SlideShare une entreprise Scribd logo
1  sur  14
Counterfeit Currency
Detection
using Image
Processing
Literature Survey
 International Journal of Research on Computer and Communication
Technology (IJRCCT) – “Fake Currency Detection Using Image
Processing and Other Standard Methods”.
 International Journal of Computer Science and Information
Technologies(IJCSIT) – “Indian Currency Denomination Identification
Using Image Processing Technique”
 International Journal of Engineering Science and Innovative Technology
(IJESIT) – “An automatic recognition of fake Indian paper currency note
using MATLAB”
 International Journal of Engineering Research and Development (IJERD) –
“Design and Implementation of Indian Paper Currency Authentication
System Based on Feature Extraction by Edge Based Segmentation
Using Sobel Operator”
Proposed Solution
The solution has been divided into two phases:
 Phase 1: This phase involves work on the image processing
part on a system to detect, isolate, and identify the note and
denomination.
 Phase 2: This phase involves work on the counterfeit analysis
of the note and creation of a usable application and then
integrating it with the result of phase 1.
Implementation
 A paper has already been written on the work done in phase one. Its
summary is as follows:
The paper we proposes a solution that shall help visually impaired
people identify
Indian Currency notes which shall then simplify monetary transactions
for them. The
proposed solution involves doing image processing on an image of a
currency note;
this process has been completed and its test results been elaborated in
this paper.
Furthermore, a small comparison exercise between two edge-detection
techniques
has been done, to decide which among them is best suited for the
image processing
of a currency note. The results of this comparison have also been
shown in this
Implementation
Phase 1 Implementation:
 Template Matching for Note Detection
This step will be used to check whether the input
image contains a currency note or not. We would
store some images known as template in the
database and match the template with the input
image. If there is a match found then further process
will be performed.
 Image Segmentation
Image segmentation shall be done to retrieve only
the currency part of the image. This basically is
removal of background and other unimportant visual
information.
 Feature Extraction
After the image segmentation various features shall
Implementation
The phase 2 consists of two parts:
1. Creation of a Android application using Dropbox APIs
The aim here is to create an Android application that can take the image of
the note and send it to the Image processing system via cloud. The system
would then process the image and send the result (denomination value)
back to the Android device via cloud. The application would then relay the
result to the VI user using audio feedback.
Image
Processin
g System
Cloud which stores
The image and
result
after processing
Image
Gives result
via audio
Connected to
Sends Image
Result of
Image Processing
Implementation
2. Counterfeit analysis of the currency note
In this module we intend to create a system application whose
aim is to authenticate an Indian currency note. The
application would use image processing and utilize various
inherently present security features in the Indian currency
note to achieve its goal. Security features such as
Fluorescence, Security Thread, Serial number etc.
Image Processing
System which
performs
Counterfeit
analysis
Image
Result
Functional requirements
 An Android application that can take the image of the note
and send it to the Image processing system via cloud.
 The application should be able to retrieve results stored on
the cloud by the image processing system.
 The application should be able to relay the result to the VI
user using audio feedback.
 The system application of module 2 must be able to detect
counterfeit note after providing the name of the image in the
system.
Non-Functional Requirement
 There should be minimal lag between taking of the image and
the result
 The image processing should be as efficient with maximum
accuracy
 The system should give valid result for positive as well as
negative test cases
Limitations
The following are the limitation of the phase one which
corresponds to image processing of currency image to give
denomination of the result.
 Input Limitation – To have the application work effectively, the
image taken by the camera must have the currency in the
center and should occupy around 80 percent of the image
area. Furthermore, the note should be front facing in the
image. Another limitation is for note itself i.e. the note must be
of decent quality and not have any significant unnatural
marks on it.
 Accuracy – The next limitation is of accuracy. Including false
positives and false negatives, after testing, the accuracy
found to be around 70 percent. This also includes rare
occurrences of one currency value being recognized as some
other value.
 Lighting Limitation – For the application to have higher
accuracy, it’s better to have proper lighting conditions while
capturing the image.
Limitations
The following are the limitation of the phase two which
corresponds to counterfeit currency detection image processing
and the cloud based android application that has been to
developed to be integrated with phase one.
 Internet Connectivity and Speed- The android application
needs internet connectivity and good upload and download
speed to be able to get quick results.
 Lighting Limitation for Counterfeit Detection- For our
proposed algorithm to work, the image of the ROI on the note
must be taken in relatively dark conditions, so that the UV
light illuminated features are easily discernable.
Future Work
There is a lot of scope in terms of future work in this area. Most
of the limitations mentioned in the previous section can be
overcome by conducting appropriately directed research.
Furthermore, the original idea of creating a wearable device can
be pursued. The idea is of materializing a wearable device,
which can be work on the head with a camera mounted on it;
the device can capture the image and send it to the android
application built in this project. This if realized shall create a truly
ingenious solution that shall be of immense use to the visually
impaired population.
Detect Counterfeit Currency using Image Processing

Contenu connexe

Tendances

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Arijit Mukherjee
 
Silent sound technology final report
Silent sound technology final reportSilent sound technology final report
Silent sound technology final reportLohit Dalal
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksElaheh Rashedi
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachAshwinRachha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Hand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsHand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsImon_Barua
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)Journal For Research
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognitionPankaj Thakur
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.Sandeep Wakchaure
 

Tendances (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Silent sound technology final report
Silent sound technology final reportSilent sound technology final report
Silent sound technology final report
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approachFacial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Hand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsHand Gesture Recognition Applications
Hand Gesture Recognition Applications
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Virtual keyboard abstract
Virtual keyboard abstractVirtual keyboard abstract
Virtual keyboard abstract
 
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
LEAF DISEASE DETECTION USING IMAGE PROCESSING AND SUPPORT VECTOR MACHINE (SVM)
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
 

En vedette

Fake note detection
Fake note detectionFake note detection
Fake note detectionMohit Singla
 
Features of genuine currency notes
Features of genuine currency notesFeatures of genuine currency notes
Features of genuine currency notesRS P
 
FAKE CURRENCY
FAKE CURRENCYFAKE CURRENCY
FAKE CURRENCYswati.ktn
 
Brain tumor mri image segmentation and detection
Brain tumor mri image segmentation and detectionBrain tumor mri image segmentation and detection
Brain tumor mri image segmentation and detectioneSAT Publishing House
 
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSING
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSINGBRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSING
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSINGDharshika Shreeganesh
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION khanam22
 

En vedette (7)

Fake note detection
Fake note detectionFake note detection
Fake note detection
 
Features of genuine currency notes
Features of genuine currency notesFeatures of genuine currency notes
Features of genuine currency notes
 
FAKE CURRENCY
FAKE CURRENCYFAKE CURRENCY
FAKE CURRENCY
 
Brain tumor mri image segmentation and detection
Brain tumor mri image segmentation and detectionBrain tumor mri image segmentation and detection
Brain tumor mri image segmentation and detection
 
Tumour detection
Tumour detectionTumour detection
Tumour detection
 
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSING
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSINGBRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSING
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSING
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
 

Similaire à Detect Counterfeit Currency using Image Processing

IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIIRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
IRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET Journal
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET Journal
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET Journal
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNNIRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONanil badiger
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionIRJET Journal
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONIRJET Journal
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx426SahithiBaiMiriska
 

Similaire à Detect Counterfeit Currency using Image Processing (20)

IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented RealityIRJET-Implementation of Image Processing using Augmented Reality
IRJET-Implementation of Image Processing using Augmented Reality
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A SurveyIRJET-  	  A Smart Personal AI Assistant for Visually Impaired People: A Survey
IRJET- A Smart Personal AI Assistant for Visually Impaired People: A Survey
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
 
DROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHONDROWSINESS DETECTION MODEL USING PYTHON
DROWSINESS DETECTION MODEL USING PYTHON
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
 

Dernier

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Dernier (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

Detect Counterfeit Currency using Image Processing

  • 2. Literature Survey  International Journal of Research on Computer and Communication Technology (IJRCCT) – “Fake Currency Detection Using Image Processing and Other Standard Methods”.  International Journal of Computer Science and Information Technologies(IJCSIT) – “Indian Currency Denomination Identification Using Image Processing Technique”  International Journal of Engineering Science and Innovative Technology (IJESIT) – “An automatic recognition of fake Indian paper currency note using MATLAB”  International Journal of Engineering Research and Development (IJERD) – “Design and Implementation of Indian Paper Currency Authentication System Based on Feature Extraction by Edge Based Segmentation Using Sobel Operator”
  • 3. Proposed Solution The solution has been divided into two phases:  Phase 1: This phase involves work on the image processing part on a system to detect, isolate, and identify the note and denomination.  Phase 2: This phase involves work on the counterfeit analysis of the note and creation of a usable application and then integrating it with the result of phase 1.
  • 4. Implementation  A paper has already been written on the work done in phase one. Its summary is as follows: The paper we proposes a solution that shall help visually impaired people identify Indian Currency notes which shall then simplify monetary transactions for them. The proposed solution involves doing image processing on an image of a currency note; this process has been completed and its test results been elaborated in this paper. Furthermore, a small comparison exercise between two edge-detection techniques has been done, to decide which among them is best suited for the image processing of a currency note. The results of this comparison have also been shown in this
  • 5. Implementation Phase 1 Implementation:  Template Matching for Note Detection This step will be used to check whether the input image contains a currency note or not. We would store some images known as template in the database and match the template with the input image. If there is a match found then further process will be performed.  Image Segmentation Image segmentation shall be done to retrieve only the currency part of the image. This basically is removal of background and other unimportant visual information.  Feature Extraction After the image segmentation various features shall
  • 6. Implementation The phase 2 consists of two parts: 1. Creation of a Android application using Dropbox APIs The aim here is to create an Android application that can take the image of the note and send it to the Image processing system via cloud. The system would then process the image and send the result (denomination value) back to the Android device via cloud. The application would then relay the result to the VI user using audio feedback. Image Processin g System Cloud which stores The image and result after processing Image Gives result via audio Connected to Sends Image Result of Image Processing
  • 7. Implementation 2. Counterfeit analysis of the currency note In this module we intend to create a system application whose aim is to authenticate an Indian currency note. The application would use image processing and utilize various inherently present security features in the Indian currency note to achieve its goal. Security features such as Fluorescence, Security Thread, Serial number etc. Image Processing System which performs Counterfeit analysis Image Result
  • 8.
  • 9. Functional requirements  An Android application that can take the image of the note and send it to the Image processing system via cloud.  The application should be able to retrieve results stored on the cloud by the image processing system.  The application should be able to relay the result to the VI user using audio feedback.  The system application of module 2 must be able to detect counterfeit note after providing the name of the image in the system.
  • 10. Non-Functional Requirement  There should be minimal lag between taking of the image and the result  The image processing should be as efficient with maximum accuracy  The system should give valid result for positive as well as negative test cases
  • 11. Limitations The following are the limitation of the phase one which corresponds to image processing of currency image to give denomination of the result.  Input Limitation – To have the application work effectively, the image taken by the camera must have the currency in the center and should occupy around 80 percent of the image area. Furthermore, the note should be front facing in the image. Another limitation is for note itself i.e. the note must be of decent quality and not have any significant unnatural marks on it.  Accuracy – The next limitation is of accuracy. Including false positives and false negatives, after testing, the accuracy found to be around 70 percent. This also includes rare occurrences of one currency value being recognized as some other value.  Lighting Limitation – For the application to have higher accuracy, it’s better to have proper lighting conditions while capturing the image.
  • 12. Limitations The following are the limitation of the phase two which corresponds to counterfeit currency detection image processing and the cloud based android application that has been to developed to be integrated with phase one.  Internet Connectivity and Speed- The android application needs internet connectivity and good upload and download speed to be able to get quick results.  Lighting Limitation for Counterfeit Detection- For our proposed algorithm to work, the image of the ROI on the note must be taken in relatively dark conditions, so that the UV light illuminated features are easily discernable.
  • 13. Future Work There is a lot of scope in terms of future work in this area. Most of the limitations mentioned in the previous section can be overcome by conducting appropriately directed research. Furthermore, the original idea of creating a wearable device can be pursued. The idea is of materializing a wearable device, which can be work on the head with a camera mounted on it; the device can capture the image and send it to the android application built in this project. This if realized shall create a truly ingenious solution that shall be of immense use to the visually impaired population.