SlideShare a Scribd company logo
Paper currency recognition with counterfeit
detection using image processing
Outline:
Abstract
System Background
System Architecture
System Description
Methods to Detect Fake Notes
Results
Conclusions
Abstract:
It is difficult for people to recognize currencies from
different countries. Our aim is to help people solve
this problem. However, currency recognition systems
that are based on image analysis entirely are not
sufficient. Our system is based on image processing
and makes the process automatic and robust.
System Background:
 The proposed web portal will help common people for
currency recognition anywhere anytime.
 In this approach system extract the general attributes of
the paper currency like various dominant parts of image
of currency note (like identification marks, latent image,
etc..)
 The system will be developed to check different
currency notes of 100, 500 and 1000rupees.
 The system simply extracts feature of currency
which were match with original currency features
and immediately displays result with accuracy.
The features which were considered for
currency recognition are as follows:
1)See Through Register
The floral design has back to back registration. The
design will be seen as one floral design when seen
against the light.
2) Water Marking
The mahatma Gandhi watermark is present on the
bank notes. The mahatma Gandhi watermark is with
a shade effect and multidirectional lines in
watermark
3)Optically Variable Ink
Optically variable ink is used for security feature;
The denomination value is printed with the help of
optical variable ink. The colour of numerical 1000
or 500 appear green, when note is flat but change
the colour to blue when is held In an angle
4)Latent Image
The latent image shows the respective
denomination value in numerical. And is present on
the right side of Mahatma Gandhi portrait on
vertical band.
5)Identification Mark
Each note has its special identification mark.
There are different shapes of identification mark
for different denomination (Rs.100-Triangle,
Rs.500-circle and Rs.1000-Diamond). The
identification mark is present on the left of water
mark
Methods to Detect Fake Notes
There are many system existing for recognition of
fake Indian currency using different technique,
many of the system uses various steps like image
acquisition, feature extraction and classification
system using various algorithm.
There are other fake currency detection techniques:
i)Digital Image Processing Method To Detect Fake
Currency
ii)MATLAB technique
iii)Ultraviolet counterfeit detection scanner.
SYSTEM ARCHITECTURE
Flow Chart of Image Processing Method to Detect Fake Note
Steps
1)Image Acquisition
2) Pre-processing
3) Gray Scale Conversion
4) Edge Detection
5) Image Segmentation
6) Feature Extraction
7) Comparison
8) Output
RESULTS
Result is obtained by performing image processing
Operations. In the system image acquisition is done
by using the camera and acquired image is send to
the processing unit. As shown in the GUI the
acquired image is the test image. Then the test
image is then converted into gray scale image,
segmented image, cropped image and resized
image. Then comparison of cropped and resized
image with the images saved in the data base is
done. Then the result is displayed in the result
panel.
Recognition of Genuine Indian Currency Note
Recognition of Fake Indian Currency Note
CONCLUSION
In this project, detection of fake Indian currency note is
done by using image processing principle. This is the low
cost system. The system works for denomination of 100,
500 and 1000 for Indian currency. The system also
provides accurate and valid results. The process of
detection of fake note is quick and easy. In this system
input is taken by CCD camera and output is displayed on
PC.
Thank you

More Related Content

What's hot

Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 
Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
nitishkumar883951
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
ankit panigrahy
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
AI Computer vision
AI Computer visionAI Computer vision
AI Computer vision
Kashafnaz2
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
ijtsrd
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
Scaleway
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
OCR Text Extraction
OCR Text ExtractionOCR Text Extraction
OCR Text Extraction
Dr. Amarjeet Singh
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
Kalyan Acharjya
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
Justluk Luk
 
Fraud detection
Fraud detectionFraud detection
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
ajmal anbu
 
Computer Vision - Artificial Intelligence
Computer Vision - Artificial IntelligenceComputer Vision - Artificial Intelligence
Computer Vision - Artificial Intelligence
ACM-KU
 
Virtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognitionVirtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognition
MuktiKalsekar
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
Dhanush Kasargod
 
Bitcoin Price Prediction
Bitcoin Price PredictionBitcoin Price Prediction
Bitcoin Price Prediction
Kadambini Indurkar
 
Image recognition
Image recognitionImage recognition
Image recognition
Aseed Usmani
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII
 

What's hot (20)

Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
AI Computer vision
AI Computer visionAI Computer vision
AI Computer vision
 
CREDIT_CARD.ppt
CREDIT_CARD.pptCREDIT_CARD.ppt
CREDIT_CARD.ppt
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
OCR Text Extraction
OCR Text ExtractionOCR Text Extraction
OCR Text Extraction
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Computer Vision - Artificial Intelligence
Computer Vision - Artificial IntelligenceComputer Vision - Artificial Intelligence
Computer Vision - Artificial Intelligence
 
Virtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognitionVirtual Mouse using hand gesture recognition
Virtual Mouse using hand gesture recognition
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Bitcoin Price Prediction
Bitcoin Price PredictionBitcoin Price Prediction
Bitcoin Price Prediction
 
Image recognition
Image recognitionImage recognition
Image recognition
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 

Similar to Paper currency recognigation with counterfeit detection using image processing

Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
IJCERT
 
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET Journal
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
426SahithiBaiMiriska
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
ijscai
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
ijscai
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
IJSCAI Journal
 
ATM Fingerprint.docx
ATM Fingerprint.docxATM Fingerprint.docx
ATM Fingerprint.docx
Anand Krishnan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
Currency Recognition using SIFT algo.pptx
Currency Recognition using SIFT algo.pptxCurrency Recognition using SIFT algo.pptx
Currency Recognition using SIFT algo.pptx
utkarshkumar407391
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
anil badiger
 
IRJET- Note to Coin Exchanger
IRJET-  	  Note to Coin ExchangerIRJET-  	  Note to Coin Exchanger
IRJET- Note to Coin Exchanger
IRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
IRJET Journal
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
Bhavesh SOBHANI
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
IJEID :: International Journal of Excellence Innovation and Development
 
IRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image Processing
IRJET Journal
 

Similar to Paper currency recognigation with counterfeit detection using image processing (20)

Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
 
ATM Fingerprint.docx
ATM Fingerprint.docxATM Fingerprint.docx
ATM Fingerprint.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Currency Recognition using SIFT algo.pptx
Currency Recognition using SIFT algo.pptxCurrency Recognition using SIFT algo.pptx
Currency Recognition using SIFT algo.pptx
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
 
IRJET- Note to Coin Exchanger
IRJET-  	  Note to Coin ExchangerIRJET-  	  Note to Coin Exchanger
IRJET- Note to Coin Exchanger
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
IRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image ProcessingIRJET- Currency Verification using Image Processing
IRJET- Currency Verification using Image Processing
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Paper currency recognigation with counterfeit detection using image processing

  • 1. Paper currency recognition with counterfeit detection using image processing
  • 2. Outline: Abstract System Background System Architecture System Description Methods to Detect Fake Notes Results Conclusions
  • 3. Abstract: It is difficult for people to recognize currencies from different countries. Our aim is to help people solve this problem. However, currency recognition systems that are based on image analysis entirely are not sufficient. Our system is based on image processing and makes the process automatic and robust.
  • 4. System Background:  The proposed web portal will help common people for currency recognition anywhere anytime.  In this approach system extract the general attributes of the paper currency like various dominant parts of image of currency note (like identification marks, latent image, etc..)  The system will be developed to check different currency notes of 100, 500 and 1000rupees.  The system simply extracts feature of currency which were match with original currency features and immediately displays result with accuracy.
  • 5. The features which were considered for currency recognition are as follows: 1)See Through Register The floral design has back to back registration. The design will be seen as one floral design when seen against the light. 2) Water Marking The mahatma Gandhi watermark is present on the bank notes. The mahatma Gandhi watermark is with a shade effect and multidirectional lines in watermark
  • 6. 3)Optically Variable Ink Optically variable ink is used for security feature; The denomination value is printed with the help of optical variable ink. The colour of numerical 1000 or 500 appear green, when note is flat but change the colour to blue when is held In an angle 4)Latent Image The latent image shows the respective denomination value in numerical. And is present on the right side of Mahatma Gandhi portrait on vertical band.
  • 7. 5)Identification Mark Each note has its special identification mark. There are different shapes of identification mark for different denomination (Rs.100-Triangle, Rs.500-circle and Rs.1000-Diamond). The identification mark is present on the left of water mark
  • 8.
  • 9. Methods to Detect Fake Notes There are many system existing for recognition of fake Indian currency using different technique, many of the system uses various steps like image acquisition, feature extraction and classification system using various algorithm. There are other fake currency detection techniques: i)Digital Image Processing Method To Detect Fake Currency ii)MATLAB technique iii)Ultraviolet counterfeit detection scanner.
  • 11. Flow Chart of Image Processing Method to Detect Fake Note
  • 12. Steps 1)Image Acquisition 2) Pre-processing 3) Gray Scale Conversion 4) Edge Detection 5) Image Segmentation 6) Feature Extraction 7) Comparison 8) Output
  • 13. RESULTS Result is obtained by performing image processing Operations. In the system image acquisition is done by using the camera and acquired image is send to the processing unit. As shown in the GUI the acquired image is the test image. Then the test image is then converted into gray scale image, segmented image, cropped image and resized image. Then comparison of cropped and resized image with the images saved in the data base is done. Then the result is displayed in the result panel.
  • 14. Recognition of Genuine Indian Currency Note
  • 15. Recognition of Fake Indian Currency Note
  • 16. CONCLUSION In this project, detection of fake Indian currency note is done by using image processing principle. This is the low cost system. The system works for denomination of 100, 500 and 1000 for Indian currency. The system also provides accurate and valid results. The process of detection of fake note is quick and easy. In this system input is taken by CCD camera and output is displayed on PC.