SlideShare uma empresa Scribd logo
1 de 24
Project On
Recognition of fake currency using image processing
Presented by : Under the guidance of
B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar
M.K.Harika - 18001A0410 Assistant Professor Adhoc
B.V.Sumathi - 19005A0403 Department of ECE
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY
ANANTAPUR
ANANTAPURAMU – 515002, AP, INDIA
Contents:
1.Aim of The Project
2.Introduction
3.Scope of Work and Idea
4.Overview of The Project
5.Flow chart
6.Steps involved
7.Features involved
8.Block diagram
9.Results
10.Novelty of project
11.Advantages
12.Limitations
13.Applications
14.Conclusions
15.Future scope
16.References
Aim of the project:
 The technology of currency recognition basically aims for identifying and extracting visible
and invisible features of currency notes. Until now, many techniques have been proposed to
identify the currency note. But the best way is to use the visible features of the note for
example, color and size.
Introduction:
 Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly
circulated in the economy . These days technology is been growing very fast. Consequently
the banking sector is also getting modern day by day. Currency duplication also known as
counterfeit currency is a vulnerable threat on economy.
 In the proposed model , acquired image of currency note is checked whether it is fake or
real on the basis of counting the number of interruptions in the security thread. The camera
pictures are noted and analysed by MATLAB program installed on computer.
Problem statement:
 The counterfeiters nowadays, can evade the chemical property & physical feature based
counterfeit paper currency detection system due to technological advancement.
 The circulation of a large amount of fake currency increases the amount of money in
circulation, which may lead to high demand for goods and commodities. The rise in
demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This
leads to currency devaluation
Scope of work and idea:
 This project proposes an approach that will detect fake currency note being circulated in
our country by using their image. Our project will provide required mobility and
compatibility to most of the people and provides credible accuracy for the fake currency
detection. We are using machine learning to make it portable and efficient.
Overview of the project:
 The fake currency detection using machine learning was implemented on MATLAB.
Features of currency note like serial number, security thread, Identification mark, Mahatma
Gandhi portrait were extracted. The process starts from image acquisition to calculation of
intensity of each extracted feature.
Flowchart:
Image Acquisition
Preprocessing
Initial Segmentation
Post-processing
Gray Scale Conversion
Feature extraction
Result-Fake or Real
Steps involved :
 Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is
given as a path as a input. It also checks the over all image which is given as input. It selects the required
features to proceed for the further processing.
 Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of
abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of
the image data that suppresses unwanted distortions or enhances some image features essential for further
processing.
 Initial Segmentation : In this step we divide an image into various parts that have similar attributes which
are called as image objects. It is the first step for image analysis
Continuation..
 Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones,
saturation and light levels. It also checks the true and fake pixels of the image.
 Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter
background and also helps in checking the black strips of the real note . It also detects exact features of
the note after converting the image into gray scaling.
 Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the
note is fake or real . In the over all processing each step is having the unique way of extracting the
features of the real and fake note.
Features involved:
 Contrast : The difference in brightness between light and dark areas of image. Contrast determines the
number of shades in the image.
 Energy : It is the distances of some quality between the pixels of some locality
 Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is
homogenous if each pixel in the image has the same color .
 Mean : Mean value is the sum of pixel values divided by the total number of pixel values.
 Entropy : Entropy is a measure of image information content, which is interpreted as the average
uncertainity of information source. It is defined as corresponding states of intensity level which individual
pixels can adapt.
Continuation:
 RMS : To get an estimate of the similarity between source image and the segmented image, we use root
mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.
 Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or
variation about the target value of light intensity at each such data point
 Variance : The variance gives an idea how the pixel values are spread.
 Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of
constant intensity and low for regions with large excursions in the values of its intensity levels.
 IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an
image
Block Diagram:
EXTRACTING
FEATURES
DISPLAY RESULTS
INPUT
Pre-
Processing
Grey Scale
Conversion
Edge
Detection
Segmentation
User
Image SVM Data
set
Technique used:
Support Vector Machine
 Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms,
which is used for Classification as well as Regression problems.
 Support vector machines (SVMs) are a set of supervised learning methods used
for classification, regression and outliers detection.
 The advantages of support vector machines are: Effective in high dimensional spaces. Still
effective in cases where number of dimensions is greater than the number of samples.
Results:
Figure. Original image Figure. BW image Figure. Masked RGB image
Figure. Genuine image
Figure. HSV image
Genuine note:
Fake note:
Figure. Fake image
Figure. HSV image
Figure. Original image Figure.BW image Figure.Masked RGB image
Novelty of project:
 Detection of the fake currency note is done by counting the number of interruptions in the
thread line.
 Predicts whether the note is real or fake on the basis of number of interruptions.
 If the number of interruption is zero, then it is real note otherwise it is fake note. And also
we calculate the entropy of the currency notes for the efficient detection of fake
currency note.
 MATLAB software is used to detect the fake currency note.
Advantages:
 High performance speed
 Simplicity
 Removal of unnecessary data in image
Limitations:
 Input limitation
 Accuracy
 Lighting limitation
Applications:
 Fake currency detection system can be utilized in shops, bank counters and in computerized
teller machine, auto merchant machines and so on.
 The systems are created utilizing diverse techniques and algorithms.
Conclusion :
 The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by
counterfeiting of bank notes.
 With improvement of recent banking services, automatic methods for paper currency recognition
become vital in many applications such as in ATM and automatic goods seller machines.
 The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also
shows the techniques for currency recognition using image processing.
 The Indian currency notes have been identified and counterfeit notes has been found. This work is done
by using various filters. This method is very easy to implement in real time world. At last we have
concluded that if we propose some efficient preprocessing and feature extraction method then we can
improve the accuracy of identification system. We can also develop app for detection of fake currency.
Future scope:
Many different adaptations, tests and innovations have been kept for the future due
to the lack of time. As future work concerns deeper analysis of particular mechanisms, new
proposals to try different methods or simple curiosity.
 1. In future we would be including a module for currency conversion.
 2. We can implement the system for foreign currencies.
 3. Tracking of device’s location through which the currency is scanned and maintaining the
same in the database.
References :
 Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For
Technological Research In Engineering, vol. 1, no. 11, July 2014.
 B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING
SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.
 W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape
Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June
2016.
 Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake
currency is detected manually.
THANK YOU!!!

Mais conteúdo relacionado

Mais procurados

Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalBiniam Asnake
 
01 introduction image processing analysis
01 introduction image processing analysis01 introduction image processing analysis
01 introduction image processing analysisRumah Belajar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Digital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial DomainDigital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial DomainMostafa G. M. Mostafa
 
Optical Character Reader - Project Report BTech
Optical Character Reader - Project Report BTechOptical Character Reader - Project Report BTech
Optical Character Reader - Project Report BTechKushagraChadha1
 
Medical image analysis
Medical image analysisMedical image analysis
Medical image analysisGichelle Amon
 
Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Divya Gera
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesShailesh kumar
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingSavitaHanchinal
 
Image processing python
Image processing pythonImage processing python
Image processing pythonYAZIDI Imran
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basicsShilpa Sharma
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Vidyut Singhania
 
Overview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryOverview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryTanvir Moin
 
DIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESDIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESEzhilya venkat
 
OCR Presentation (Optical Character Recognition)
OCR Presentation (Optical Character Recognition)OCR Presentation (Optical Character Recognition)
OCR Presentation (Optical Character Recognition)Neeraj Neupane
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 

Mais procurados (20)

Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based Retrieval
 
01 introduction image processing analysis
01 introduction image processing analysis01 introduction image processing analysis
01 introduction image processing analysis
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Digital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial DomainDigital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial Domain
 
Optical Character Reader - Project Report BTech
Optical Character Reader - Project Report BTechOptical Character Reader - Project Report BTech
Optical Character Reader - Project Report BTech
 
Medical image analysis
Medical image analysisMedical image analysis
Medical image analysis
 
Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated images
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
3d printing
3d printing3d printing
3d printing
 
Image processing python
Image processing pythonImage processing python
Image processing python
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basics
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
Overview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryOverview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear Industry
 
DIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTESDIGITAL IMAGE PROCESSING - LECTURE NOTES
DIGITAL IMAGE PROCESSING - LECTURE NOTES
 
OCR Presentation (Optical Character Recognition)
OCR Presentation (Optical Character Recognition)OCR Presentation (Optical Character Recognition)
OCR Presentation (Optical Character Recognition)
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 

Semelhante a Project on fake currency recognition using image processing ppt final (3).pptx

Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processingFatima Akhtar
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistanceijscai
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds IJSCAI Journal
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSijscai
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using MatlabIRJET Journal
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
Currency validation system using mobile
Currency validation system using mobileCurrency validation system using mobile
Currency validation system using mobileAhmed Akl
 
IRJET - Fake Currency Detection using CNN
IRJET -  	  Fake Currency Detection using CNNIRJET -  	  Fake Currency Detection using CNN
IRJET - Fake Currency Detection using CNNIRJET Journal
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image ProcessingIRJET Journal
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detectionijtsrd
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET Journal
 

Semelhante a Project on fake currency recognition using image processing ppt final (3).pptx (20)

Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using Matlab
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Currency validation system using mobile
Currency validation system using mobileCurrency validation system using mobile
Currency validation system using mobile
 
IRJET - Fake Currency Detection using CNN
IRJET -  	  Fake Currency Detection using CNNIRJET -  	  Fake Currency Detection using CNN
IRJET - Fake Currency Detection using CNN
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
1304.2109
1304.21091304.2109
1304.2109
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 

Último

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Dr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptxDr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptxProfAAMiraje
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 

Último (20)

Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Dr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptxDr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptx
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 

Project on fake currency recognition using image processing ppt final (3).pptx

  • 1. Project On Recognition of fake currency using image processing Presented by : Under the guidance of B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar M.K.Harika - 18001A0410 Assistant Professor Adhoc B.V.Sumathi - 19005A0403 Department of ECE JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR ANANTAPURAMU – 515002, AP, INDIA
  • 2. Contents: 1.Aim of The Project 2.Introduction 3.Scope of Work and Idea 4.Overview of The Project 5.Flow chart 6.Steps involved 7.Features involved 8.Block diagram 9.Results 10.Novelty of project 11.Advantages 12.Limitations 13.Applications 14.Conclusions 15.Future scope 16.References
  • 3. Aim of the project:  The technology of currency recognition basically aims for identifying and extracting visible and invisible features of currency notes. Until now, many techniques have been proposed to identify the currency note. But the best way is to use the visible features of the note for example, color and size.
  • 4. Introduction:  Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly circulated in the economy . These days technology is been growing very fast. Consequently the banking sector is also getting modern day by day. Currency duplication also known as counterfeit currency is a vulnerable threat on economy.  In the proposed model , acquired image of currency note is checked whether it is fake or real on the basis of counting the number of interruptions in the security thread. The camera pictures are noted and analysed by MATLAB program installed on computer.
  • 5. Problem statement:  The counterfeiters nowadays, can evade the chemical property & physical feature based counterfeit paper currency detection system due to technological advancement.  The circulation of a large amount of fake currency increases the amount of money in circulation, which may lead to high demand for goods and commodities. The rise in demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This leads to currency devaluation
  • 6. Scope of work and idea:  This project proposes an approach that will detect fake currency note being circulated in our country by using their image. Our project will provide required mobility and compatibility to most of the people and provides credible accuracy for the fake currency detection. We are using machine learning to make it portable and efficient.
  • 7. Overview of the project:  The fake currency detection using machine learning was implemented on MATLAB. Features of currency note like serial number, security thread, Identification mark, Mahatma Gandhi portrait were extracted. The process starts from image acquisition to calculation of intensity of each extracted feature.
  • 8. Flowchart: Image Acquisition Preprocessing Initial Segmentation Post-processing Gray Scale Conversion Feature extraction Result-Fake or Real
  • 9. Steps involved :  Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is given as a path as a input. It also checks the over all image which is given as input. It selects the required features to proceed for the further processing.  Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of the image data that suppresses unwanted distortions or enhances some image features essential for further processing.  Initial Segmentation : In this step we divide an image into various parts that have similar attributes which are called as image objects. It is the first step for image analysis
  • 10. Continuation..  Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones, saturation and light levels. It also checks the true and fake pixels of the image.  Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter background and also helps in checking the black strips of the real note . It also detects exact features of the note after converting the image into gray scaling.  Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the note is fake or real . In the over all processing each step is having the unique way of extracting the features of the real and fake note.
  • 11. Features involved:  Contrast : The difference in brightness between light and dark areas of image. Contrast determines the number of shades in the image.  Energy : It is the distances of some quality between the pixels of some locality  Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is homogenous if each pixel in the image has the same color .  Mean : Mean value is the sum of pixel values divided by the total number of pixel values.  Entropy : Entropy is a measure of image information content, which is interpreted as the average uncertainity of information source. It is defined as corresponding states of intensity level which individual pixels can adapt.
  • 12. Continuation:  RMS : To get an estimate of the similarity between source image and the segmented image, we use root mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.  Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or variation about the target value of light intensity at each such data point  Variance : The variance gives an idea how the pixel values are spread.  Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of constant intensity and low for regions with large excursions in the values of its intensity levels.  IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an image
  • 13. Block Diagram: EXTRACTING FEATURES DISPLAY RESULTS INPUT Pre- Processing Grey Scale Conversion Edge Detection Segmentation User Image SVM Data set
  • 14. Technique used: Support Vector Machine  Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms, which is used for Classification as well as Regression problems.  Support vector machines (SVMs) are a set of supervised learning methods used for classification, regression and outliers detection.  The advantages of support vector machines are: Effective in high dimensional spaces. Still effective in cases where number of dimensions is greater than the number of samples.
  • 15. Results: Figure. Original image Figure. BW image Figure. Masked RGB image Figure. Genuine image Figure. HSV image Genuine note:
  • 16. Fake note: Figure. Fake image Figure. HSV image Figure. Original image Figure.BW image Figure.Masked RGB image
  • 17. Novelty of project:  Detection of the fake currency note is done by counting the number of interruptions in the thread line.  Predicts whether the note is real or fake on the basis of number of interruptions.  If the number of interruption is zero, then it is real note otherwise it is fake note. And also we calculate the entropy of the currency notes for the efficient detection of fake currency note.  MATLAB software is used to detect the fake currency note.
  • 18. Advantages:  High performance speed  Simplicity  Removal of unnecessary data in image
  • 19. Limitations:  Input limitation  Accuracy  Lighting limitation
  • 20. Applications:  Fake currency detection system can be utilized in shops, bank counters and in computerized teller machine, auto merchant machines and so on.  The systems are created utilizing diverse techniques and algorithms.
  • 21. Conclusion :  The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by counterfeiting of bank notes.  With improvement of recent banking services, automatic methods for paper currency recognition become vital in many applications such as in ATM and automatic goods seller machines.  The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also shows the techniques for currency recognition using image processing.  The Indian currency notes have been identified and counterfeit notes has been found. This work is done by using various filters. This method is very easy to implement in real time world. At last we have concluded that if we propose some efficient preprocessing and feature extraction method then we can improve the accuracy of identification system. We can also develop app for detection of fake currency.
  • 22. Future scope: Many different adaptations, tests and innovations have been kept for the future due to the lack of time. As future work concerns deeper analysis of particular mechanisms, new proposals to try different methods or simple curiosity.  1. In future we would be including a module for currency conversion.  2. We can implement the system for foreign currencies.  3. Tracking of device’s location through which the currency is scanned and maintaining the same in the database.
  • 23. References :  Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For Technological Research In Engineering, vol. 1, no. 11, July 2014.  B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.  W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June 2016.  Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake currency is detected manually.