SlideShare a Scribd company logo
1 of 10
Download to read offline
Application of pattern recognition techniques
in banknote classification
Nikolaos Mouzakitis
February 27, 2019
Abstract
In this paper a pattern recognition application used for banknotes
classification is described, based on a bank-notes dataset available in
UCI Machine Learning repository. Description of the proposed classi-
fiers in this particular separation problem are compared and analyzed
before conducting the conclusion about the efficiency of the particu-
lar solution. Supervised classifiers such as linear and quadratic are
implemented, while k-means and single linkage algorith are used for
unsupervised classification. For the supervised section there have been
created three different splits for training and validation sets those of
70%/30%,80%/20% and 90%/10%.
1 Introduction
Even if in the last decade the use of electronic money and digital currency
increased rapidly, in the recent years with the high technological advances
and steps forward in color printing, counterfeiting problems are becoming
more and more serious. In a perfect scenario only authorities would have
the ability to print banknotes but forged currency is appearing more often
with the aid of technology. The detection of such counterfeits is a required
important task where money exchange is taking place. As for the size of the
problem Grace and Sheema[3] describe how the counterfeit problem in India
became big hurdle,as well as how managing a large amount of counterfeits
imposes additional problems to banks or other organizations.
A general conclusion is that anybody with a computer or laser printer is
1
capable of generating forged banknotes and this fact is adding value in ap-
plications that solve succesfully this particular problem.
Several solutions have been proposed in this context, such as classification by
convolutional neural network(CNN)[5], detection based on Edge Detection
[7] while Feng,Ren,Zhang and Suen proposed recognition of serial numbers
of the banknotes [8]. Also, Raho,Khiat and Al-Hamami [9] research the so-
lution of using k-Nearest Neighbor algorithm to determine the category of
the currency and its reality.
2 Proposed Application
In order to provide a solution for the problem and avoid manual testing
of each banknote which is a time consuming task, there is a need for an
automated application to solve the problem with efficiency. The proposed
application is based upon a set of classifiers that include supervised algo-
rithms (linear and quadratic classifiers) and unsupervised such as k-means
and hierarchical grouping linkage algorithms. Solution proposed is a system
that requires a camera for acquiring the desired image of the banknote to
classify, a Waveform Transform tool and one can choose whether to imple-
ment the classifiers locally ( microcontroller/microprocessor) or if having a
connection(Ethernet/Cloud) classifiers can run in a distributed platform and
send back the results of classification.
2.1 Description
The input source of data in the proposed application is the captured camera
images of the new instance for classification. After image is generated fea-
ture extraction is taking place using a Wavelet Transformation tool in order
to get the values of the 4(four) main features as they are described in the
Dataset subsection. When all four features are extracted as shown in Figure
1, instance is getting classified by the several classifiers, either locally or in a
distributed way. Results as said can be generated locally or distributed and
transmitted back to the interested microprocessor and the final decision is
made upon the classifiers results. Notice that in order of the application to
do exactly what is designed to do various digital image processing techiques
alongside with pattern recognition algorithms are essential in the implemen-
tation. Another important thing to notice is that because various classifiers
2
are implemented the final decision can also be a result of ’voting’ between
every classifier and get a result cross-validated classifier wide. By doing that
we can also have a new metric on how sure are we about a certain decision,
by knowing how each classifier reacted and classified the certain instance.
Figure 1: Distributed application scheme
2.2 Dataset
The dataset used is owned by Volker Lohweg (University of Applied Sciences,
Ostwestfalen-Lippe), while it is dontated by Helene Darkser (University of
Applied Sciences, Ostwestfalen-Lippe) and contains information extracted
from images of real and forged banknotes. The data are available for down-
load in the UCI Machine Learning repository. The implemented classifiers
are evaluated and compared using this dataset. It contains 1372 instances
and it is associated in the classification task while it has rather a large amount
of web hits approximately 150000 at the moment. For the extraction of the
features a Wavelet Transform tool was used. There are five attributes in the
dataset, including the class(genuine-counterfeit), variance of WTi (Wavelet
Transformed Image),the skewness of the WTi,curtosis of WTi and the en-
tropy of the image. Boxplots of the data are displayed in Figure 2 (as they
are generated by Octave-Forge) for the four attributes of the set. While im-
plementing and visualizing the linear and quadratic classifiers the features
selected are the two first features( variance and skewness of banknotes).
3
Figure 2: Boxplots of dataset’s features
2.3 Software
The software used to generate results was selected to be Octave, GNU open-
source project with a high degree of similarity to MATLAB. Several packages
that supported the results include the nan,statistics that implement cru-
cial functions that were used.
2.4 Classifiers
In Figures 3,4 and 5 we can see the instances in the plots for all sam-
ples,training and validation sets when training set is 80% and 20% of data are
the validation set. In the following section the classifiers used are described
and their output of classifying is visualized.
2.5 Linear classifier
The first classifier that is implemented is the linear classifier.
Linear classifiers identify in which class an instance belongs by making clas-
sification decision based on the value of a linear combination of the charac-
4
Figure 3: All samples of the dataset
Figure 4: Training Set
5
Figure 5: Validation Set
terestics. In our proposed implementation the 2 selelected features are the
variance and skewness and classifier was based in the Euclidean distance met-
ric. In Figure 6 we can inspect the classifier and the results of classifier on
the validation set when the partition was following the 80/20 per cent split.
Results have also been produced for other splits such as 70/30 and 90/10.
2.6 Quadratic classifier
Quadratic classifiers are based in QDA(quadratic discriminant analysis) and
as statistical classification it separates the two classes with conic sections(i.e
line, circle, ellipse, parabola or hyperbola) and it is obvious that the quadratic
model is a generalization of the linear model, with the advantage that can
make some more complex separating surfaces. The second classifier that is
implemented is the quadratic classifier.
In this implementation again the features selected were variance and skewness
of banknotes since they offer the best method to distinguish the class and
results include the splits between training and validation of 70/30, 80/20 and
90/10 per cent.
In Figure 7 is visualized the 80/20 result of the quadratic classification using
QDA.
6
Figure 6: Results of linear classifier visualized
Figure 7: Results of quadratic classifier visualized
7
2.7 K-means
The first algorithm of unsupervised classification that was implemented is
k-means clustering with strict definition of clusters to two.
K-means aims to partition the dataset of n instances in k clusters, where
every instance belongs in the cluster with the nearest mean. In Figure 8 we
can see the results of kmeans clustering in the banknote dataset.
Figure 8: Visualization of K-mean clustering
2.8 Hierarchical Clustering
Singe linkage clustering have been also implemented and evaluated on the
dataset. This is a method that belongs to hierarchical clustering.
This method creates bottom-up clusters each time combining two clusters
that contain the closest pairs of instances and end up creating thin and long
clusters where nearby elements tend to have small distance.
Dendrograms are used to visualize the linking between the instances in this
form of clustering.
In the dendrogram(Figure 9) one can see that, there are two big clusters
representing the two classes(genuine and counterfeits) while on the far right
of the dendrogram are lying some possibly outlier instances that haven’t been
removed from the dataset.
8
Figure 9: Dendrogram of single linkage clustering
3 Results
Linear classifier had an error of 12.65% in 80/20 split, 13.542% in 70/30 split
and 11.98% in 90/10.
Quadratic classifier had 11.29% of error in 80/20 split, 12.187% on 70/30
split and 11.82% on 90/10 split.
Kmeans showed incorrect classification error of 12.75%.
Single linkage algorithm as shown in the dendrogram detects two main classes
where the majority of the instances belong to. Misclassification is in the same
rate among all the implemented classifiers.
4 Conclusion
In conclusion as also shown by the results the classifiers were all close on
their classification errors but some better classification results were shown for
the quadratic classifier. Quadratic classifier got better results than linear
classifier in every split of the dataset examined, while k-means algorithm did
not produce significant different error rate. Also in the application context
by having in mind that there can be a ’voting’ system in considering the
final decision, results from every classifier can be weighted in order to get
the final decision to address the class of a new instance. Such an approach
will make use of all the information each classifier can offer as well it can be
9
customed by changing the weight of each classifier’s contribution in the final
decision.
5 Bibliography
1. Recognition of Fake Currency Based on Security Thread Feature of Cur-
rency, E.Pilania, B.Arora
2. Forgery Detection and Value Identification of Euro Banknotes, A.Bruna,
G.M.Farinella, G.Guarnera, S.Battiato
3. A Survey on Fake Indian Paper Currency Identification System, P.J.Grace,
A.Sheema
4. Wikipedia.org
5. Multi-National Banknote Classification Based on Visible-Light Line Sen-
sor and Convolutional Neural Network, T.D.Pham, D.E.Lee, K.R.Park
6. Counterfeit Currency Recognition Using SVM With Note to Coin Ex-
changer, S.V.Walke, D.D.Chandwadkar
7. Original and Counterfeit Money Detection Based on Edge Detection,
M.Akbar, AwaluddinA.Sedayu,S.Widyarto
8. Automatic recognition of serial numbers in bank notes, B.Feng, M.Ren,
X-Y.Zhang, C.Y.Suen
9. Cash Currencies Recognition Using k-Nearest Nighbor Classifier, G.I.Raho,
A.Al-Khiat, A.H.Al-Hamami
10

More Related Content

What's hot

Draft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataDraft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataRaghu Palakodety
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineIRJET Journal
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...IJECEIAES
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Editor IJARCET
 
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...ArchiLab 7
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Workshop nwav 47 - LVS - Tool for Quantitative Data Analysis
Workshop nwav 47 - LVS - Tool for Quantitative Data AnalysisWorkshop nwav 47 - LVS - Tool for Quantitative Data Analysis
Workshop nwav 47 - LVS - Tool for Quantitative Data AnalysisOlga Scrivner
 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...IJCSIS Research Publications
 
Recognition of Handwritten Mathematical Equations
Recognition of  Handwritten Mathematical EquationsRecognition of  Handwritten Mathematical Equations
Recognition of Handwritten Mathematical EquationsIRJET Journal
 
Minghui Conference Cross-Validation Talk
Minghui Conference Cross-Validation TalkMinghui Conference Cross-Validation Talk
Minghui Conference Cross-Validation TalkWei Wang
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 

What's hot (17)

Draft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataDraft activity recognition from accelerometer data
Draft activity recognition from accelerometer data
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
 
A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...A comparative study of three validities computation methods for multimodel ap...
A comparative study of three validities computation methods for multimodel ap...
 
Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368Ijarcet vol-2-issue-7-2363-2368
Ijarcet vol-2-issue-7-2363-2368
 
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...
Fessant aknin oukhellou_midenet_2001:comparison_of_supervised_self_organizing...
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Workshop nwav 47 - LVS - Tool for Quantitative Data Analysis
Workshop nwav 47 - LVS - Tool for Quantitative Data AnalysisWorkshop nwav 47 - LVS - Tool for Quantitative Data Analysis
Workshop nwav 47 - LVS - Tool for Quantitative Data Analysis
 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...
 
Pca part
Pca partPca part
Pca part
 
Recognition of Handwritten Mathematical Equations
Recognition of  Handwritten Mathematical EquationsRecognition of  Handwritten Mathematical Equations
Recognition of Handwritten Mathematical Equations
 
Minghui Conference Cross-Validation Talk
Minghui Conference Cross-Validation TalkMinghui Conference Cross-Validation Talk
Minghui Conference Cross-Validation Talk
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
C0413016018
C0413016018C0413016018
C0413016018
 
Thai
ThaiThai
Thai
 
Ev72
Ev72Ev72
Ev72
 
C04701019027
C04701019027C04701019027
C04701019027
 

Similar to Application of pattern recognition techniques in banknote classification

A review of Fake Currency Recognition Methods
A review of Fake Currency Recognition MethodsA review of Fake Currency Recognition Methods
A review of Fake Currency Recognition MethodsIRJET Journal
 
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0theijes
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...ITIIIndustries
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...cscpconf
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...csandit
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
 
A02610104
A02610104A02610104
A02610104theijes
 
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUESNEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUEScscpconf
 
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUESNEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUEScsitconf
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONIRJET Journal
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATMIRJET Journal
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Makerijtsrd
 
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesIRJET Journal
 
Web Graph Clustering Using Hyperlink Structure
Web Graph Clustering Using Hyperlink StructureWeb Graph Clustering Using Hyperlink Structure
Web Graph Clustering Using Hyperlink Structureaciijournal
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition systemeSAT Journals
 
Caravan insurance data mining prediction models
Caravan insurance data mining prediction modelsCaravan insurance data mining prediction models
Caravan insurance data mining prediction modelsMuthu Kumaar Thangavelu
 
Caravan insurance data mining prediction models
Caravan insurance data mining prediction modelsCaravan insurance data mining prediction models
Caravan insurance data mining prediction modelsMuthu Kumaar Thangavelu
 

Similar to Application of pattern recognition techniques in banknote classification (20)

A review of Fake Currency Recognition Methods
A review of Fake Currency Recognition MethodsA review of Fake Currency Recognition Methods
A review of Fake Currency Recognition Methods
 
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
Anomaly Detection in Temporal data Using Kmeans Clustering with C5.0
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
 
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
A02610104
A02610104A02610104
A02610104
 
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUESNEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
 
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUESNEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
NEURAL NETWORKS WITH DECISION TREES FOR DIAGNOSIS ISSUES
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
 
AIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTIONAIRLINE FARE PRICE PREDICTION
AIRLINE FARE PRICE PREDICTION
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Maker
 
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
 
Web Graph Clustering Using Hyperlink Structure
Web Graph Clustering Using Hyperlink StructureWeb Graph Clustering Using Hyperlink Structure
Web Graph Clustering Using Hyperlink Structure
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition system
 
Caravan insurance data mining prediction models
Caravan insurance data mining prediction modelsCaravan insurance data mining prediction models
Caravan insurance data mining prediction models
 
Caravan insurance data mining prediction models
Caravan insurance data mining prediction modelsCaravan insurance data mining prediction models
Caravan insurance data mining prediction models
 

Recently uploaded

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxVarshiniMK
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
 

Recently uploaded (20)

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Cytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptxCytokinin, mechanism and its application.pptx
Cytokinin, mechanism and its application.pptx
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
 

Application of pattern recognition techniques in banknote classification

  • 1. Application of pattern recognition techniques in banknote classification Nikolaos Mouzakitis February 27, 2019 Abstract In this paper a pattern recognition application used for banknotes classification is described, based on a bank-notes dataset available in UCI Machine Learning repository. Description of the proposed classi- fiers in this particular separation problem are compared and analyzed before conducting the conclusion about the efficiency of the particu- lar solution. Supervised classifiers such as linear and quadratic are implemented, while k-means and single linkage algorith are used for unsupervised classification. For the supervised section there have been created three different splits for training and validation sets those of 70%/30%,80%/20% and 90%/10%. 1 Introduction Even if in the last decade the use of electronic money and digital currency increased rapidly, in the recent years with the high technological advances and steps forward in color printing, counterfeiting problems are becoming more and more serious. In a perfect scenario only authorities would have the ability to print banknotes but forged currency is appearing more often with the aid of technology. The detection of such counterfeits is a required important task where money exchange is taking place. As for the size of the problem Grace and Sheema[3] describe how the counterfeit problem in India became big hurdle,as well as how managing a large amount of counterfeits imposes additional problems to banks or other organizations. A general conclusion is that anybody with a computer or laser printer is 1
  • 2. capable of generating forged banknotes and this fact is adding value in ap- plications that solve succesfully this particular problem. Several solutions have been proposed in this context, such as classification by convolutional neural network(CNN)[5], detection based on Edge Detection [7] while Feng,Ren,Zhang and Suen proposed recognition of serial numbers of the banknotes [8]. Also, Raho,Khiat and Al-Hamami [9] research the so- lution of using k-Nearest Neighbor algorithm to determine the category of the currency and its reality. 2 Proposed Application In order to provide a solution for the problem and avoid manual testing of each banknote which is a time consuming task, there is a need for an automated application to solve the problem with efficiency. The proposed application is based upon a set of classifiers that include supervised algo- rithms (linear and quadratic classifiers) and unsupervised such as k-means and hierarchical grouping linkage algorithms. Solution proposed is a system that requires a camera for acquiring the desired image of the banknote to classify, a Waveform Transform tool and one can choose whether to imple- ment the classifiers locally ( microcontroller/microprocessor) or if having a connection(Ethernet/Cloud) classifiers can run in a distributed platform and send back the results of classification. 2.1 Description The input source of data in the proposed application is the captured camera images of the new instance for classification. After image is generated fea- ture extraction is taking place using a Wavelet Transformation tool in order to get the values of the 4(four) main features as they are described in the Dataset subsection. When all four features are extracted as shown in Figure 1, instance is getting classified by the several classifiers, either locally or in a distributed way. Results as said can be generated locally or distributed and transmitted back to the interested microprocessor and the final decision is made upon the classifiers results. Notice that in order of the application to do exactly what is designed to do various digital image processing techiques alongside with pattern recognition algorithms are essential in the implemen- tation. Another important thing to notice is that because various classifiers 2
  • 3. are implemented the final decision can also be a result of ’voting’ between every classifier and get a result cross-validated classifier wide. By doing that we can also have a new metric on how sure are we about a certain decision, by knowing how each classifier reacted and classified the certain instance. Figure 1: Distributed application scheme 2.2 Dataset The dataset used is owned by Volker Lohweg (University of Applied Sciences, Ostwestfalen-Lippe), while it is dontated by Helene Darkser (University of Applied Sciences, Ostwestfalen-Lippe) and contains information extracted from images of real and forged banknotes. The data are available for down- load in the UCI Machine Learning repository. The implemented classifiers are evaluated and compared using this dataset. It contains 1372 instances and it is associated in the classification task while it has rather a large amount of web hits approximately 150000 at the moment. For the extraction of the features a Wavelet Transform tool was used. There are five attributes in the dataset, including the class(genuine-counterfeit), variance of WTi (Wavelet Transformed Image),the skewness of the WTi,curtosis of WTi and the en- tropy of the image. Boxplots of the data are displayed in Figure 2 (as they are generated by Octave-Forge) for the four attributes of the set. While im- plementing and visualizing the linear and quadratic classifiers the features selected are the two first features( variance and skewness of banknotes). 3
  • 4. Figure 2: Boxplots of dataset’s features 2.3 Software The software used to generate results was selected to be Octave, GNU open- source project with a high degree of similarity to MATLAB. Several packages that supported the results include the nan,statistics that implement cru- cial functions that were used. 2.4 Classifiers In Figures 3,4 and 5 we can see the instances in the plots for all sam- ples,training and validation sets when training set is 80% and 20% of data are the validation set. In the following section the classifiers used are described and their output of classifying is visualized. 2.5 Linear classifier The first classifier that is implemented is the linear classifier. Linear classifiers identify in which class an instance belongs by making clas- sification decision based on the value of a linear combination of the charac- 4
  • 5. Figure 3: All samples of the dataset Figure 4: Training Set 5
  • 6. Figure 5: Validation Set terestics. In our proposed implementation the 2 selelected features are the variance and skewness and classifier was based in the Euclidean distance met- ric. In Figure 6 we can inspect the classifier and the results of classifier on the validation set when the partition was following the 80/20 per cent split. Results have also been produced for other splits such as 70/30 and 90/10. 2.6 Quadratic classifier Quadratic classifiers are based in QDA(quadratic discriminant analysis) and as statistical classification it separates the two classes with conic sections(i.e line, circle, ellipse, parabola or hyperbola) and it is obvious that the quadratic model is a generalization of the linear model, with the advantage that can make some more complex separating surfaces. The second classifier that is implemented is the quadratic classifier. In this implementation again the features selected were variance and skewness of banknotes since they offer the best method to distinguish the class and results include the splits between training and validation of 70/30, 80/20 and 90/10 per cent. In Figure 7 is visualized the 80/20 result of the quadratic classification using QDA. 6
  • 7. Figure 6: Results of linear classifier visualized Figure 7: Results of quadratic classifier visualized 7
  • 8. 2.7 K-means The first algorithm of unsupervised classification that was implemented is k-means clustering with strict definition of clusters to two. K-means aims to partition the dataset of n instances in k clusters, where every instance belongs in the cluster with the nearest mean. In Figure 8 we can see the results of kmeans clustering in the banknote dataset. Figure 8: Visualization of K-mean clustering 2.8 Hierarchical Clustering Singe linkage clustering have been also implemented and evaluated on the dataset. This is a method that belongs to hierarchical clustering. This method creates bottom-up clusters each time combining two clusters that contain the closest pairs of instances and end up creating thin and long clusters where nearby elements tend to have small distance. Dendrograms are used to visualize the linking between the instances in this form of clustering. In the dendrogram(Figure 9) one can see that, there are two big clusters representing the two classes(genuine and counterfeits) while on the far right of the dendrogram are lying some possibly outlier instances that haven’t been removed from the dataset. 8
  • 9. Figure 9: Dendrogram of single linkage clustering 3 Results Linear classifier had an error of 12.65% in 80/20 split, 13.542% in 70/30 split and 11.98% in 90/10. Quadratic classifier had 11.29% of error in 80/20 split, 12.187% on 70/30 split and 11.82% on 90/10 split. Kmeans showed incorrect classification error of 12.75%. Single linkage algorithm as shown in the dendrogram detects two main classes where the majority of the instances belong to. Misclassification is in the same rate among all the implemented classifiers. 4 Conclusion In conclusion as also shown by the results the classifiers were all close on their classification errors but some better classification results were shown for the quadratic classifier. Quadratic classifier got better results than linear classifier in every split of the dataset examined, while k-means algorithm did not produce significant different error rate. Also in the application context by having in mind that there can be a ’voting’ system in considering the final decision, results from every classifier can be weighted in order to get the final decision to address the class of a new instance. Such an approach will make use of all the information each classifier can offer as well it can be 9
  • 10. customed by changing the weight of each classifier’s contribution in the final decision. 5 Bibliography 1. Recognition of Fake Currency Based on Security Thread Feature of Cur- rency, E.Pilania, B.Arora 2. Forgery Detection and Value Identification of Euro Banknotes, A.Bruna, G.M.Farinella, G.Guarnera, S.Battiato 3. A Survey on Fake Indian Paper Currency Identification System, P.J.Grace, A.Sheema 4. Wikipedia.org 5. Multi-National Banknote Classification Based on Visible-Light Line Sen- sor and Convolutional Neural Network, T.D.Pham, D.E.Lee, K.R.Park 6. Counterfeit Currency Recognition Using SVM With Note to Coin Ex- changer, S.V.Walke, D.D.Chandwadkar 7. Original and Counterfeit Money Detection Based on Edge Detection, M.Akbar, AwaluddinA.Sedayu,S.Widyarto 8. Automatic recognition of serial numbers in bank notes, B.Feng, M.Ren, X-Y.Zhang, C.Y.Suen 9. Cash Currencies Recognition Using k-Nearest Nighbor Classifier, G.I.Raho, A.Al-Khiat, A.H.Al-Hamami 10