System For Fake Currency Detection Using Image Processing
System For Fake Currency Detection Using Image Processing
https://doi.org/10.22214/ijraset.2022.39832
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Abstract: Counterfeit money has always existed an issue that has caused many problems in the market. Technological growth
development has made it possible to create extra counterfeit items which are distributed in the mitigation market the global
economy. Bangui existing banking equipment and so on trading sites to check the authenticity of funds. But the average person
does not do that have access to such systems and that is why they are needed in order for the software to receive counterfeit
money, which can be used by ordinary people. This the proposed system uses image processing to find out if the money is real or
fake. System built uses the Python system completely language. It contains similar steps grayscale modification, edge detection,
separation, etc. made using appropriate methods.
Keyword: Counterfeit currency, Image Processing, Python programming language, grayscale conversion, edge detection,
segmentation.
I. INTRODUCTION
Different countries around the world use different types of currencies to exchange money for other types of goods. One common
problem that many countries face is money laundering.[1] in the system. India is one of the countries facing the most problems and
huge losses due to counterfeit funds. As a result there is a loss in the general economy of the country's currency. Technological
advances have made it possible for funds to double so much that they can be seen more generally [2]. Advanced printers and new
computer programming software are used to create counterfeit currency. Counterfeit currencies can easily slip into real money,
which is how they are often distributed in the market. Commercial real estate such as banks, supermarkets, jewelry stores, etc. have
a large number of daily activities. Such facilities may be able to afford and may consider it necessary to purchase equipment that
uses UV light and other methods of verification. But for ordinary people it is very difficult to just find out if the money is fake or
genuine and they may face losses especially during bank deposits or transactions. The system is designed in such a way that anyone
can easily use it and verify the value of the currency in which it is used using the physical features of the currency [3]. This app can
also be converted into an app to make it accessible to everyone. In addition, the program can be designed to generate foreign
exchange as well.
The system is based on image processing where a few steps are used to process the currency picture and give the user the effect of
whether the currency is real or not. The rest of the paper discusses the following details. In Section II, there is a brief overview of
some of the related papers used in the review. In Phase III, a methodology is stated outlining the various steps used in the entire
process of acquisition of a currency. In Section IV, the details of the proposed system are specified. Section V shows the result and
conclusions. Category VI refers to referral documents and links.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 349
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
III. METHODOLOGY
The current systems are machine-based, that is, they are for commercial purposes only. Systems that use image processing are
developed in Python [4], [7]. These devices are based on visual acuity or proximity detection. In visual perception, money is stored
under a machine and a UV lamp is scanned for a currency and if the currency is illuminated due to fluorescence, it means that it is a
real currency. In finding the representative ink used to make a currency has ferromagnetic properties, so when the money passes the
magnetic field and when it shows a certain movement it concludes that it is a real currency [8]. Figure 1 is a flowchart showing the
most common methods used to obtain a counterfeit currency using image processing.
1) Image Acquisition: An image of a currency that should be tested or verified as a real currency is considered a system input.
Image capture can be obtained using techniques such as scanning the image or clicking the image with the phone and uploading
it to the application.
2) Grey Scale: Converting a color image to a gray image requires more information about the color image. The pixel color in the
picture is a combination of three colors Red, Green, and Blue (RGB). Similarly, a Grayscale image can be viewed as a single
layer image. Different techniques can be used to turn a color image into a gray image. [9]
3) Edge Detection: Edge detection is a method of image processing to determine the boundaries of objects within images [12]. It
works by detecting discoloration in the light. Edge detection is used for image classification and data extraction in areas such as
image processing, computer vision, and machine vision. The purpose of a radical change in image brightness is to capture
important events and changes in worldly possessions. Edge discovery helps to find all the ROI edges needed to perform various
tasks in the later stages.
4) Segmentation: Image fragmentation is the process of dividing an image into many parts. This is often used to identify objects or
other important information in digital images. [10] shows a few examples of techniques that can be used to make a distinction.
E. Output Feature A feature is a type of size reduction that best represents interesting parts of an image as a combined feature
vector. This method is useful when image sizes are large and a reduced feature is required to quickly complete tasks such as
image matching and retrieval. Features are extracted and used for comparison in the next step.
5) Comparison: Elements extracted from a previous step are used to compare with the deposited features and the results are
presented as real or false currency.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 350
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
6) Proposed Program: The proposed system uses image processing to determine the type of currency. The inserted or scanned
image is provided by a system that can be .png and the output indicates whether the currency is real or not. The process consists
of techniques such as pre-image processing, gray scale conversion, edge detection, separation, subtraction and comparing
aspect. Figure 2 shows a sketch of the buildings belonging to the proposed system.
a) Step 1: Pre-Image Processing Pre-processing is a common term for tasks with very low output images - both input and output
are dynamic images. The purpose of pre-processing is to improve image data that suppresses unwanted distortions or enhances
certain image features that are important for further processing. In this program, sound filtering is performed on a pre-image
processing [11]. Here, the sound of salt and pepper is removed.
b) Step 2: Converting the gray scale image is converted to the gray scale as it reduces the complexity of coding. There are many
methods that can be used to convert an RGB image to a gray image such as measurement, light method, air removal method,
etc. [15]. The system uses a light method to perform grayscale conversion.
c) Step 3: Obtaining the edge The grayscale image is the inclusion in this step. The system utilizes the discovery of Canny Edge as
it provides much better results compared to other techniques [13]. Canny edge detection is a way to extract useful structural
information on a variety of visual objects and dramatically reduce the amount of data to be processed.
d) Step 4: Division There are various methods such as thresholding, merging methods, regional-based classification, etc.
performing segmentation in image processing. Here the threshold method is used for segmentation when using the threshold
values found in the histogram end of the first image. [14]
e) Step 5: Removal Feature and Comparison If the extracted features are carefully selected it is expected that the extracted features
will extract the relevant information from the input data. The system uses the SSIM (Structure Similarity Index Method)
method to compare feature.
The features that are being compared in the system are as follows for 2000 Rupees note
A picture of Mahatma Gandhi in the middle
Small letters ‗RBI ‘and ‗2000’ left of paper money
A safety window with an RBI text
Confirmation clause, Governor's Signature with Promise Clause and right RBI logo
The denomination number with the rupee symbol in the bottom right
Ashoka Pillar mark on the right and electrotype watermarks
A panel of numbers that grow in size on the top left and bottom right
Seven angular bleeding lines on the left and right sides of the coin
Year of printing coin left Swachh Bharat logo and motto.
Fig. 3 Features of the Indian
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 351
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
f) Step 6: Output displays the distinctly marked features that are used to extract the feature and compare. In the output, the system
starts by asking the user to upload a currency picture. The output shows four different types of images. The first image is that of
the first image compared to the uploaded money. The following image is of a currency uploaded by a user. The third image is a
scattered image of grayscale elements. This effect helps to distinguish between the two images namely the original image and
the uploaded image. The intersection of these two images shows exactly where the changes in the uploaded image are if they
are false. The following image is for fragmented image fragmentation. A distinctive image of the features is made at threshold
and is displayed as a result of finding the differences in the images clearly when present. Finally the program indicates whether
the image is false or not true.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 352