rings are producing and selling counterfeit coins, resulting in massive loss and damage to society. So, it is a color to be able to get fake money. We propose a new proposal for obtaining fake Indian notes using their images. A coin image is represented in a space of differences, which is a vector space created by comparing an image with a set of real money proteins. Each scale measures the differences between the image presented and the model presented. In order to find the differences between the two images, the key points of the location of each image are identified and explained. Based on the characteristics of the currency, the corresponding key points between the two images can be clearly identified. The posting process is also proposed to remove key points. Due to the limited number of non-real-world funds, SVM is designed to detect fake cash, so only real money is needed to train a classifier. 1. INTRODUCTION Currency duplication (counterfeit currency) is a vulnerable threat on economy. It is now a common phenomenon due to advanced technology of printing and scanning. Country has been facing serious problem by the increasing rate of fake notes in the market. The Reserve bank of India estimates that there is at least Rs.2 trillion of fake rupees note in circulation throughout India. To get rid of this problem various fake note detection methods are available around the world and most of these are hardware based and costly. This machine is mostly available only in banks which is not reachable every time by average citizen. the problem is in acute situation and people want easier way to deal with it. Fake Currency Detection App is developed for recognizing fake currency from the App. As, there are number ofandroid mobile phone users in the country and increases per day; to provide an android application regarding fake currency detection is a good idea. The App designed to check the Indian currency note & coins. The system will display currency is genuine or fake. 1.1 Commonly Used Methods to Detect Fake Notes i. Check by Registration: A small floral design is printed in the center of a vertical band near the watermark. The flowers on the front are empty and the back is full. The floral design is now back in print. The design will see it as a single floral design when viewed against light. ii. Water marking: The mahatma Gandhi watermark is present in bank notes. The mahatma Gandhi watermark has shadow effect and multidirectional lines in the watermark. iii. Flexible Ink: It is a flexible ink that can be used for a safety feature; this type of feature is at Rs.200, 500, and Rs. 2000 bank note. Variable ink as a security feature of a bank note was introduced in Nov.2000. The value of the program is printed with the help of optical conversion ink. The color of 2000 or 500 numbers seems green, when the note is bright but changes color to blue when held at an angle. iv. Fluorescence: Fluorescent ink is used to printnumerical panels of notes. The note also contains fiber optical. A number panel on fluorescent ink and fiber optical ink can be seen when exposed to UV light. v. Security anointing: The security cord is in2000with500 notes, shown on the left of Mahatma Gandhi's photo. In the security fence the visual aspect of RBI and BHARAT. When the note is held to light, the safety line can be seen as a single continuous line. vi. Latent Image: The last image shows the correctprogram number by number. On the left side of the notes, the front image is to the right of the Mahatma Gandhi statue in a vertical pattern. When the note is held horizontally at eye level then the resulting image is displayed. vii. Micro Letters: A small letter appears between the Mahatma Gandhi image and the vertical band. A small letter contains the amount of an index of a bank note in lowercase. The value of the program can be clearly seen under the magnifying glass.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1355 viii. Identity Document: Each note has its own unique identifier. There are various instances of different branding tags (Rs.200-H, Rs.500-square and Rs.2000- Square). A type of identification is located to the left of the water sign. Figure.1. Security Features of Indian Currency 2. LITERATURE REVIEW Previous notable work in the Fake Currency Detection App involved the use of a different method of obtaining false money. Some of these functions are discussed below. 2.1 Functional Call for obtaining fake notes by Neha N. 21-year-old Mysore engineering student Neha N. has launched a mobile app that can tell real-time notes without their partners. According to Neha's research, a cache notes when caught in the light, shows you a picture of Mahatma Gandhi and that appears in faxes but not as bright as the original text. In addition, all real notes with magnetic marking markers and will be ultraviolet light, Neha developed an app to get such a look. 2.2 Working Call for obtaining false notes by SJEC students Students of the Ministry of Technology and Communication from St Joseph Engineering College (SJEC) have designed a fake note detector that can check the authenticity of Indian currency notes. The device can check notes with the help of security features found in the note. It is able to find out the true currency and track the serial number. 2.3 A Functional Call for obtaining fake notes by Ninaad Pai As a Project Manager, he worked on the strategies for the recognition of pre-existing characters. Design and development of image recognition function to text conversion of serial numbers to Indian federal agencies for fraud detection 3. Work Flow 4. CONCLUSION The main motive behind the development of thisapplication is to provide a better way for people to find outaboutmoney using an easily accessible device. 5. REFERENCES [1] International Journal on Future Revolution in Computer Science & Communication ISSN: 2454-4248865– 868. [2] Sun. Ke, -Detection of Counterfeit Coins and Assessment of Coin Qualities‖ IEEE Conference 2015. [3] Megha Thakur, Amrit Kaur, “Various Fake Currency Detection Techniques”, International Journal For Technological Research In Engineering Volume 1, Issue 11, July-2014. [4] K. Satish1 , Y.K.Viswanadham2, I LeelaPriya, ”Money to ATM Fake Currency Detection",K. Sathish et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (5) , 2012,5046-5050.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1356 [5]. www.wikipedia.com. [6]. www.engineergarage.com. [7]. www.8051project.info. [8]. www.fadooengineers.com. [9]. www.nevonprojects.com.