Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Project on fake currency recognition using image processing ppt final (3).pptx426SahithiBaiMiriska
End of the project is the technology of currency recognition basically AIMS for identifying and extracting visible and invisible features of currency notes and till now many techniques have been proposed stering for the fake currency note but the best way to use the visible features of the note or colour and size
The scope of work and idea is this project proposes and approach the 12 detect a currency note be in circular in our country by using their image our project will provide required mobility and compatibility to most of the people and provides a credible accuracy for the fake currency detection we are using machine learning to make it portable and efficient.
The overview of the project is the fake currency detection using machine learning was implemented on matlab features of currency note like serial number security thread identification mark Mahatma Gandhi portrayed what extracted the process star and from image acquisition to calculation of intensity of each extracted feature.
The application the applications are fake currency detection system can be utilised in shops Bank counters and end computerised tailor machine and auto merchant machines and so on the systems are created utilizing diverse techniques and
The future scope of this project is many different adaptation test and innovations have been kept for the future due to lack of time as which a work concerns de per analysis of particular mechanisms new proposal Pride different methods or simply curiosity in future we will be including ammonia for currency conversion and we can implement the system for foreign currencies and tracking of device location through which the currency scan and maintain the same in the database.
Image processing based girth monitoring and recording system for rubber plant...sipij
Measuring the girth and continuous monitoring of the increase in girth is one of the most important processes in rubber plantations since identification of girth deficiencies would enable planters to take corrective actions to ensure a good yield from the plantation.
This research paper presents an image processing based girth measurement & recording system that can replace existing manual process in an efficient and economical manner.
The system uses a digital image of the tree which uses the current number drawn on the tree to identify the tree number & its width. The image is threshold first & then filtered out using several filtering criterion to identify possible candidates for numbers. Identified blobs are then fed to the Tesseract OCR for number recognition. Threshold image is then filtered again with different criterion to segment out the black strip drawn on the tree which is then used to calculate the width of the tree using calibration parameters. Once the tree number is identified & width is calculated the girth the measured girth of the tree is stored in the data base under the identified tree number.
The results obtained from the system indicated significant improvement in efficiency & economy for main plantations. As future developments we are proposing a standard commercial system for girth measurement using standardized 2D Bar Codes as tree identifiers
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
Project on fake currency recognition using image processing ppt final (3).pptx426SahithiBaiMiriska
End of the project is the technology of currency recognition basically AIMS for identifying and extracting visible and invisible features of currency notes and till now many techniques have been proposed stering for the fake currency note but the best way to use the visible features of the note or colour and size
The scope of work and idea is this project proposes and approach the 12 detect a currency note be in circular in our country by using their image our project will provide required mobility and compatibility to most of the people and provides a credible accuracy for the fake currency detection we are using machine learning to make it portable and efficient.
The overview of the project is the fake currency detection using machine learning was implemented on matlab features of currency note like serial number security thread identification mark Mahatma Gandhi portrayed what extracted the process star and from image acquisition to calculation of intensity of each extracted feature.
The application the applications are fake currency detection system can be utilised in shops Bank counters and end computerised tailor machine and auto merchant machines and so on the systems are created utilizing diverse techniques and
The future scope of this project is many different adaptation test and innovations have been kept for the future due to lack of time as which a work concerns de per analysis of particular mechanisms new proposal Pride different methods or simply curiosity in future we will be including ammonia for currency conversion and we can implement the system for foreign currencies and tracking of device location through which the currency scan and maintain the same in the database.
Image processing based girth monitoring and recording system for rubber plant...sipij
Measuring the girth and continuous monitoring of the increase in girth is one of the most important processes in rubber plantations since identification of girth deficiencies would enable planters to take corrective actions to ensure a good yield from the plantation.
This research paper presents an image processing based girth measurement & recording system that can replace existing manual process in an efficient and economical manner.
The system uses a digital image of the tree which uses the current number drawn on the tree to identify the tree number & its width. The image is threshold first & then filtered out using several filtering criterion to identify possible candidates for numbers. Identified blobs are then fed to the Tesseract OCR for number recognition. Threshold image is then filtered again with different criterion to segment out the black strip drawn on the tree which is then used to calculate the width of the tree using calibration parameters. Once the tree number is identified & width is calculated the girth the measured girth of the tree is stored in the data base under the identified tree number.
The results obtained from the system indicated significant improvement in efficiency & economy for main plantations. As future developments we are proposing a standard commercial system for girth measurement using standardized 2D Bar Codes as tree identifiers
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
Key Features of The Italian Restaurants.pdfmenafilo317
Filomena, a renowned Italian restaurant, is renowned for its authentic cuisine, warm environment, and exceptional service. Recognized for its homemade pasta, traditional dishes, and extensive wine selection, we provide a true taste of Italy. Its commitment to quality ingredients and classic recipes has made it a adored dining destination for Italian food enthusiasts.
At Taste Of Middle East, we believe that food is not just about satisfying hunger, it's about experiencing different cultures and traditions. Our restaurant concept is based on selecting famous dishes from Iran, Turkey, Afghanistan, and other Arabic countries to give our customers an authentic taste of the Middle East
Piccola Cucina is regarded as the best restaurant in Brooklyn and as the best Italian restaurant in NYC. We offer authentic Italian cuisine with a Sicilian touch that elevates the entire fine dining experience. We’re the first result when someone searches for where to eat in Brooklyn or the best restaurant near me.
Ang Chong Yi Navigating Singaporean Flavors: A Journey from Cultural Heritage...Ang Chong Yi
In the heart of Singapore, where tradition meets modernity, He embarks on a culinary adventure that transcends borders. His mission? Ang Chong Yi Exploring the Cultural Heritage and Identity in Singaporean Cuisine. To explore the rich tapestry of flavours that define Singaporean cuisine while embracing innovative plant-based approaches. Join us as we follow his footsteps through bustling markets, hidden hawker stalls, and vibrant street corners.
Roti Bank Hyderabad: A Beacon of Hope and NourishmentRoti Bank
One of the top cities of India, Hyderabad is the capital of Telangana and home to some of the biggest companies. But the other aspect of the city is a huge chunk of population that is even deprived of the food and shelter. There are many people in Hyderabad that are not having access to
Roti Bank Hyderabad: A Beacon of Hope and Nourishment
fake5.pdf.pdf
1. IOP Conference Series: Materials Science and Engineering
PAPER • OPEN ACCESS
Fake currency detection using image processing
To cite this article: Tushar Agasti et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 263 052047
View the article online for updates and enhancements.
You may also like
Quantum versus classical generative
modelling in finance
Brian Coyle, Maxwell Henderson, Justin
Chan Jin Le et al.
-
Highly efficient, stable and bright blue
phosphorescent ink to prevent counterfeit
of currency and merchandise barcodes
Vishnu V Jaiswal and D Haranath
-
Mechanism to disinfect money to prevent
COVID-19
Pal Saikat, Sarthak Chatterjee, Dey
Sankha et al.
-
This content was downloaded from IP address 47.31.98.183 on 04/09/2022 at 14:24
2. 1
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
Fake currency detection using image processing
Tushar Agasti, Gajanan Burand, Pratik Wade and P Chitra
School of Electronics Engineering, VIT University, Vellore 632014, Tamil Nadu, India
E-mail: chitra.p@vit.ac.in
.
Abstract. The advancement of color printing technology has increased the rate of fake currency
note printing and duplicating the notes on a very large scale. Few years back, the printing could
be done in a print house, but now anyone can print a currency note with maximum accuracy
using a simple laser printer. As a result the issue of fake notes instead of the genuine ones has
been increased very largely. India has been unfortunately cursed with the problems like
corruption and black money .And counterfeit of currency notes is also a big problem to it. This
leads to design of a system that detects the fake currency note in a less time and in a more
efficient manner. The proposed system gives an approach to verify the Indian currency notes.
Verification of currency note is done by the concepts of image processing. This article describes
extraction of various features of Indian currency notes. MATLAB software is used to extract the
features of the note. The proposed system has got advantages like simplicity and high
performance speed. The result will predict whether the currency note is fake or not.
1. Introduction
Technology is growing very fast these days. Consequently the banking sector is also getting modern day
by day. This brings a deep need of automatic fake currency detection in automatic teller machine and
automatic goods seller machine. Many researchers have been encouraged to develop robust and efficient
automatic currency detection machine [1-5]. Automatic machine which can detect banknotes are now
widely used in dispensers of modern products like candies, soft drinks bottle to bus or railway tickets. The
technology of currency recognition basically aims for identifying and extracting visible and invisible
features of currency notes. Until now, many techniques have been proposed to identify the currency note.
But the best way is to use the visible features of the note [1]. For example, color and size. But this way is
not helpful if the note is dirty or torn. If a note is dirty, its color characteristic are changed widely.
So it is important that how we extract the features of the image of the currency note and apply proper
algorithm to improve accuracy to recognize the note.
We apply here a simple algorithm which works properly. The image of the currency note is captured
through a digital camera. The hidden features of the note are highlighted in the ultraviolet light. Now
3. 2
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
processing on the image is done on that acquired image using concepts like image segmentation, edge
information of image and characteristics feature extraction[2-3]. MATLAB is the perfect tool for
computational work, and analysis. Feature extraction of images is challenging task in digital image
processing. It involves extraction of invisible and visible features of Indian currency notes. This approach
consists of different steps like image acquisition, edge detection, gray scale conversion, feature extraction,
image segmentation and decision making [4-5]. Acquisition of image is process of creating digital
images, from a physical scene. Here, the image is captured by a simple digital camera such that all the
features are highlighted. Image is then stored for further processing.
1.1.Process of Edge detection
It is a basic tool in image processing. It is widely used in area of feature detection and extraction. This
process aim at identifying point in digital image at which image brightness sharply changes.
1.2 Process of Image segmentation
This process sub divides image into it sub regions. The level of division depends on the problem.
Segmentation algorithm for images which are monochromatic is based on properties of images like
discontinuity and similarity [6].
2. Methodology
The system proposed here work here on the image of currency note under ultraviolet light acquired by a
digital camera. The algorithm which is applied here is as follows
1. Acquisition of image of currency note under ultraviolet light by simple digital camera or scanner.
2. Image acquired is RGB image and now is converted to grayscale image.
3. Edge detection of whole gray scale image.
4. Now characteristics features of the paper currency will be cropped and segmented.
5. After segmentation, characteristics of currency note are extracted.
6. Intensity of each feature is calculated.
7. If the condition is satisfied, then the currency note is said as original otherwise fake.
In this method, characteristics of currencies are employed which are used by common people for
differentiating for different banknote denomination. The characteristics that can be used to check the
authentication of currency note are
A. Security Thread
It is a 3mm windowed security thread with inscriptions of India in Hindi, RBI and 2000/500 on
banknotes with color shift. Color of the thread changes from green to blue when the note is tilted.
B. Serial Number
Serial number panel with banknote number growing from small to big on the top left side and
bottom right side.
C. Latent image
A vertical band on front side of denomination at right hand size. It contains latent image showing
numeral of denomination when banknote is held horizontally at eye level.
D. Watermark
The portrait of Mahatma Gandhi, and multidirectional lines and a mark showing the
denominational numeral appear which can be viewed when held against light.
4. 3
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
E. Identification Mark A mark with intaglio print which can be felt by touch, helps blind person
to identify the denomination. In 500 denomination the mark is of five lines while in 2000 line the
mark is of seven lines.
The flow diagram of the process to be followed in the proposed system is as follows:-
Figure 1. Flow diagram of process.
1) Image acquisition:
The image is kept under ultraviolet light and the image is captured through a simple digital
camera
Figure 2. Acquired image.
5. 4
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
2) Image preprocessing:
It involves the operations required prior to data analysis and information extraction. Here image
resizing is done.
3) Gray scale conversion and edge detection:
The acquired image is obtained as RGB image which is now converted into gray scale image
since it carries intensity information. This image is further processed and edges of gray scale
images are detected.
Figure 3.Gray scale image
4) Image segmentation:
It’s the process of dividing image into multiple parts by cropping it.
5) Feature extraction:
Now the features are extracted using edge based segmentation.
Figure 4. Identification mark
Figure 5. Edge based segmentation of Mahatma Gandhi portrait.
6. 5
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
Figure 6.Edge based segmentation of security thread.
Figure 7. Edge based segmentation of serial number
6) Now the process of calculation of intensity of each extracted feature is done. If the calculated
intensity is greater than the threshold of 70%, then it is classified as original note otherwise it is
considered as fake one.
7) The final decision depends upon the intensities of all extracted features.
7. 6
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
Figure 8. Flow chart for decision making
3. Experimental results
The results are shown in a GUI made in MATLAB which shows extracted features like security thread
and serial number.
Figure 9. Testing a 500 denomination note.
Figure 10. Testing a 2000 denomination note.
8. 7
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
Intensities of all remaining features were also calculated for different notes of 500 and 2000.
Table 1. Results for 500-1 note
Features Intensity
Serial number
Security thread
Mahatma Gandhi portrait
Identification mark
93%
82%
83%
80%
Table 2. Results for 500-2 note
Features Intensity
Serial number
Security thread
Mahatma Gandhi portrait
Identification mark
76%
73%
60%
68%
Table 3. Results for 2000 note
Features Intensity
Serial number
Security thread
Mahatma Gandhi portrait
Identification mark
75%
82%
86%
73%
From the above results it was observed clearly that an original currency note’s extracted features displays
minimum intensity of 70%, it is seen that the 500-2 note displays intensity less than 75% for some
features hence it is considered as fake note.
4. Conclusion
The fake currency detection using image processing was implemented on MATLAB. Features of currency
note like serial number, security thread, Identification mark, Mahatma Gandhi portrait were extracted.
The process starts from image acquisition to calculation of intensity of each extracted feature. The system
is capable of extracting features even if the note has scribbles on it. The algorithm processed here works
suitably for the newly introduced 500 and 2000 denomination.. Hardware implementation of the proposed
system can also be done using suitable processor so that to increase the speed of detection. An automatic
railway ticket booking system can also be proposed which includes currency detection as one of its part.
9. 8
1234567890
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 052047 doi:10.1088/1757-899X/263/5/052047
References
[1] Trupti Pathrabe G and Swapnili Karmore 2011 Int. J. CompTrends Tech 152-156
[2] Tanaka M, Takeda F, Ohkouchi K and Michiyuk 1998 IEEE Tran on Neural Network 1748-
53.
[3] Jahangir N, Ahsan Raja Chowdhury 2007 IEEE 10th Int. Conf. on Computer and Information
Technology 1-5.
[4] Rubeena Mirza, Vinti Nanda 2012 IFRSA Int.J. Computing 2 375-80
[5] Junfang Guo, Yanyun Zhao and Anni Cai 2010 Proc IEEE Int. Conf Network Infrastructure and
Digital Content 359-363.
[6] Deborah M, Soniya C and Prathap 2014 Int J Innov Sci Engg & Tech 1 151-57.