SlideShare a Scribd company logo
1 of 21
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 1
Fake Currency Detection Using Image Processing
Shruti V Gurav
USN-2JG17EC005
Under the guidance of
Mr. Allayya Kudli
Assistant Professor
Department of Electronics and Communication Engineering
Jain AGM Institute of technology
Jamkhandi– 587301
Batch-2017
Pradnya B Patil
USN-2JG17EC002
Savita L Hanchinal
USN-2JG17EC004
Fake Currency Detection using Image Processing
A project/dissertation submitted in partial fulfilment of the requirements for the degree of
BACHELOR OF ENGINEERING IN ELECTRONICS AND COMMUNICATION
by
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 2
Fake Currency Detection Using Image Processing
Overview
Introduction
Reason to Choose
Objective
Methodology Of Project
Conclusion
Future Scope
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 3
Fake Currency Detection Using Image Processing
Introduction
Counterfeiting money stands for the illegal replication of original currency, hence
counterfeit currency is a fake currency that has not been authorized by the
government.
Every year RBI faces the problem of counterfeit currency notes once filtered and
circulated in the market.
The methodology of image processing is based on the extraction of the features of Indian
bank notes.
Images are processed by using various techniques of image processing and further various
features are extracted from the images .
The approach consists of a number of components including image processing ,
characteristics extraction, classification images.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 4
Fake Currency Detection Using Image Processing
Reason to Choose
Commercial areas like the banks, malls, jeweler stores etc have huge amount of
transactions on a daily basis such places may be able to afford and find it feasible to by
machine that use UV light and other techniques to detect the authenticity of the currency.
But for common people it is very difficult to just detect weather the currency is fake or
genuine and they may face losses especially during bank deposits and transaction.
This system is designed such that any person can use it easily and detect the authenticity of
the currency he has buy using the usual features of the currency.
This system can further be converted into an app so that it is accessible to all the people.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 5
Fake Currency Detection Using Image Processing
Objective
The main objective of the project is to identify the fake Indian currency based on the
features present in the real note and fake currency.
Classify the image of the currency weather it is fake of genuine.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 6
Fake Currency Detection Using Image Processing
Methodology of Project
The current system that are present are only machine based i.e. it is only for commercial
use.
The system that use image processing are performed on Mat lab .This machines are based
on optical sensing or proximity detection in optical detection the currency is kept under the
machine and the UV light is scanned over the currency and if the currency shines due to
fluorescence then it is genuine currency.
In proxy detection ink is used to make currency contents ferromagnetic properties, so when
the currency is passed through the magnetic belt and if it shows some movement than it is
concluded that it is genuine currency.
But our proposed method is based on image processing technique.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 7
Fake Currency Detection Using Image Processing
Methodology of Project
Flowchart:
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 8
Fake Currency Detection Using Image Processing
Methodology of Project
1.Input
The image of the currency that has to be checked or verified as a genuine currency is taken
as an input for the system.
The input image can be acquired using techniques like scanning the image or clicking the
picture with the phone and then uploading it to the system.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 9
Fake Currency Detection Using Image Processing
Methodology of Project
2.Image Pre-processing
Image pre-processing are the steps taken to format images before they are used by model
training and inference.
Two methods of pre-processing used are:
A. Resize the image
B. Noise reduction with Morphological Operation
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 10
Fake Currency Detection Using Image Processing
Methodology of Project
3.Image Segmentation
In digital image processing and computer vision, image segmentation is the process of
partitioning a digital image into multiple segments (sets of pixel, also known as image
objects).
The goal of segmentation is to simplify and/or change the representation of an image into
something that is more meaningful and easier to analyse.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 11
Fake Currency Detection Using Image Processing
Methodology of Project
Create Binary Mask(Graph cut method)
Graph cut is a semiautomatic segmentation technique that you can use to segment an
image into foreground and background elements.
Graph cut segmentation does not require good initialization.
You draw lines on the image, called scribbles, to identify what you want in the
foreground and what you want in the background.
The Image Segmenter segments the image automatically based on your scribbles and
displays the segmented image.
You can refine the segmentation by drawing more scribbles on the image until you
are satisfied with the result.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 12
Fake Currency Detection Using Image Processing
Methodology of Project
4.Feature Extraction
Transforming the input data into the set of features is called feature extraction.
Feature extraction describes the relevant shape information contained in a pattern so
that the task of classify the pattern is made by a formal procedure.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 13
Fake Currency Detection Using Image Processing
Methodology of Project
Texture feature from the list:
I. Energy
II. Contrast
III.Homogeneity
IV.Correlation
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 14
Fake Currency Detection Using Image Processing
Methodology of Project
Other Features extracted are:
I. Mean
II. Standard Deviation
III. RMS
IV. Variance
V. Smoothness
VI. Inverse Difference Movement
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 15
Fake Currency Detection Using Image Processing
Methodology of Project
5.Classification
Train the features extracted from the currency into SVM(Support Vector Machine) model.
A support vector machine (SVM) is machine learning algorithm that analyzes data for
classification and regression analysis. SVM is a supervised learning method that looks at
data and sorts it into one of two categories. An SVM outputs a map of the sorted data with
the margins between the two as far apart as possible.
Graphical Representation Of SVM classifier
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 16
Fake Currency Detection Using Image Processing
Methodology of Project
6.Result
The SVM classifier classifies weather the input currency is fake or genuine based
the extracted features from the currency notes as discussed .
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 17
Fake Currency Detection Using Image Processing
Methodology of Project
Technical specification
Hardware Requirement
Processor:Any intel or AMD x84 or 64 processor
RAM:4GB
Hard Drive:10GB
Disk space:1GB
Software Requirement
Programming language: MATLAB
Tool: MATLAB R2020a
Operating System: Microsoft Window 7,Window 10
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 18
Fake Currency Detection Using Image Processing
Conclusion
Furthermore, the proposed classifier has very good generalization ability
and needs low computing power when using a linear kernel.
We have applied SVM to paper currency verification. After extracting crucial
features from banknotes by using some low-cost sensors, we have experimented
on our SVM classifier and achieved very good performance .
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 19
Fake Currency Detection Using Image Processing
Future work
 Hence it is very suitable for implementing an automatic verifier for paper currency.
Our future work includes applying other support vector machines, such as nu-SVM
,SSVM and RSVM , for paper currency verification and using support vector
machines to deal with the problem of multiple kinds of paper currency
identification.
Also this project initiates to build an application to make easy to use for people and
also apply this methodology on foreign currency.
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 20
Fake Currency Detection Using Image Processing
References
 [1] Chin-Chen Chang *, Tai-Xing Yu and Hsuan-Yen Yen-Paper Currency
Verification with Support Vector Machines, Third International IEEE Conference on
Signal-Image Technologies
[2] Vidhi Roy, Gangey Mishra, Rahul Mannadiar, Sushant Patil-International Journal
of Computer Science and Mobile Computing IJCSMC, Vol. 8, Issue. 4, April 2019,
pg.88 – 93
[3] Ankur Saxena ,Pawan Kumar Singh, Ganesh Prasad Pal, Ravi Kumar Tewari-
Fake Currency Detection Using Image Processing , International Journal of
Engineering & Technology, 7 (4.39) (2018) 199-205
DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 21
Fake Currency Detection Using Image Processing
Thank You!!!

More Related Content

What's hot

Predicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningPredicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningJohn Alex
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection reportPurvanshJain1
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processingFatima Akhtar
 
silent sound technology
silent sound technologysilent sound technology
silent sound technologykamesh0007
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Adaline madaline
Adaline madalineAdaline madaline
Adaline madalineNagarajan
 
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...DrNoura Semary
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxkumari36
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
States, state graphs and transition testing
States, state graphs and transition testingStates, state graphs and transition testing
States, state graphs and transition testingABHISHEK KUMAR
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learningdataalcott
 

What's hot (20)

Predicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningPredicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine Learning
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
Housing price prediction
Housing price predictionHousing price prediction
Housing price prediction
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Adaline madaline
Adaline madalineAdaline madaline
Adaline madaline
 
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
 
Image Processing ppt
Image Processing pptImage Processing ppt
Image Processing ppt
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Prediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptxPrediction of heart disease using machine learning.pptx
Prediction of heart disease using machine learning.pptx
 
Virtual Mouse
Virtual MouseVirtual Mouse
Virtual Mouse
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Final ppt
Final pptFinal ppt
Final ppt
 
States, state graphs and transition testing
States, state graphs and transition testingStates, state graphs and transition testing
States, state graphs and transition testing
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 

Similar to Fake Currency detction Using Image Processing

Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptxGAMINGRBF
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx426SahithiBaiMiriska
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in roboticsIAEME Publication
 
Paper id 28201415
Paper id 28201415Paper id 28201415
Paper id 28201415IJRAT
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATMIRJET Journal
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition AlogrithmIRJET Journal
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONIRJET Journal
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency IdentifierIRJET Journal
 
Face Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic SystemFace Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic SystemIRJET Journal
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET Journal
 
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...IRJET Journal
 

Similar to Fake Currency detction Using Image Processing (20)

Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
 
Paper id 28201415
Paper id 28201415Paper id 28201415
Paper id 28201415
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHON
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency Identifier
 
Face Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic SystemFace Recognition Based on Image Processing in an Advanced Robotic System
Face Recognition Based on Image Processing in an Advanced Robotic System
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...
IRJET- Currency Note Detection and Note to Coin Converter using Digital Image...
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Fake Currency detction Using Image Processing

  • 1. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 1 Fake Currency Detection Using Image Processing Shruti V Gurav USN-2JG17EC005 Under the guidance of Mr. Allayya Kudli Assistant Professor Department of Electronics and Communication Engineering Jain AGM Institute of technology Jamkhandi– 587301 Batch-2017 Pradnya B Patil USN-2JG17EC002 Savita L Hanchinal USN-2JG17EC004 Fake Currency Detection using Image Processing A project/dissertation submitted in partial fulfilment of the requirements for the degree of BACHELOR OF ENGINEERING IN ELECTRONICS AND COMMUNICATION by
  • 2. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 2 Fake Currency Detection Using Image Processing Overview Introduction Reason to Choose Objective Methodology Of Project Conclusion Future Scope
  • 3. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 3 Fake Currency Detection Using Image Processing Introduction Counterfeiting money stands for the illegal replication of original currency, hence counterfeit currency is a fake currency that has not been authorized by the government. Every year RBI faces the problem of counterfeit currency notes once filtered and circulated in the market. The methodology of image processing is based on the extraction of the features of Indian bank notes. Images are processed by using various techniques of image processing and further various features are extracted from the images . The approach consists of a number of components including image processing , characteristics extraction, classification images.
  • 4. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 4 Fake Currency Detection Using Image Processing Reason to Choose Commercial areas like the banks, malls, jeweler stores etc have huge amount of transactions on a daily basis such places may be able to afford and find it feasible to by machine that use UV light and other techniques to detect the authenticity of the currency. But for common people it is very difficult to just detect weather the currency is fake or genuine and they may face losses especially during bank deposits and transaction. This system is designed such that any person can use it easily and detect the authenticity of the currency he has buy using the usual features of the currency. This system can further be converted into an app so that it is accessible to all the people.
  • 5. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 5 Fake Currency Detection Using Image Processing Objective The main objective of the project is to identify the fake Indian currency based on the features present in the real note and fake currency. Classify the image of the currency weather it is fake of genuine.
  • 6. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 6 Fake Currency Detection Using Image Processing Methodology of Project The current system that are present are only machine based i.e. it is only for commercial use. The system that use image processing are performed on Mat lab .This machines are based on optical sensing or proximity detection in optical detection the currency is kept under the machine and the UV light is scanned over the currency and if the currency shines due to fluorescence then it is genuine currency. In proxy detection ink is used to make currency contents ferromagnetic properties, so when the currency is passed through the magnetic belt and if it shows some movement than it is concluded that it is genuine currency. But our proposed method is based on image processing technique.
  • 7. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 7 Fake Currency Detection Using Image Processing Methodology of Project Flowchart:
  • 8. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 8 Fake Currency Detection Using Image Processing Methodology of Project 1.Input The image of the currency that has to be checked or verified as a genuine currency is taken as an input for the system. The input image can be acquired using techniques like scanning the image or clicking the picture with the phone and then uploading it to the system.
  • 9. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 9 Fake Currency Detection Using Image Processing Methodology of Project 2.Image Pre-processing Image pre-processing are the steps taken to format images before they are used by model training and inference. Two methods of pre-processing used are: A. Resize the image B. Noise reduction with Morphological Operation
  • 10. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 10 Fake Currency Detection Using Image Processing Methodology of Project 3.Image Segmentation In digital image processing and computer vision, image segmentation is the process of partitioning a digital image into multiple segments (sets of pixel, also known as image objects). The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyse.
  • 11. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 11 Fake Currency Detection Using Image Processing Methodology of Project Create Binary Mask(Graph cut method) Graph cut is a semiautomatic segmentation technique that you can use to segment an image into foreground and background elements. Graph cut segmentation does not require good initialization. You draw lines on the image, called scribbles, to identify what you want in the foreground and what you want in the background. The Image Segmenter segments the image automatically based on your scribbles and displays the segmented image. You can refine the segmentation by drawing more scribbles on the image until you are satisfied with the result.
  • 12. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 12 Fake Currency Detection Using Image Processing Methodology of Project 4.Feature Extraction Transforming the input data into the set of features is called feature extraction. Feature extraction describes the relevant shape information contained in a pattern so that the task of classify the pattern is made by a formal procedure.
  • 13. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 13 Fake Currency Detection Using Image Processing Methodology of Project Texture feature from the list: I. Energy II. Contrast III.Homogeneity IV.Correlation
  • 14. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 14 Fake Currency Detection Using Image Processing Methodology of Project Other Features extracted are: I. Mean II. Standard Deviation III. RMS IV. Variance V. Smoothness VI. Inverse Difference Movement
  • 15. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 15 Fake Currency Detection Using Image Processing Methodology of Project 5.Classification Train the features extracted from the currency into SVM(Support Vector Machine) model. A support vector machine (SVM) is machine learning algorithm that analyzes data for classification and regression analysis. SVM is a supervised learning method that looks at data and sorts it into one of two categories. An SVM outputs a map of the sorted data with the margins between the two as far apart as possible. Graphical Representation Of SVM classifier
  • 16. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 16 Fake Currency Detection Using Image Processing Methodology of Project 6.Result The SVM classifier classifies weather the input currency is fake or genuine based the extracted features from the currency notes as discussed .
  • 17. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 17 Fake Currency Detection Using Image Processing Methodology of Project Technical specification Hardware Requirement Processor:Any intel or AMD x84 or 64 processor RAM:4GB Hard Drive:10GB Disk space:1GB Software Requirement Programming language: MATLAB Tool: MATLAB R2020a Operating System: Microsoft Window 7,Window 10
  • 18. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 18 Fake Currency Detection Using Image Processing Conclusion Furthermore, the proposed classifier has very good generalization ability and needs low computing power when using a linear kernel. We have applied SVM to paper currency verification. After extracting crucial features from banknotes by using some low-cost sensors, we have experimented on our SVM classifier and achieved very good performance .
  • 19. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 19 Fake Currency Detection Using Image Processing Future work  Hence it is very suitable for implementing an automatic verifier for paper currency. Our future work includes applying other support vector machines, such as nu-SVM ,SSVM and RSVM , for paper currency verification and using support vector machines to deal with the problem of multiple kinds of paper currency identification. Also this project initiates to build an application to make easy to use for people and also apply this methodology on foreign currency.
  • 20. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 20 Fake Currency Detection Using Image Processing References  [1] Chin-Chen Chang *, Tai-Xing Yu and Hsuan-Yen Yen-Paper Currency Verification with Support Vector Machines, Third International IEEE Conference on Signal-Image Technologies [2] Vidhi Roy, Gangey Mishra, Rahul Mannadiar, Sushant Patil-International Journal of Computer Science and Mobile Computing IJCSMC, Vol. 8, Issue. 4, April 2019, pg.88 – 93 [3] Ankur Saxena ,Pawan Kumar Singh, Ganesh Prasad Pal, Ravi Kumar Tewari- Fake Currency Detection Using Image Processing , International Journal of Engineering & Technology, 7 (4.39) (2018) 199-205
  • 21. DEPT. OF ELECTRONICS AND COMMUNICATION ENGINEERING JAGMIT JAMKHANDI 21 Fake Currency Detection Using Image Processing Thank You!!!