SlideShare a Scribd company logo
1 of 24
Project On
Recognition of fake currency using image processing
Presented by : Under the guidance of
B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar
M.K.Harika - 18001A0410 Assistant Professor Adhoc
B.V.Sumathi - 19005A0403 Department of ECE
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY
ANANTAPUR
ANANTAPURAMU – 515002, AP, INDIA
Contents:
1.Aim of The Project
2.Introduction
3.Scope of Work and Idea
4.Overview of The Project
5.Flow chart
6.Steps involved
7.Features involved
8.Block diagram
9.Results
10.Novelty of project
11.Advantages
12.Limitations
13.Applications
14.Conclusions
15.Future scope
16.References
Aim of the project:
 The technology of currency recognition basically aims for identifying and extracting visible
and invisible features of currency notes. Until now, many techniques have been proposed to
identify the currency note. But the best way is to use the visible features of the note for
example, color and size.
Introduction:
 Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly
circulated in the economy . These days technology is been growing very fast. Consequently
the banking sector is also getting modern day by day. Currency duplication also known as
counterfeit currency is a vulnerable threat on economy.
 In the proposed model , acquired image of currency note is checked whether it is fake or
real on the basis of counting the number of interruptions in the security thread. The camera
pictures are noted and analysed by MATLAB program installed on computer.
Problem statement:
 The counterfeiters nowadays, can evade the chemical property & physical feature based
counterfeit paper currency detection system due to technological advancement.
 The circulation of a large amount of fake currency increases the amount of money in
circulation, which may lead to high demand for goods and commodities. The rise in
demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This
leads to currency devaluation
Scope of work and idea:
 This project proposes an approach that will detect fake currency note being circulated in
our country by using their image. Our project will provide required mobility and
compatibility to most of the people and provides credible accuracy for the fake currency
detection. We are using machine learning to make it portable and efficient.
Overview of the project:
 The fake currency detection using machine learning was implemented on MATLAB.
Features of currency note like serial number, security thread, Identification mark, Mahatma
Gandhi portrait were extracted. The process starts from image acquisition to calculation of
intensity of each extracted feature.
Flowchart:
Image Acquisition
Preprocessing
Initial Segmentation
Post-processing
Gray Scale Conversion
Feature extraction
Result-Fake or Real
Steps involved :
 Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is
given as a path as a input. It also checks the over all image which is given as input. It selects the required
features to proceed for the further processing.
 Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of
abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of
the image data that suppresses unwanted distortions or enhances some image features essential for further
processing.
 Initial Segmentation : In this step we divide an image into various parts that have similar attributes which
are called as image objects. It is the first step for image analysis
Continuation..
 Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones,
saturation and light levels. It also checks the true and fake pixels of the image.
 Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter
background and also helps in checking the black strips of the real note . It also detects exact features of
the note after converting the image into gray scaling.
 Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the
note is fake or real . In the over all processing each step is having the unique way of extracting the
features of the real and fake note.
Features involved:
 Contrast : The difference in brightness between light and dark areas of image. Contrast determines the
number of shades in the image.
 Energy : It is the distances of some quality between the pixels of some locality
 Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is
homogenous if each pixel in the image has the same color .
 Mean : Mean value is the sum of pixel values divided by the total number of pixel values.
 Entropy : Entropy is a measure of image information content, which is interpreted as the average
uncertainity of information source. It is defined as corresponding states of intensity level which individual
pixels can adapt.
Continuation:
 RMS : To get an estimate of the similarity between source image and the segmented image, we use root
mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.
 Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or
variation about the target value of light intensity at each such data point
 Variance : The variance gives an idea how the pixel values are spread.
 Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of
constant intensity and low for regions with large excursions in the values of its intensity levels.
 IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an
image
Block Diagram:
EXTRACTING
FEATURES
DISPLAY RESULTS
INPUT
Pre-
Processing
Grey Scale
Conversion
Edge
Detection
Segmentation
User
Image SVM Data
set
Technique used:
Support Vector Machine
 Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms,
which is used for Classification as well as Regression problems.
 Support vector machines (SVMs) are a set of supervised learning methods used
for classification, regression and outliers detection.
 The advantages of support vector machines are: Effective in high dimensional spaces. Still
effective in cases where number of dimensions is greater than the number of samples.
Results:
Figure. Original image Figure. BW image Figure. Masked RGB image
Figure. Genuine image
Figure. HSV image
Genuine note:
Fake note:
Figure. Fake image
Figure. HSV image
Figure. Original image Figure.BW image Figure.Masked RGB image
Novelty of project:
 Detection of the fake currency note is done by counting the number of interruptions in the
thread line.
 Predicts whether the note is real or fake on the basis of number of interruptions.
 If the number of interruption is zero, then it is real note otherwise it is fake note. And also
we calculate the entropy of the currency notes for the efficient detection of fake
currency note.
 MATLAB software is used to detect the fake currency note.
Advantages:
 High performance speed
 Simplicity
 Removal of unnecessary data in image
Limitations:
 Input limitation
 Accuracy
 Lighting limitation
Applications:
 Fake currency detection system can be utilized in shops, bank counters and in computerized
teller machine, auto merchant machines and so on.
 The systems are created utilizing diverse techniques and algorithms.
Conclusion :
 The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by
counterfeiting of bank notes.
 With improvement of recent banking services, automatic methods for paper currency recognition
become vital in many applications such as in ATM and automatic goods seller machines.
 The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also
shows the techniques for currency recognition using image processing.
 The Indian currency notes have been identified and counterfeit notes has been found. This work is done
by using various filters. This method is very easy to implement in real time world. At last we have
concluded that if we propose some efficient preprocessing and feature extraction method then we can
improve the accuracy of identification system. We can also develop app for detection of fake currency.
Future scope:
Many different adaptations, tests and innovations have been kept for the future due
to the lack of time. As future work concerns deeper analysis of particular mechanisms, new
proposals to try different methods or simple curiosity.
 1. In future we would be including a module for currency conversion.
 2. We can implement the system for foreign currencies.
 3. Tracking of device’s location through which the currency is scanned and maintaining the
same in the database.
References :
 Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For
Technological Research In Engineering, vol. 1, no. 11, July 2014.
 B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING
SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.
 W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape
Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June
2016.
 Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake
currency is detected manually.
THANK YOU!!!

More Related Content

What's hot

BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language UnderstandingBERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language Understandinggohyunwoong
 
Presentation on component based software engineering(cbse)
Presentation on component based software engineering(cbse)Presentation on component based software engineering(cbse)
Presentation on component based software engineering(cbse)Chandan Thakur
 
Statistical Machine Learning for Text Classification with scikit-learn and NLTK
Statistical Machine Learning for Text Classification with scikit-learn and NLTKStatistical Machine Learning for Text Classification with scikit-learn and NLTK
Statistical Machine Learning for Text Classification with scikit-learn and NLTKOlivier Grisel
 
Rational unified process (rup)
Rational unified process (rup)Rational unified process (rup)
Rational unified process (rup)kdore
 
Software Engineering - Software Models
Software Engineering - Software ModelsSoftware Engineering - Software Models
Software Engineering - Software ModelsReddhi Basu
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineeringrishi ram khanal
 
Software Engineering - Spiral Model
Software Engineering - Spiral ModelSoftware Engineering - Spiral Model
Software Engineering - Spiral ModelBenedictArpon
 
Web technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringWeb technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringPiero Fraternali
 
Customize renderpipeline
Customize renderpipelineCustomize renderpipeline
Customize renderpipelineAkilarLiao
 
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)Sergey Karayev
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Mohamed Sami El-Tahawy
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineeringParminder Singh
 
Software Architecture: Principles, Patterns and Practices
Software Architecture: Principles, Patterns and PracticesSoftware Architecture: Principles, Patterns and Practices
Software Architecture: Principles, Patterns and PracticesGanesh Samarthyam
 
Advanced Voice Conversion
Advanced Voice ConversionAdvanced Voice Conversion
Advanced Voice ConversionNU_I_TODALAB
 
Introduction to react
Introduction to reactIntroduction to react
Introduction to reactkiranabburi
 
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들Dae Hyek KIM
 

What's hot (20)

Package Diagram
Package DiagramPackage Diagram
Package Diagram
 
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language UnderstandingBERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
 
Presentation on component based software engineering(cbse)
Presentation on component based software engineering(cbse)Presentation on component based software engineering(cbse)
Presentation on component based software engineering(cbse)
 
Statistical Machine Learning for Text Classification with scikit-learn and NLTK
Statistical Machine Learning for Text Classification with scikit-learn and NLTKStatistical Machine Learning for Text Classification with scikit-learn and NLTK
Statistical Machine Learning for Text Classification with scikit-learn and NLTK
 
Rational unified process (rup)
Rational unified process (rup)Rational unified process (rup)
Rational unified process (rup)
 
Design Principles
Design PrinciplesDesign Principles
Design Principles
 
Cocomo models
Cocomo modelsCocomo models
Cocomo models
 
Software Engineering - Software Models
Software Engineering - Software ModelsSoftware Engineering - Software Models
Software Engineering - Software Models
 
Implementation issues software engineering
Implementation issues software engineeringImplementation issues software engineering
Implementation issues software engineering
 
Software Engineering - Spiral Model
Software Engineering - Spiral ModelSoftware Engineering - Spiral Model
Software Engineering - Spiral Model
 
Web technologies: Model Driven Engineering
Web technologies: Model Driven EngineeringWeb technologies: Model Driven Engineering
Web technologies: Model Driven Engineering
 
Customize renderpipeline
Customize renderpipelineCustomize renderpipeline
Customize renderpipeline
 
Structured Design
Structured DesignStructured Design
Structured Design
 
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)
Lecture 4: Transformers (Full Stack Deep Learning - Spring 2021)
 
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
 
Software reverse engineering
Software reverse engineeringSoftware reverse engineering
Software reverse engineering
 
Software Architecture: Principles, Patterns and Practices
Software Architecture: Principles, Patterns and PracticesSoftware Architecture: Principles, Patterns and Practices
Software Architecture: Principles, Patterns and Practices
 
Advanced Voice Conversion
Advanced Voice ConversionAdvanced Voice Conversion
Advanced Voice Conversion
 
Introduction to react
Introduction to reactIntroduction to react
Introduction to react
 
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들
Ndc17 - 차세대 게임이펙트를 위해 알야아할 기법들
 

Similar to Project on fake currency recognition using image processing ppt final (3).pptx

Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processingFatima Akhtar
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistanceijscai
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds IJSCAI Journal
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSijscai
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using MatlabIRJET Journal
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
Currency validation system using mobile
Currency validation system using mobileCurrency validation system using mobile
Currency validation system using mobileAhmed Akl
 
IRJET - Fake Currency Detection using CNN
IRJET -  	  Fake Currency Detection using CNNIRJET -  	  Fake Currency Detection using CNN
IRJET - Fake Currency Detection using CNNIRJET Journal
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Vidyut Singhania
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image ProcessingIRJET Journal
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detectionijtsrd
 

Similar to Project on fake currency recognition using image processing ppt final (3).pptx (20)

Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
fake5.pdf.pdf
fake5.pdf.pdffake5.pdf.pdf
fake5.pdf.pdf
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Currency recognition system using image processing
Currency recognition system using image processingCurrency recognition system using image processing
Currency recognition system using image processing
 
An iranian cash recognition assistance
An iranian cash recognition assistanceAn iranian cash recognition assistance
An iranian cash recognition assistance
 
An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds An Iranian Cash Recognition Assistance System For Visually Impaireds
An Iranian Cash Recognition Assistance System For Visually Impaireds
 
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDSAN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
AN IRANIAN CASH RECOGNITION ASSISTANCE SYSTEM FOR VISUALLY IMPAIREDS
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using Matlab
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Currency validation system using mobile
Currency validation system using mobileCurrency validation system using mobile
Currency validation system using mobile
 
IRJET - Fake Currency Detection using CNN
IRJET -  	  Fake Currency Detection using CNNIRJET -  	  Fake Currency Detection using CNN
IRJET - Fake Currency Detection using CNN
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Final Report on Optical Character Recognition
Final Report on Optical Character Recognition Final Report on Optical Character Recognition
Final Report on Optical Character Recognition
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
1304.2109
1304.21091304.2109
1304.2109
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

Project on fake currency recognition using image processing ppt final (3).pptx

  • 1. Project On Recognition of fake currency using image processing Presented by : Under the guidance of B.Anivinder Reddy - 18001A0403 Sri . M. Sreedhar M.K.Harika - 18001A0410 Assistant Professor Adhoc B.V.Sumathi - 19005A0403 Department of ECE JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR ANANTAPURAMU – 515002, AP, INDIA
  • 2. Contents: 1.Aim of The Project 2.Introduction 3.Scope of Work and Idea 4.Overview of The Project 5.Flow chart 6.Steps involved 7.Features involved 8.Block diagram 9.Results 10.Novelty of project 11.Advantages 12.Limitations 13.Applications 14.Conclusions 15.Future scope 16.References
  • 3. Aim of the project:  The technology of currency recognition basically aims for identifying and extracting visible and invisible features of currency notes. Until now, many techniques have been proposed to identify the currency note. But the best way is to use the visible features of the note for example, color and size.
  • 4. Introduction:  Fake Currency Note is a term that refers to the counterfeit currency notes that rapidly circulated in the economy . These days technology is been growing very fast. Consequently the banking sector is also getting modern day by day. Currency duplication also known as counterfeit currency is a vulnerable threat on economy.  In the proposed model , acquired image of currency note is checked whether it is fake or real on the basis of counting the number of interruptions in the security thread. The camera pictures are noted and analysed by MATLAB program installed on computer.
  • 5. Problem statement:  The counterfeiters nowadays, can evade the chemical property & physical feature based counterfeit paper currency detection system due to technological advancement.  The circulation of a large amount of fake currency increases the amount of money in circulation, which may lead to high demand for goods and commodities. The rise in demand in turn creates a scarcity of goods, leading to a rise in the price of the goods. This leads to currency devaluation
  • 6. Scope of work and idea:  This project proposes an approach that will detect fake currency note being circulated in our country by using their image. Our project will provide required mobility and compatibility to most of the people and provides credible accuracy for the fake currency detection. We are using machine learning to make it portable and efficient.
  • 7. Overview of the project:  The fake currency detection using machine learning was implemented on MATLAB. Features of currency note like serial number, security thread, Identification mark, Mahatma Gandhi portrait were extracted. The process starts from image acquisition to calculation of intensity of each extracted feature.
  • 8. Flowchart: Image Acquisition Preprocessing Initial Segmentation Post-processing Gray Scale Conversion Feature extraction Result-Fake or Real
  • 9. Steps involved :  Image Acquisition : It is the action of retrieving an image from source. It goes through the image which is given as a path as a input. It also checks the over all image which is given as input. It selects the required features to proceed for the further processing.  Pre Processing : Pre-processing is a familiar name for operations with images at the lowest level of abstraction -- both input and output are intensity images. The aim of Pre-processing is an improvement of the image data that suppresses unwanted distortions or enhances some image features essential for further processing.  Initial Segmentation : In this step we divide an image into various parts that have similar attributes which are called as image objects. It is the first step for image analysis
  • 10. Continuation..  Post Processing : Adjusting exposure, contrast and brightness and also adjusting colors, hues, tones, saturation and light levels. It also checks the true and fake pixels of the image.  Gray Scale Conversion : This step is used to enhance the gray image to emphasize dark lines in lighter background and also helps in checking the black strips of the real note . It also detects exact features of the note after converting the image into gray scaling.  Feature Extraction : Extracts the features that are needed to be compared and to conclude whether the note is fake or real . In the over all processing each step is having the unique way of extracting the features of the real and fake note.
  • 11. Features involved:  Contrast : The difference in brightness between light and dark areas of image. Contrast determines the number of shades in the image.  Energy : It is the distances of some quality between the pixels of some locality  Homogeneity : It expresses how similar certain elements(pixels) of the image are. Generally an image is homogenous if each pixel in the image has the same color .  Mean : Mean value is the sum of pixel values divided by the total number of pixel values.  Entropy : Entropy is a measure of image information content, which is interpreted as the average uncertainity of information source. It is defined as corresponding states of intensity level which individual pixels can adapt.
  • 12. Continuation:  RMS : To get an estimate of the similarity between source image and the segmented image, we use root mean square error. Using this the data can be divided by best fit to find out how concentrated an image is.  Standard deviation : Standard deviation of the image implies a gross measure of the imprecision or variation about the target value of light intensity at each such data point  Variance : The variance gives an idea how the pixel values are spread.  Smoothness: Smoothness measures the relative smoothness of intensity in a region. It is high for a region of constant intensity and low for regions with large excursions in the values of its intensity levels.  IDM : Inverse Difference Moment is usually called homogeneity that measures the local homogeneity of an image
  • 13. Block Diagram: EXTRACTING FEATURES DISPLAY RESULTS INPUT Pre- Processing Grey Scale Conversion Edge Detection Segmentation User Image SVM Data set
  • 14. Technique used: Support Vector Machine  Support Vector Machine or SVM is one of the most popular Supervised Learning algorithms, which is used for Classification as well as Regression problems.  Support vector machines (SVMs) are a set of supervised learning methods used for classification, regression and outliers detection.  The advantages of support vector machines are: Effective in high dimensional spaces. Still effective in cases where number of dimensions is greater than the number of samples.
  • 15. Results: Figure. Original image Figure. BW image Figure. Masked RGB image Figure. Genuine image Figure. HSV image Genuine note:
  • 16. Fake note: Figure. Fake image Figure. HSV image Figure. Original image Figure.BW image Figure.Masked RGB image
  • 17. Novelty of project:  Detection of the fake currency note is done by counting the number of interruptions in the thread line.  Predicts whether the note is real or fake on the basis of number of interruptions.  If the number of interruption is zero, then it is real note otherwise it is fake note. And also we calculate the entropy of the currency notes for the efficient detection of fake currency note.  MATLAB software is used to detect the fake currency note.
  • 18. Advantages:  High performance speed  Simplicity  Removal of unnecessary data in image
  • 19. Limitations:  Input limitation  Accuracy  Lighting limitation
  • 20. Applications:  Fake currency detection system can be utilized in shops, bank counters and in computerized teller machine, auto merchant machines and so on.  The systems are created utilizing diverse techniques and algorithms.
  • 21. Conclusion :  The survival of the financial symmetry may be affected with its value, rapidity, output and wellbeing by counterfeiting of bank notes.  With improvement of recent banking services, automatic methods for paper currency recognition become vital in many applications such as in ATM and automatic goods seller machines.  The system has a best performance for both agreeing valid banknotes and deleting invalid data. It also shows the techniques for currency recognition using image processing.  The Indian currency notes have been identified and counterfeit notes has been found. This work is done by using various filters. This method is very easy to implement in real time world. At last we have concluded that if we propose some efficient preprocessing and feature extraction method then we can improve the accuracy of identification system. We can also develop app for detection of fake currency.
  • 22. Future scope: Many different adaptations, tests and innovations have been kept for the future due to the lack of time. As future work concerns deeper analysis of particular mechanisms, new proposals to try different methods or simple curiosity.  1. In future we would be including a module for currency conversion.  2. We can implement the system for foreign currencies.  3. Tracking of device’s location through which the currency is scanned and maintaining the same in the database.
  • 23. References :  Megha Thakur and Amrit Kaur, "Various Fake Currency Detection Techniques", International Journal For Technological Research In Engineering, vol. 1, no. 11, July 2014.  B R Kavya and B Devendran , "INDIAN CURRENCY DETECTION AND DENOMINATION USING SIFT", International Journal of Science Engineering and Technology Research, vol. 4, no. 6, June 2015.  W. K. El Said, "Fake Egyptian Currency Detection System using Texture and Shape Characteristics", International Journal of Computer Applications (0975 – 8887), vol. 143, no. 2, June 2016.  Binod Prasad yadav,C.S patil,R.R Karhe,P.H patil – ” HSV Technique by using MATLAB “The fake currency is detected manually.