SlideShare una empresa de Scribd logo
1 de 24
Project On
Recognition of fake currency using image processing
Presented by : Under the guidance of
B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar
M.K.Harika - 18001A0410 Assistant Professor Adhoc
B.V.Sumathi - 19005A0403 Department of ECE
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY
ANANTAPUR
ANANTAPURAMU – 515002, AP, INDIA
Contents:
1.Aim of The Project
2.Introduction
3.Scope of Work and Idea
4.Overview of The Project
5.Flow chart
6.Steps involved
7.Features involved
8.Block diagram
9.Results
10.Novelty of project
11.Advantages
12.Limitations
13.Applications
14.Conclusions
15.Future scope
16.References
Aim of the project:
 The technology of currency recognition basically aims for identifying and extracting visible
and invisible features of currency notes. Until now, many techniques have been proposed to
identify the currency note. But the best way is to use the visible features of the note for
example, color and size.
Introduction:
 Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly
circulated in the economy . These days technology is been growing very fast. Consequently
the banking sector is also getting modern day by day. Currency duplication also known as
counterfeit currency is a vulnerable threat on economy.
 In the proposed model , acquired image of currency note is checked whether it is fake or
real on the basis of counting the number of interruptions in the security thread. The camera
pictures are noted and analysed by MATLAB program installed on computer.
Problem statement:
 The counterfeiters nowadays, can evade the chemical property & physical feature based
counterfeit paper currency detection system due to technological advancement.
 The circulation of a large amount of fake currency increases the amount of money in
circulation, which may lead to high demand for goods and commodities. The rise in
demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This
leads to currency devaluation
Scope of work and idea:
 This project proposes an approach that will detect fake currency note being circulated in
our country by using their image. Our project will provide required mobility and
compatibility to most of the people and provides credible accuracy for the fake currency
detection. We are using machine learning to make it portable and efficient.
Overview of the project:
 The fake currency detection using machine learning was implemented on MATLAB.
Features of currency note like serial number, security thread, Identification mark, Mahatma
Gandhi portrait were extracted. The process starts from image acquisition to calculation of
intensity of each extracted feature.
Flowchart:
Image Acquisition
Preprocessing
Initial Segmentation
Post-processing
Gray Scale Conversion
Feature extraction
Result-Fake or Real
Steps involved :
 Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is
given as a path as a input. It also checks the over all image which is given as input. It selects the required
features to proceed for the further processing.
 Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of
abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of
the image data that suppresses unwanted distortions or enhances some image features essential for further
processing.
 Initial Segmentation : In this step we divide an image into various parts that have similar attributes which
are called as image objects. It is the first step for image analysis
Continuation..
 Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones,
saturation and light levels. It also checks the true and fake pixels of the image.
 Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter
background and also helps in checking the black strips of the real note . It also detects exact features of
the note after converting the image into gray scaling.
 Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the
note is fake or real . In the over all processing each step is having the unique way of extracting the
features of the real and fake note.
Features involved:
 Contrast : The difference in brightness between light and dark areas of image. Contrast determines the
number of shades in the image.
 Energy : It is the distances of some quality between the pixels of some locality
 Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is
homogenous if each pixel in the image has the same color .
 Mean : Mean value is the sum of pixel values divided by the total number of pixel values.
 Entropy : Entropy is a measure of image information content, which is interpreted as the average
uncertainity of information source. It is defined as corresponding states of intensity level which individual
pixels can adapt.
Continuation:
 RMS : To get an estimate of the similarity between source image and the segmented image, we use root
mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.
 Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or
variation about the target value of light intensity at each such data point
 Variance : The variance gives an idea how the pixel values are spread.
 Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of
constant intensity and low for regions with large excursions in the values of its intensity levels.
 IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an
image
Block Diagram:
EXTRACTING
FEATURES
DISPLAY RESULTS
INPUT
Pre-
Processing
Grey Scale
Conversion
Edge
Detection
Segmentation
User
Image SVM Data
set
Technique used:
Support Vector Machine
 Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms,
which is used for Classification as well as Regression problems.
 Support vector machines (SVMs) are a set of supervised learning methods used
for classification, regression and outliers detection.
 The advantages of support vector machines are: Effective in high dimensional spaces. Still
effective in cases where number of dimensions is greater than the number of samples.
Results:
Figure. Original image Figure. BW image Figure. Masked RGB image
Figure. Genuine image
Figure. HSV image
Genuine note:
Fake note:
Figure. Fake image
Figure. HSV image
Figure. Original image Figure.BW image Figure.Masked RGB image
Novelty of project:
 Detection of the fake currency note is done by counting the number of interruptions in the
thread line.
 Predicts whether the note is real or fake on the basis of number of interruptions.
 If the number of interruption is zero, then it is real note otherwise it is fake note. And also
we calculate the entropy of the currency notes for the efficient detection of fake
currency note.
 MATLAB software is used to detect the fake currency note.
Advantages:
 High performance speed
 Simplicity
 Removal of unnecessary data in image
Limitations:
 Input limitation
 Accuracy
 Lighting limitation
Applications:
 Fake currency detection system can be utilized in shops, bank counters and in computerized
teller machine, auto merchant machines and so on.
 The systems are created utilizing diverse techniques and algorithms.
Conclusion :
 The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by
counterfeiting of bank notes.
 With improvement of recent banking services, automatic methods for paper currency recognition
become vital in many applications such as in ATM and automatic goods seller machines.
 The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also
shows the techniques for currency recognition using image processing.
 The Indian currency notes have been identified and counterfeit notes has been found. This work is done
by using various filters. This method is very easy to implement in real time world. At last we have
concluded that if we propose some efficient preprocessing and feature extraction method then we can
improve the accuracy of identification system. We can also develop app for detection of fake currency.
Future scope:
Many different adaptations, tests and innovations have been kept for the future due
to the lack of time. As future work concerns deeper analysis of particular mechanisms, new
proposals to try different methods or simple curiosity.
 1. In future we would be including a module for currency conversion.
 2. We can implement the system for foreign currencies.
 3. Tracking of device’s location through which the currency is scanned and maintaining the
same in the database.
References :
 Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For
Technological Research In Engineering, vol. 1, no. 11, July 2014.
 B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING
SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.
 W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape
Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June
2016.
 Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake
currency is detected manually.
THANK YOU!!!

Más contenido relacionado

La actualidad más candente

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Image texture analysis techniques survey-1
Image texture analysis techniques  survey-1Image texture analysis techniques  survey-1
Image texture analysis techniques survey-1
anitadixitjoshi
 

La actualidad más candente (20)

Paper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processingPaper currency recognigation with counterfeit detection using image processing
Paper currency recognigation with counterfeit detection using image processing
 
MAJOR PROJECT
MAJOR PROJECT MAJOR PROJECT
MAJOR PROJECT
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
Passive stereo vision with deep learning
Passive stereo vision with deep learningPassive stereo vision with deep learning
Passive stereo vision with deep learning
 
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationUNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentation
 
3D reconstruction
3D reconstruction3D reconstruction
3D reconstruction
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Graph representation learning to prevent payment collusion fraud
Graph representation learning to prevent payment collusion fraudGraph representation learning to prevent payment collusion fraud
Graph representation learning to prevent payment collusion fraud
 
Neural style transfer
Neural style transferNeural style transfer
Neural style transfer
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Biometrics
BiometricsBiometrics
Biometrics
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Counterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image ProcessingCounterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image Processing
 
Lidar for Autonomous Driving II (via Deep Learning)
Lidar for Autonomous Driving II (via Deep Learning)Lidar for Autonomous Driving II (via Deep Learning)
Lidar for Autonomous Driving II (via Deep Learning)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Image texture analysis techniques survey-1
Image texture analysis techniques  survey-1Image texture analysis techniques  survey-1
Image texture analysis techniques survey-1
 
Presentation on Neural Style Transfer
Presentation on Neural Style TransferPresentation on Neural Style Transfer
Presentation on Neural Style Transfer
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Image Annotation
Image AnnotationImage Annotation
Image Annotation
 

Similar a Project on fake currency recognition using image processing ppt final (3).pptx

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Similar a Project on fake currency recognition using image processing ppt final (3).pptx (20)

Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using Matlab
 
Currency validation system using mobile
Currency validation system using mobileCurrency validation system using mobile
Currency validation system using mobile
 
IRJET - Fake Currency Detection using CNN
IRJET -  	  Fake Currency Detection using CNNIRJET -  	  Fake Currency Detection using CNN
IRJET - Fake Currency Detection using CNN
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
1304.2109
1304.21091304.2109
1304.2109
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 
K1802027780
K1802027780K1802027780
K1802027780
 
Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360
 

Último

Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Último (20)

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 

Project on fake currency recognition using image processing ppt final (3).pptx

  • 1. Project On Recognition of fake currency using image processing Presented by : Under the guidance of B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar M.K.Harika - 18001A0410 Assistant Professor Adhoc B.V.Sumathi - 19005A0403 Department of ECE JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR ANANTAPURAMU – 515002, AP, INDIA
  • 2. Contents: 1.Aim of The Project 2.Introduction 3.Scope of Work and Idea 4.Overview of The Project 5.Flow chart 6.Steps involved 7.Features involved 8.Block diagram 9.Results 10.Novelty of project 11.Advantages 12.Limitations 13.Applications 14.Conclusions 15.Future scope 16.References
  • 3. Aim of the project:  The technology of currency recognition basically aims for identifying and extracting visible and invisible features of currency notes. Until now, many techniques have been proposed to identify the currency note. But the best way is to use the visible features of the note for example, color and size.
  • 4. Introduction:  Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly circulated in the economy . These days technology is been growing very fast. Consequently the banking sector is also getting modern day by day. Currency duplication also known as counterfeit currency is a vulnerable threat on economy.  In the proposed model , acquired image of currency note is checked whether it is fake or real on the basis of counting the number of interruptions in the security thread. The camera pictures are noted and analysed by MATLAB program installed on computer.
  • 5. Problem statement:  The counterfeiters nowadays, can evade the chemical property & physical feature based counterfeit paper currency detection system due to technological advancement.  The circulation of a large amount of fake currency increases the amount of money in circulation, which may lead to high demand for goods and commodities. The rise in demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This leads to currency devaluation
  • 6. Scope of work and idea:  This project proposes an approach that will detect fake currency note being circulated in our country by using their image. Our project will provide required mobility and compatibility to most of the people and provides credible accuracy for the fake currency detection. We are using machine learning to make it portable and efficient.
  • 7. Overview of the project:  The fake currency detection using machine learning was implemented on MATLAB. Features of currency note like serial number, security thread, Identification mark, Mahatma Gandhi portrait were extracted. The process starts from image acquisition to calculation of intensity of each extracted feature.
  • 8. Flowchart: Image Acquisition Preprocessing Initial Segmentation Post-processing Gray Scale Conversion Feature extraction Result-Fake or Real
  • 9. Steps involved :  Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is given as a path as a input. It also checks the over all image which is given as input. It selects the required features to proceed for the further processing.  Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of the image data that suppresses unwanted distortions or enhances some image features essential for further processing.  Initial Segmentation : In this step we divide an image into various parts that have similar attributes which are called as image objects. It is the first step for image analysis
  • 10. Continuation..  Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones, saturation and light levels. It also checks the true and fake pixels of the image.  Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter background and also helps in checking the black strips of the real note . It also detects exact features of the note after converting the image into gray scaling.  Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the note is fake or real . In the over all processing each step is having the unique way of extracting the features of the real and fake note.
  • 11. Features involved:  Contrast : The difference in brightness between light and dark areas of image. Contrast determines the number of shades in the image.  Energy : It is the distances of some quality between the pixels of some locality  Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is homogenous if each pixel in the image has the same color .  Mean : Mean value is the sum of pixel values divided by the total number of pixel values.  Entropy : Entropy is a measure of image information content, which is interpreted as the average uncertainity of information source. It is defined as corresponding states of intensity level which individual pixels can adapt.
  • 12. Continuation:  RMS : To get an estimate of the similarity between source image and the segmented image, we use root mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.  Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or variation about the target value of light intensity at each such data point  Variance : The variance gives an idea how the pixel values are spread.  Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of constant intensity and low for regions with large excursions in the values of its intensity levels.  IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an image
  • 13. Block Diagram: EXTRACTING FEATURES DISPLAY RESULTS INPUT Pre- Processing Grey Scale Conversion Edge Detection Segmentation User Image SVM Data set
  • 14. Technique used: Support Vector Machine  Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms, which is used for Classification as well as Regression problems.  Support vector machines (SVMs) are a set of supervised learning methods used for classification, regression and outliers detection.  The advantages of support vector machines are: Effective in high dimensional spaces. Still effective in cases where number of dimensions is greater than the number of samples.
  • 15. Results: Figure. Original image Figure. BW image Figure. Masked RGB image Figure. Genuine image Figure. HSV image Genuine note:
  • 16. Fake note: Figure. Fake image Figure. HSV image Figure. Original image Figure.BW image Figure.Masked RGB image
  • 17. Novelty of project:  Detection of the fake currency note is done by counting the number of interruptions in the thread line.  Predicts whether the note is real or fake on the basis of number of interruptions.  If the number of interruption is zero, then it is real note otherwise it is fake note. And also we calculate the entropy of the currency notes for the efficient detection of fake currency note.  MATLAB software is used to detect the fake currency note.
  • 18. Advantages:  High performance speed  Simplicity  Removal of unnecessary data in image
  • 19. Limitations:  Input limitation  Accuracy  Lighting limitation
  • 20. Applications:  Fake currency detection system can be utilized in shops, bank counters and in computerized teller machine, auto merchant machines and so on.  The systems are created utilizing diverse techniques and algorithms.
  • 21. Conclusion :  The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by counterfeiting of bank notes.  With improvement of recent banking services, automatic methods for paper currency recognition become vital in many applications such as in ATM and automatic goods seller machines.  The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also shows the techniques for currency recognition using image processing.  The Indian currency notes have been identified and counterfeit notes has been found. This work is done by using various filters. This method is very easy to implement in real time world. At last we have concluded that if we propose some efficient preprocessing and feature extraction method then we can improve the accuracy of identification system. We can also develop app for detection of fake currency.
  • 22. Future scope: Many different adaptations, tests and innovations have been kept for the future due to the lack of time. As future work concerns deeper analysis of particular mechanisms, new proposals to try different methods or simple curiosity.  1. In future we would be including a module for currency conversion.  2. We can implement the system for foreign currencies.  3. Tracking of device’s location through which the currency is scanned and maintaining the same in the database.
  • 23. References :  Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For Technological Research In Engineering, vol. 1, no. 11, July 2014.  B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.  W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June 2016.  Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake currency is detected manually.