SlideShare a Scribd company logo
Detecting Counterfeit
Banknotes Of Bangladesh
Associate Processor
CSE,JNU
Dr. Md Zulfiker Mahmud
Supervised by
2
02
Agenda
Introduction 05
01
Objective 06
02
Workflow for Fake Note Detection 08
04
Steps to Detect Fake Note 09
05
Techniques 10
06
03
Identify Original Note 07
03
Project Demonstration 12
08
Tools and Libraries 11
07
Team Fix_it
Tanvir Ahammed Hridoy
ID: B180305020
Susmita Rani Saha
B180305047
04
Introduction
 Fake currency notes pose a significant threat to financial systems. Counterfeit banknotes and its
impact on the economy.
 Counterfeiting has far-reaching negative effects on various aspects of society, including the economy,
consumer trust, public safety, and the rule of law.
 Digital Image Processing (DIP) techniques can be employed to identify counterfeit banknotes.
05
Objective
 Increased Security: Safeguarding financial systems against counterfeit currency.
 Automation: Fast and accurate detection without manual intervention.
 Cost-Efficient: OpenCV is an open-source library, reducing the need for expensive proprietary
software.
06
Identify Original Note
07
Workflow for Fake Note Detection
Feature Extraction
Classification
Acquisition
Pre-processing
Image enhancement
techniques to improve the
quality of the captured image.
Scanning or capturing the
image of the banknote.
Extracting relevant features
from the pre-processed image.
Use Pattern recognition
algorithms to classify the
note as genuine or fake
08
Steps to Detect Fake Note
09
Techniques in Fake Note Detection:
 Contour Analysis: Contour Analysis can also be used in watermark detection and microprint analysis.
 Watermark Detection: Watermarks are embedded security features in genuine banknotes that are
often subtle and difficult to replicate. By analyzing the contours and regions of interest, contour
detection can help identify the presence and location of watermarks.
 Microprint Analysis: Microprint is a security feature consisting of tiny, intricate patterns that are
difficult to replicate accurately. By extracting the contours of microprint regions, contour detection
can assist in identifying and comparing the microprint patterns on the banknote, aiding in
determining its authenticity.
 UV/IR Detection: Verifying the presence of ultraviolet (UV) or infrared (IR) features on genuine notes.
10
Tools and Libraries
 Tools:
 PyCharm IDE
 Libraries:
 OpenCV :(Open Source Computer Vision Library) is a popular open-source library
for computer vision and image processing tasks.
 numpy : This is a popular library for numerical computations in Python. It provides
support for multi-dimensional arrays and mathematical functions.
 imutils: This is a package that provides convenience functions to simplify common
image processing tasks, such as resizing, rotating, and contour operations.
11
Project Demonstration
12
Project Demonstration
13
THANK YOU
Any Query?

More Related Content

Similar to Fake Note Detection of Bangladesh

BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
Shehin Pm
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptx
DAshok2
 
Eye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual KeyboardEye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual Keyboard
IRJET Journal
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
Gurjant Singh Sandhu
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
Vrindapareek5
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
 
A guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdfA guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdf
3sitservices IT Software Company
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
AnuragKumarJha4
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
ComputerVision.pptx
ComputerVision.pptxComputerVision.pptx
ComputerVision.pptx
AfnanAbouelwafa1
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
IJCIRAS Journal
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
Kalyanam Kiran
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
IRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
Suman Mia
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
CSCJournals
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
Raghavendra DC
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 

Similar to Fake Note Detection of Bangladesh (20)

BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGYBLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptx
 
Eye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual KeyboardEye-Blink Detection System for Virtual Keyboard
Eye-Blink Detection System for Virtual Keyboard
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
A guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdfA guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdf
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
ComputerVision.pptx
ComputerVision.pptxComputerVision.pptx
ComputerVision.pptx
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 

Recently uploaded

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 

Recently uploaded (20)

CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 

Fake Note Detection of Bangladesh

  • 2. Associate Processor CSE,JNU Dr. Md Zulfiker Mahmud Supervised by 2 02
  • 3. Agenda Introduction 05 01 Objective 06 02 Workflow for Fake Note Detection 08 04 Steps to Detect Fake Note 09 05 Techniques 10 06 03 Identify Original Note 07 03 Project Demonstration 12 08 Tools and Libraries 11 07
  • 4. Team Fix_it Tanvir Ahammed Hridoy ID: B180305020 Susmita Rani Saha B180305047 04
  • 5. Introduction  Fake currency notes pose a significant threat to financial systems. Counterfeit banknotes and its impact on the economy.  Counterfeiting has far-reaching negative effects on various aspects of society, including the economy, consumer trust, public safety, and the rule of law.  Digital Image Processing (DIP) techniques can be employed to identify counterfeit banknotes. 05
  • 6. Objective  Increased Security: Safeguarding financial systems against counterfeit currency.  Automation: Fast and accurate detection without manual intervention.  Cost-Efficient: OpenCV is an open-source library, reducing the need for expensive proprietary software. 06
  • 8. Workflow for Fake Note Detection Feature Extraction Classification Acquisition Pre-processing Image enhancement techniques to improve the quality of the captured image. Scanning or capturing the image of the banknote. Extracting relevant features from the pre-processed image. Use Pattern recognition algorithms to classify the note as genuine or fake 08
  • 9. Steps to Detect Fake Note 09
  • 10. Techniques in Fake Note Detection:  Contour Analysis: Contour Analysis can also be used in watermark detection and microprint analysis.  Watermark Detection: Watermarks are embedded security features in genuine banknotes that are often subtle and difficult to replicate. By analyzing the contours and regions of interest, contour detection can help identify the presence and location of watermarks.  Microprint Analysis: Microprint is a security feature consisting of tiny, intricate patterns that are difficult to replicate accurately. By extracting the contours of microprint regions, contour detection can assist in identifying and comparing the microprint patterns on the banknote, aiding in determining its authenticity.  UV/IR Detection: Verifying the presence of ultraviolet (UV) or infrared (IR) features on genuine notes. 10
  • 11. Tools and Libraries  Tools:  PyCharm IDE  Libraries:  OpenCV :(Open Source Computer Vision Library) is a popular open-source library for computer vision and image processing tasks.  numpy : This is a popular library for numerical computations in Python. It provides support for multi-dimensional arrays and mathematical functions.  imutils: This is a package that provides convenience functions to simplify common image processing tasks, such as resizing, rotating, and contour operations. 11