0% found this document useful (0 votes)
19 views

Face Detection2

The document presents a project report on a Face Detection and Recognition System developed by students under the guidance of Mr. Rajat Kishor Varshney. It includes completion certificates for multiple students who worked on the project, as well as an abstract discussing the significance of counterfeit currency detection and the methodology used in the project. The report outlines objectives, literature reviews, and the implementation of a system designed to identify fake currency using image processing techniques.

Uploaded by

alpmau2017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Face Detection2

The document presents a project report on a Face Detection and Recognition System developed by students under the guidance of Mr. Rajat Kishor Varshney. It includes completion certificates for multiple students who worked on the project, as well as an abstract discussing the significance of counterfeit currency detection and the methodology used in the project. The report outlines objectives, literature reviews, and the implementation of a system designed to identify fake currency using image processing techniques.

Uploaded by

alpmau2017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 46

A Project Report on

FACE DETECTION AND RECOGNITION SYSTEM


BY

CHANDAN KUMAR (2301321559002)


PRABHAT KUMAR (2301321559005)
PAWAN KUMAR (2101321550043)

UNDER THE GUIDANCE OF

Mr. Rajat Kishor Varshney

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

GREATER NOIDA INSTITUTE OF TECHNOLOGY ENG. Institute GREATER NOIDA

Dr. A.P.J. Abdul Kalam Technical University, Lucknow

December,2024
Department Of IoT
Session2024-2025

Mini Project Completion Certificate

Date:29/05/2024

This is to certify that Mr. Chandan Kumar bearing Roll


No.2301321559002, student of 3rd year CSE-IoT has completed Mini
Project program(BCS-552) with the Department of CSE-IoT from 26-
Feb-24 to 30-May-24.

He worked on the Mini Project Titled“FACE DETECTION AND


RECOGNITION SYSTEM” under the guidance of Mr. Rajat Kishor
Varshney.

This Mini Project work has not been submitted any where for any
degree.
Mr. Rajat Kishor Varshney Dr.indradeep
Verma

Assistant Professor, CSE-IoT HoD-IoT


Department ofIoT
Session2024-2025

Mini Project Completion Certificate

Date:29/05/2024

This is to certify that Mr. Prabhat Kumar bearing Roll


No.2301321559005, student of 3rd year CSE-IoT has completed
Mini Project program(BCS-552) with the Department of CSE-IoT
from 26-Feb-24 to 30-May-24.

He worked on the Mini Project Titled“FACE DETECTION AND


RECOGNITION SYSTEM” under the guidance of MR. Rajat Kishor
Varshney.

This Mini Project work has not been submitted any where for any
degree.

Mr. Rajat Kishor Varshney Dr.indradeep


Verma

Assistant Professor, CSE-IoT HoD-IoT


Department ofIoT
Session2024-2025

Mini Project Completion Certificate

Date:29/05/2024

This is to certify that Mr. Pawan Kumar bearing Roll


No.2101321550043, student of 3rd year CSE-IoT has completed
Mini Project program(BCS-552) with the Department of CSE-IoT
from 26-Feb-24 to 30-May-24.

He worked on the Mini Project Titled “FACE DETECTION AND


RECOGNITION SYSTEM” under the guidance of Mr. Rajat Kishor
Varshney.

This Mini Project work has not been submitted any where for any
degree.

Mr. Rajat Kishor Varshney Dr.indradeep


Verma

Assistant Professor, CSE-IoT HoD-IoT


Department ofIoT
Session2023-2024

MiniProjectCompletionCertificate

Date:29/05/2024

This is to certify that Mr. Ashutoosh Ishoo bearing Roll


No.2001321550013, student of 3th year CSE-IoT has completed
Mini Projectprogram(BCS-552)withtheDepartmentofCSE-
IoTfrom26-Feb-24 to 30-May-24.

HeworkedontheMiniProjectTitled“FAKECURRENCYDETECTION
SYSTEM” under the guidance of Dr. Gambhir singh.

ThisMiniProjectworkhasnotbeensubmittedanywhereforany degree.

Dr. Gambhir Singh Dr.indradeep


Verma

Assistant Professor, CSE-IoT HoD-IoT


Abstract

The creation and circulation ofcounterfeitnotesareontheriserightnow,asaresultofadvances in color


printing technology. This is a serious issuethataffectspracticallyallofthenations.The economy
isimpacted.Suchfakemoneyfuelsevilintentions,typicallyinvolvingterroristactions. According to
the research, this has had ahighlynegativeeffectondevelopingnationslikeIndia. This research
suggests a methodforviewingthefakecurrencythroughitsimage.Pre-processing should be used
after choosing an image. The acquisition of images is completed at first during processing. Then
a conversion from RGB toGRAYSCALEisdone.Afterconversion,theimage is segmented, its
features are measured, correlation is found, and classification is completed to determine whether
the image is real orfake.Fakemoneyhasbeenasignificantissue.Banksand other trading places have
equipment available to verify financial validity. Nevertheless, the normal individual does not
have access to such tools, which is why fake money detecting
softwarethatisusablebyregularpeopleisrequired.Wegetatmost81%ofaccuracyconsidering
50itemsofIndian Currency notes of 2000-rupee. This project provides a thorough explanation of
a fake note detector that can be used by the average person. The suggested system employs
image processing to identify genuine currency from counterfeit money. The Pythonprogramming
language has been used to create the software in its entirety.

Keywords: Fake Currency, Image Processing, Grayscale Conversion, Segmentation, pre-


processing.
TableofContents

Title PageNo
ListofFigure 4
ListofTable 5
ChapterOne:Introduction 6
Introduction 6
Objectives 7

Project Outline 8
ChapterTwo:LiteratureReview 9
Literature Review 9
Literature Summary 18
Chapter3:Methodology 21
Data Description 21
Requirement Analysis 21
Features of Currency 23
Required Algorithm 27
Flowchart 30

WorkflowofProposedSystem 31
Implementation Steps of Proposed System 31
Chapter4:ResultandDiscussion 33
Result and Discussion 33
Chapter5:Conclusion 35
Advantages 35
Restrictions 35
Future Scope 35
Reference 36
ListofFigure

FigureNo FigureTitle PageNo

Fig 3.1 All security features of Indian currency 2000 23


Fig 3.2 Portrait of Mahatma Gandhi 24
Fig 3.3 Security Thread 24
Fig 3.4 See through Register 24
Fig 3.5 Ashoka Pillar 25
Fig 3.6 Identification Mark 25
Fig 3.7 Guarantee Clause 25
Fig 3.8 Currency Numeral with the Rupees Symbol 25

Fig 3.9 Bleed Lines 26


Fig 3.10 Latent Image of Denomination Numeral 26
Fig3.11 Micro Lettering 26
Fig 3.12 Government of India 27
Fig 3.13 Block diagram fake currency detection 30
ListofTable

TableNo TableTitle PageNo

Table3.1 Dataset 21
Table3.2 Hardware Requirements 22
Table3.3 Software Requirements 22
ChapterOne

Introduction

Introduction

Money can serve as the driving force behind any economic activity associated with
manufacturing, circulation,consumption,etc.Capitalinformationcanbeusedtosavemoneyand make
investments. Money is essential for everything in today's dynamic culture. There are also other
factors that are shrinking the economy as it advances. One of those things is the creation and use
of counterfeit currency. Due to the widespread use of counterfeit currency in the economy, the
typical person is the group most negatively impacted by this activity. Everyone is afraid of
accepting banknotes in the denominationsofRs.500andRs.1,000becausethebulkof them are nearly
hard to distinguish from genuine banknotes, from gas stations to the neighborhood vegetable
seller.

The issue of counterfeit money is one thatisdiscussedanddebatedthroughouttheworld.Banks lost


Rs. 16,789 crores in the most recent fiscal year due to frauds. The Reserve Bank reportedthat
"the amount that has been lost on account of frauds in the year 2016–17 was Rs. 16,789 crores,"
which was in accordance with the fraud monitoring report made by various banks and financial
institutions. According totheRBI's(ReserveBankofIndia)annualreportfor2021–22, there was an
increase in the number of counterfeit notes found in the denominations of Rs. 10, Rs. 20, Rs.
200, Rs. 500 (new design), and Rs. 2,000, respectively, of 16.4%, 16.5%, 11.7%,
101.9%, and 54.6%.[51]

Inflation is the typical impact of counterfeiting on the economy. The only tool now available to
the average person to identify fake money is the Fake Note DetectionMachine.Themajorityof the
time, this machine is only found in banks, which are not always accessible to the regular person.
In order to prove the viability of suggested solutions to a particular problem, a lot of
experimental work is required in the field of digital image processing.
It includes operations whose inputs andoutputsareimagesandoperationsthatextractproperties from
photos, including the identification of specific objects. The watermark on fake currency is
created using opaque ink, white solution, andstampingwithadyethathasapictureofMahatma
Gandhi engraved on it. Visitors arethemostsusceptibletophonycurrencybecausetheylackthe
knowledge necessary to distinguish between fake and genuine currency notes.

These people will benefit from automatic currency identification using image processing
techniques. Also, it can be helpful in other workplaces. The devised system to verify the 2000-
rupee Indian currency notes. It will organize the predetermined arrangement of information and
pre-process the digital images before differentiating in monetary forms. The approach for
detecting Indian currencies suggested in this article is practical and affordable. The user can
determine whether the cash note is authentic or phony at the conclusion of the process.

Objectives

1. ToexaminethevarioussecuritycomponentsofIndiancurrencynotes.

2. Using a scanner or camera to gather paper money.

3. Toextractcharacteristicsfromthecapturedimagebycroppingandsegmentingit.

4. Creating a feature localization algorithm.

5. Designing an extraction and recognition of features.

6. Todeterminetherightmoneydenomination.

7. Todistinguishbetweenauthenticandfakemoney notes
ProjectOutline

This project paper is based on Fake Currency Detection. At the first chapter it includes the
introduction and objective partwhichmainlydescribeaboutourprojecttopic,whythisprojectis
important and which methods are used in our project to make it successful. The second chapter
includes literature review which mainly represents the summary of the different project paper
related to our project topic, including of what they had achieved and by whichprocesstheyhad
done their project etc. The third chapter includes the methodology part whichmainlyrepresents
the information about the used dataset, softwareandhardwaretoolsandtablesthedescriptionof the
process with the flow-chart diagram, features of the currency by following we did ourproject.
The fourth chapter includes the conclusion part that includes result and discussion part, which
represents what we have got from our project with the advantagesofourprojectandalso includes
limitations of our project and the scope at which we can improve our project in the future.
ChapterTwo

Literature

Review

LiteratureReview

Colaco, Rencita Maria et al. chose to use the programming language Python and OpenCV for
their project using Canny Edge Detection algorithm. To make comparisons and determine the
outcome, a number of characteristics that define genuine currency apart from counterfeit ones
were taken into account. Identification marks, see-through registers, optical variable ink,currency
color codes,securitythreads,watermarks,latentimages,andmicro-letteringwereafew of these
features. The accuracy of the proposed system was close to 80%. The goal of this research was to
create a low-cost system with quick computations so that even the average person, who is unable
to use more advanced resources, can identify counterfeit money. [1]

In this project, Vadnere, Koneri etal.useddigitalimageprocessingalgorithmstomakecurrency


authentication. In essence, some features were extracted using image-based segmentation and
template matching, which worked well throughout the entire process and required little
computation time. The technique was incredibly easy & simple to use. Using thismethodinthe
real world is highly adaptable. The folks who are unfamiliar with currencies will be benefitted
from this effort. [2]

In this experiment, Jamkhandikar, Dayanand et al.used two different currencies, and it was
discovered that the suggested method based on color and feature analysis is effective for
currencies. This project was done using image processing algorithm. The accuracyfoundinthis
system was 70%. Doing this project allowed them to identify counterfeit money, which is
particularly helpful in preventing high-order counterfeiting that makes use oflow-costbuthigh-
quality machinery. [3]

Sangogi, Mrs Jyoti et al. made itpossibleforsomeonewhoisblindtotellwhethermoneyisreal or


phony.BasedontheparametersoftheHSVvaluesofthecurrencynote,thePythontechnique,
whichwasimplementedinaRaspberryPiwithascanner,couldcapturethecurrencynoteand
carriedouttheimageprocessingtechniquesmandatedintheprojecttodeterminewhether the currency is
genuine or counterfeit. [4]
Shiby, Ashik et al. used image processing, this project aided in the acquisition offakecurrency.
Incertainways,thiscanstopthepropagationoffraudulentnotesinthesystem.Itcanprovidethe user with
the opportunity to ascertain the note's legitimacy without having to visit a bank using machine
learning algorithms.The accuracy of this proposed system is approximately 80%. The initiative
covered the acquisition of Indian paper money. [5]

Warke, Kanthietal.comparedtheirprojectwithotherpreviousmethodologies,imageprocessing
techniques allow for more accurate examination of the currency image while also saving timeand
money. The suggested method was designed to efficiently extract and check features from photos
ofIndiancashusingsomanyalgorithmslikefluorescencedetectionalgorithm,dimension detection
algorithm, color composition algorithm etc. [6]

Aditya Sharma, Shweta Poojary et al. worked using the help of the Tensorflow and Keras
libraries, this system primarily focused on the picture categorization part of deep learningusing
deep learning network algorithms, deep neural network algorithms, and convolutional neural
network algorithms. The detection of currency tooks only a few seconds, and currency
recognition was simple. The system has an excellent overall accuracy level for differentiating
between real and fraudulent cash. [7]

Kudalkar et al. proposed a technique which wasappearedtobeeffectiveindeterminingwhether the


currency is real or fake using image acquisition, noise removal, gray scale conversion, edge
detection, segmentation, feature extraction, comparison, supervised learning algorithm.
According to the project's findings, the primary security features—bleed lines, security thread,
and micro lettering—were needed to be precisely computed. [8]

Pallavi, S. et al. detect andidentifybanknotesofdifferentdenominations.Thisstudypresenteda


system that use convolutional neural networks with deep training using CNN (Convolutional
Neural Network) model training, currency pre-processing algorithm. By acting as a feature
extractor, their ML-CNN (Machine Learning Convolutional Neural Network) based project
eliminated the need for image processing and the need for manuallyconfirmingtheexistenceof
security characteristics in the note. The project's audio output, which will also be useful to blind
people, willbeitsfinalproduct.FurtherexperimentswithdifferentML-CNN(MachineLearning
Convolutional Neural Network) architectures will increase the model's accuracy. [9]

Potluri, Jahnavi et al. suggested an approachwhichofferedamoreeffectivewaytospotaphony


banknote using data augmentation,transferlearning.ThisCNN(ConvolutionalNeuralNetwork)
model (Mobilenetv2-FCD) was developed for a mobile application after beingtrainedonareal-
time dataset. With smart phones, this mobileapplicationcanbeusedtodetectcounterfeitmoney
notes. This suggested network had an accuracy of 85% in identifying counterfeit notes. Any
currency can be used with the network after it has been trained for it. [10]

Khan, Mudassir and Mahtab Alam showed how machine learning can be used to accurately
identify fake currency. It is possible to distinguish between real and fake banknotes quickly by
using the K-Means algorithm with many clusters of size two. A third group of banknotes that
could besubjecttoadditionalanalysis,suchasgenuinebanknotesinpoorconditionthatcouldbe
mistaken for forgeries, can aid whentherearethreeclustersinsteadoftwo.Themodelhadsome flaws.
In this point, an accuracy of 87% might be sufficient. Yet, it is still more precise than human
detection. Additionally, the model'saccuracycanbeincreasedanyfurtherwithmoredata and better
analysis. [11]

Vidhate, Shah et al. examined all relevant existing architectures, and by studying how they
functioned, they found certain problemswiththesystemthatwasinplaceatthetime.Withsome of the
extra features in their suggested system being implemented utilizing KNN (K-Nearest Neighbors
Algorithm) algorithms or sophisticated machine learning techniques, they had preserved all the
key aspects of the existing systems as their primary focus. [12]

Kumar, Akhila et al. used three supervised machine learning (SML) methods were used in this
project to authenticate banknotes. The three methods that wereusedaretheDecisionTree(DT),
KNN (K-Nearest Neighbors Algorithm), and SVM (Support Vector Machine) algorithms. [13]

NR, Deepak proposed an efficient method for extracting and identifying the characteristics of
Indian rupee notes was given in this study. Using digital image processing methods, the study
also included the recognition and classification of counterfeit money. [14]
Siddiki, Marjuk Ahmed et al. had created a system for spotting counterfeit money using a
convolutional neural network (CNN) model and certain deep learning techniques with image
processing algorithms. These were really accurate and very useful for spotting counterfeitmoney.
[15]

Naseem, Syeda Aimen et al. proposed an innovative method for distinguishing real banknotes
from fake ones by applying an image processing methodology that was implemented in
MATLAB. A image watermark, security thread, and serial number extraction are among the
features of the banknote. The algorithm, which is based on image processing, was used in the
proposed technique, which made use of regular RGB images to authenticate banknotes. [16]

Saxena, Ankur et al. presented a document which can give a person the ability to spot a phony
note using digital image processing algorithms, which can play a vital role in reducing
corruption. In order to detect false notes, MATLAB techniques were implemented in mobile
phoneswithscannersorcameras,givingaveragepersontheabilitytotellifapieceofcurrencyis real or
not. [17]

Kanojia, Mahendra, Niketa Gandhi and Amruta Rane focused on two different currencies and
used color and feature analysis to evaluate whether thegivencurrencywasrealorfalseutilizing
image processing algorithms such image acquisition, gray scale conversion, edge detection,
image segmentation, and feature extraction etc. [18]

Shah, Raj, Mayank Champneri and Pujan Sheth employed two methods to detect fraudulent
currency notes: UV LEDs(Ultravioletlight-emittingdiodes)andimageanalysis.Todetermineif a
note was false or real, a UV LED (Ultraviolet light-emitting diodes) effect (a fake note detection
unit) was positioned in front of the camera. In any country, automatic methods for counterfeit
money note detection are essential. [19]

Gaikwad, Mayadevi et al. conduct an experiment where pattern matching was used to separate
authentic notes from false notes. It was explained that various denominations have distinct
templates; if the templates match the value, the note is authentic otherwise it iscounterfeit.The
input photos were preprocessed, which involved eliminating noise from the photographs and
performing a feature extraction technique to determine the denomination. The original note and
the phony note were then compared using pattern matching. [20]

Agasti,Tusharetal.researchedamethodforidentifyingcounterfeitmoneybeganwiththeimage
acquisition and continued with the computation of each extracted feature's intensity. Even ifthe
memo has scribbles on it, thealgorithmcanstillextractfeaturesfromit.Thisresearchsuggested a
method for determining whether a certain frequency is real or not. [21]

Tele, Gouri Sanjay used image processing techniques were used to identify original cash using
digital image processing algorithms. Based on physical characteristics, this system provided an
effective way to detect phony cash. With this, wemaybeabletoidentifytheparametersthatthe fake
note lacks in comparison to the authentic notes, which will help us to determine the given note is
real or not. [22]

Amirsab, Shaikh Ajig et al. proposed an example of a low-cost system that uses effective and
efficient digital image processing techniques and algorithms to detect counterfeit money. The
image processing techniques that were used in this project are- RGB to Grayscale conversion,
edge detection, sub divides the image into its constituent regions or objects, characteristic
extraction, characteristics comparison etc. [23]

Deepak,M.P.andN.B.Prajwalaperformedtheclassificationoforiginalnotesandfakenotesby pattern
matching. Different denominations have various templates, if the templates match the value, then
it is an original note, else it is a fake note. The images that were used as inputwere preprocessed
by removing of noise from the images and feature extraction technique was performed to identify
the denomination. Noise removal process was done either by linearfiltering or adaptive filtering.
At the time of preprocessing, the denominations were identified. Then, pattern matching was
done to compare between the original and the fake note. [24]

This article discussed the need for accurate and efficient methods to detectcounterfeitcurrency, as
the number of fake currency notes detected has increased in recent years. The articlehighlights
the limitations of traditional techniques and proposes the use of image processing algorithms for
reliable detection of counterfeit currency. Various image processing techniques and machine
learning algorithms such as artificial neural networks and support vector machines
have been used in the literature for this purpose. The literature suggests that image processing
techniques can provide accurate and reliable detection of counterfeit currency, but further
research is needed to improve their performance. [25]

Sawant, K. et al. used the K-means algorithm for feature clustering and SVM (support vector
machine) algorithm for data model training. Gaikwad et al. suggested a methodology based on
comparing visual features of real and fake notes. Nagpure et al. proposed a system using floral
designs on notes to distinguish between real and fake notes. Rathee et al. suggested using
supervised machinelearningalongwithimageprocessingtoincreaseprecision.Upadhyayaetal.
proved that logistic regression with image processing achieves accuracy above 99%. These
studies demonstrate the effectiveness of combining image processing and machine learning
techniques for detecting fake currency notes.[26]

Roy, V., Mishra et al. discussed the problem of detecting fake currency notes using image
processing techniques. The authors highlight the need for such a system in the current scenario
where counterfeiting of currency notes has become a widespread issue. They provide a brief
overview of the existing techniques for counterfeit detection and highlight their limitations,
including the need for specialized equipment and expertise. The authors then present their
proposed system, which uses image processing techniques to identify fake currencynotesbased
on certain features such as watermark, serial number, and texture. They also discuss the
implementation of the system and its performance evaluation, including the accuracy of the
system and its robustnessagainstvarioustypesofattacks.Finally,theauthorsconcludethattheir
system can provide a cost-effective and efficient solution for detecting fake currency notes.[27]

Chowdhury et al. proposed an automatic model for recognizing banknotes, independent of the
orientation ofbanknotes,usingimageprocessinganddeeplearningmethods.Thestudiesutilized
various techniques such as data augmentation, RGB values as features, and ReLU nonlinearity
operations to improve the accuracy of detecting fake notes. [28]

This paper mentionsfiveotherstudiesrelatedtodetectingfakecurrencyusingimageprocessing. The


first study by Ms. Monali Patil, Prof. Jayant Adhikari, and Prof. Rajesh Babu used the K- means
algorithm for feature clustering. The second study by Mayadevi A.Gaikwad,VaijinathV. Bhosle,
and Vaibhav D Patil suggested comparing the visual features of real and fake currency. The third
study by Renuka Nagpure, Shreya Sheety, and Trupti Ghotkar proposed using floral
designs on currency notes to distinguish between real andfakenotes.ThefourthstudybyNeeru
Rathee, Arun Kadian, Rajat Sachdeva, Vijul Dalel, and Yatin Jaie suggested using supervised
machine learning with image processing to improve detection accuracy. The fifth study by
Akanksha Upadhyaya, Vinod Shokeen, and Garima Srivastavafoundthatimageprocessingwith
logistic regression can achieve an accuracy of over 99%. [29]

Miss.I. Santhiya Irulappasamy included five papers on fake currency detection using image
processing techniques. Vipin Kumar Jain proposed a system for recognition of fake currency
using an Android mobile phone and hand-written character feature extraction. Amol A. Shirsat
andS.D.Bharkatproposedacurrencyrecognitionsystemconsistingofimageprocessing,feature
extraction, and classification using neural networks. S. S. Veling, Miss. Janhavi P. Sawal, and
Miss. Siddhi proposed a hyperspectral imaging system for fake Indian currency recognition.Prof.
Madhav Thigale and Lina Ladhane proposed a note-to-coin converter using image processing
and UV LED (Ultraviolet light-emitting diodes) and photodiode for fake note detection.
Deborah. Soniya Prathap proposed a system for fake currency detection using image
segmentation and feature extraction.[30]

Atchaya,Haranietal.focusedondifferenttechniquesusedforfrauddetection,particularlyinthe context
of currency and financial transactions. The methods discussed include neural networks, model-
based reasoning, watermarking, optically variable ink, fluorescence, and imageprocessing
techniques such as edge detection, feature extraction, and segmentation. The paper highlights the
importance of detecting fake currency as it can cause significant problems, and various
approaches are necessary to combat the issue effectively. The use of security features specific to
Indian currency is also discussed in this paper. Overall, the review presents a comprehensive
overview of different techniques and methods used for fraud detection in financial transactions.
[31]

Sruthi R. used various methods for detecting fake currency notes with machine learning and
image processing techniques. A transfer learned convolutional neural network has been used in
[3], achieving 81.5% accuracy for identifying real notes and 75% for counterfeit notes. An
ensemble of classifiers has been used in [5], with SVM (support vector machine) achieving the
highest accuracy of 82.7%. Edge detection techniques have been used in [8], achieving an
accuracy of 90.45%. Different preconfigured CNNs (convolutional neural network) have been
used for Indian currency recognition in [6]. KNN (K-Nearest Neighbors Algorithm), SVC
(support vector machine), and GBC (Genetic Bee Colony) havebeenusedin[7],withKNN(K-
Nearest Neighbors Algorithm) and GBC (Genetic Bee Colony) providinghigheraccuracyinthe
recognition task. OVD (Online Video Distributor) patches have been used in [9] to detect
counterfeit Philippine notes. [32]

Arun Anoop M et al. worked based on to remove Noise Patterns from Background a special
linear transformation function is adapted. This kinds of algorithm we typically use to solve the
problem in sequence and In this project, they actually work on the currencies. By making this
project they recognize fake currency boldly. [33]

Aakash S Patel et al. basically worked on the the Machine Learning Algorithms recognized for
Image processing and Detection. Training the machine using an already prepared dataset of
currency notes, which will containsampleimagesoffakeandrealcurrencynotes.Analyzingthe
content of the dataset, using the applied algorithm toextractrequiredfeatureswhichwillhelpin
recognizing other input images of similar format. [34]

Vidhi Roy, Mannadiar et al. used image processing techniques to identify original cash using
digital image processing algorithms. Image Acquisition, gray scale conversion, edge detection,
image segmentation and characteristics extraction are highly required to perform this project.[35]

Tushar Agasti, Pratik Wade and P Chitra applied here a simplealgorithmwhichworksproperly.


These kindsofrequirementsarehighlyrequiredtocompletethisproject.Acquisitionofimageof
currency note under ultravioletlightbysimpledigitalcameraorscanner.ImageacquiredisRGB image
and now is converted to grayscaleimage.Edgedetectionofwholegrayscaleimage.Now
characteristics features of the paper currency will be cropped and segmented. Intensity of each
feature is calculated. [36]

S.Mittal et al. basically used some algorithms such asCNNtocompletetheproject.Thesekinds of


algorithms are typically SIFT (Scale-Invariant Feature Transform), SUFT, ORB (Oriented FAST
and rotated BRIEF) etc. The accuracy ofthesystemisalmost85%.SIFT(Scale-Invariant Feature
Transform) stands for Scale Invariant Feature Transform and it is one of the most for most image
processing algorithms. Here points are detected and matched using the Euclidian
Distance. Speeded up Robust Features or theSURF(speededuprobustfeatures)inanalgorithm
present in computer vision that has numerous applications such as detection, recognition,
tracking, identification and extraction. The accuracy of the proposed system iscloseto95%.As the
name suggests it is a fusion of thetwootheralgorithmshere.ThesearetheFIRSTalgorithm and
BRIEF (Binary Robust Independent Elementary Features) algorithm. [37]

Aman Tekriwal, Prashant Mankani applied the SVM(SupportVectorMachine)algorithmwhich is


generally used to perform the tasks. SVMs (Support Vector Machine) are supervisedlearning
models with associated learning algorithms that analysis data used for classification and
regression analysis. The approximate accuracy is more that 90%. Given a set of training
examples, each marked as belonging to one or the other of two categories, an SVM (Support
Vector Machine) training algorithm builds amodelthatassignsnewexamplestoonecategoryor
other. [38]

Debang S.Gujarathi, Sushii V. Nikam, Prathmesh P.gogte descrbed the technique of the
authentication of currency by applying image processing. The complete methodology worksfor
100,500 and 1000 currency notes. This method is very simple and easy to implement. This
project will be helpful to those people who don’t have any knowledge about currency.[39]

Chinmay Bhurke, Meghana Sirdeshmukh included two modules: One is to identify the
type/country of the currency. The second is to determine the authenticity of the currency. The
fake currency module also determines whether a currency is fake or real by comparing the
metallic black strip present on the Indian notes. Both the modules work accurately andefficiently.
[40]
LiteratureSummary

Dataset Algorithm Result/discussion


Indiancurrencynote
GreyScalingalgorithm, By making this project they recognized fake
of 500 and 2000.
Edge currencies by taking advantage of cheaper and high
Detection quality equipment.[3]
algorithm
Imagetypedataset
KNNalgorithm,machine Theyanalyzedallrelatedexistingarchitecturesand
Source: Kaggle
discovered some flaws in the currently existing
Sampleitems:995 learning algorithms
system to recognize fake currencies.[12]

Imagetypedatasetof Image Scaling, Thisprojectenablesavisuallyimpairedpersonto


currencies binarization algorithm, detect whether the currency is original or fake.[4]
KNN classifier
Imagetypedatasetof Machine learning Thisprojecthelpstoobtainfalsemoneythrough image
currencies algorithms. processing.[5]
Imagetypedatasetof Canny edge detection They ended up using OpenCV along with python
currencies algorithm. programminglanguagetodetectfakecurrencies.[1]

Image type dataset of Digital image processing In this project, the authentication of currency is made
currencies algorithms are used. by applying image processing.[2]
Image type dataset TheK-meansclustering UsingK-Meansalgorithmwithseveralclustersequal to
Source: OpenML
sample items: 1,372. algorithm two can help to identify genuine or
forgedbanknotesefficiently.Accuracy:87%
Image type dataset, Data Augmentation, This CNN model (Mobilenetv2-FCD) has been
having 3 columns: Transfer Learning trained on a real time dataset and then deployed intoa
type, filter shape and algorithm mobile application to determine fake currencies.
input size. Accuracy: 85%.[11]
Sample items: 500
Imagetypedataset. CNN model training, asystemthatusesconvolutionalneuralnetworks using
Source: Kaggle currency pre-processing deep training to detect fake currencies.[10]
algorithm.
Image type dataset. Fluorescence, dimension usingimageprocessingtechniquestheydetectedthe
Detection and color
composition algorithm. fake currencies.[9]

Image type dataset. SML, Decision tree, Inthisproject,SMLalgorithmSVM,DT,andKNN


Sample items: 1372 KNN SVM algorithm. are applied to authenticate banknotes.[6]
Images ofIndian Deeplearningandneural Thedetectionofthecurrencyisdonewithinseconds and the
currency of 10, 20, network algorithms, recognition is done easily.[13]
50 and 100. CNN algorithm.
Sample items: 327

Image type dataset Digital image processing


Theproposedsystemseemstobeusefultodetect whether
algorithm
the currency is genuine or not.[7]
Image type dataset Digital image processing Thestudyincludeseffectivemethodforrecognizing the
algorithm properties to detect fake notes.[8]
Image type dataset of CNN model, deep Withtheuseofdeeplearningandimageprocessing,
Bangladeshi learning technique fake currencies are detected.[14]
currencies
Image type dataset of Digitalimageprocessing suggestedanapproachforidentifyingrealnotes using
Pakistani currencies algorithm. the image processing technique.[15]
Srilanka Rupee SIFT 95%isachievedwithnotedisplaysof100and500 note.
Notes of 100, 500, [16]
1000 and 2000

Total 10 different SUFT Theaccuracyofthesystemproposediscloseto


70%. Further implemented for the
data is used.
foreign currencies.[17]

MATLAB, SVM Approximately accuracy is more than 90%.[18]


Ultraviolet Ray and
differentnotes.
UV with digital Apply here a simple Theresultisn’tcontentment.Morefeaturesarehighly
camera or scanner, algorithm which works needed.[21]
RGB images properly.

11differentdatais ORB The accuracy of the system is more than 85%.[22]


used
1000 rupees note SVM Features hence it is considered as fake note.[25]
100, 500 rupees a simple algorithm was The system compares more features for feature
notes. applied extraction than other proposed systems.[28]
Approximately 10 CannyEdgedetection The accuracy of the system proposed above is close
data are used. Algorithm to 80%.[34]
ChapterThree
Methodology
DataDescription:

The banknote-authentication dataset is used to distinguish between genuine and counterfeit


banknotes. Images of real and fake banknote-like specimens were used to extract data from the
photos. These photos were processed and number of lines on a thin strip are measured. A
compressed version of the dataset from Kaggle was used in this experiment. There are 100
samples total. The model has been trained using 2000-rupee notes of cash from India.

To determine the dataset's input/output behavior for the system, an experiment was run. The
sample dataset utilized in the experiment is named and provided below:

Dataset Source Items Type

Indian Currency Kaggle 50 Image dataset


notesof2000-rupee

Table3.1:Dataset[Accessed05February2023]

RequirementAnalysis:

The implementation requirement details are given in this section.

Requirement Analysis method is intended in such a way that it takes fewer resources to figureout
work correctly. The minimum needsthatwe’dliketotakecareof:Thesystemwouldrequire a
minimum of 4 GB (Gigabyte) of RAM (Random Access memory) to run all the optionssleek and
unforeseen. It wantsaminimumof2GHz(Gigahertz)processortorunthesystemsmoothly. The system
can be operated by common people as well as commercial people.
HardwareSpecification:

Processor 2 GHz Intel

Storage 512GB

Ram 4GB

Table3.2:HardwareRequirements

SoftwareSpecification:

Operating System Windows7,8,10

Programming Language Python

IDE(Integrated Development Environment) VS Code

Table3.3:SoftwareRequirements

Python:

Python is an interpreter, object-oriented, high-level, dynamically semantic programming


language. ItisparticularlydesirableforRapidApplicationDevelopmentaswellasforusageasa
scripting or glue language to tie existing components together due to its high-level built-in data
structures, dynamic typing, and dynamic binding. Python's straightforward syntax prioritizes
readability andmakesitsimpletolearn,whichlowersthecostofprogrammaintenance.Python's
supportformodulesandpackagespromotes the modularity and reuse of code in programs. On all
popular platforms, the Python interpreter and the comprehensive standard library are freely
distributable and available in source or binary form. [41]

Python Libraries:

OpenCV:

OpenCV is a sizable open-source library for image processing, machine learning, andcomputer
vision. It now plays a significant partinreal-timeoperation,whichiscrucialinmodernsystems. With
it, one may analyze pictures and movies to find faces, objects, and even human handwriting. To
install OpenCV run the command - pip install opencv-python.Pythonisableto
handletheOpenCVarraystructureforanalysiswhenitisintegratedwithdifferentlibraries,such
as NumPy. We use vector space and apply mathematical operations to these features to identify
visual patterns and their various features. [42]

NumPy:

Many mathematical operations can be carried out on arrays with NumPy. It provides a vast
library of high-level mathematical functions that work on these arrays and matrices, as well as
strong data structures that ensure efficient calculations with arrays and matrices. To install
NumPy run the command - pip install numpy. [43]

VS Code:

Debugging, task execution, and version control are supported by the simplified code editor
Visual Studio Code. It tries to give developers only the tools they require for a short cycle of
code-build-debugging and leaves more sophisticated processes to IDEs with more features, like
Visual Studio IDE. [44]

FeaturesofCurrency

All features of Indian currency 2000 showing in fig

Fig 3.1: All security features of Indian currency 2000[3]


Portrait of Mahatma Gandhi at the Center:

Theintaglio printing of portrait of Mahatma Gandhi at the center of the currency.

Fig 3.2: Portrait of Mahatma Gandhi[1]

Security Thread:

When held up to the light, the security thread, which has "RBI" and "Bharat" inscribed on it
continually, can be seen at the left side of the watermark. The photo of the Mahatma has a
security thread on one side.

Fig 3.3: Security Thread[1]

Seethrough Register:

The denomination numeral is displayed inthesee-throughregister.Bothsidesofthisregisterare


printed. One side of the two sides is hollow, and theothersideisfilledwithmaterial.Themicro
lettering has been written horizontally along this register. The note hasalatentimageontheleft side.
Moreover, this register is shown above the latent image. When viewed in contrast to the light,
this register appears as a single design.

Fig 3.4: See through Register[1]


Ashoka Pillar:

Onthe right side of the coin there is a picture of the Ashoka pillar.

Fig 3.5: Ashoka Pillar[1]

Identification Mark:

Just over the Ashoka's pillar symbol, there is an identification mark.

Fig 3.6: Identification Mark[1]

Guarantee Clause:

LocatedtotherightofMahatmaGandhi'simage,theguaranteeclauseissignedbythegovernor and
includes a promise clause that is printed in intaglio.

Fig 3.7: Guarantee Clause[1]

CurrencyNumeralwiththeRupeesSymbol:

Fluorescentinkwillbeusedforprinting.Whenviewedfromdifferentperspectives,thenumerals change.

Fig 3.8: Currency Numeral with the Rupees Symbol[1]


Bleed Lines:

The oblique lines that protrude from the sides of banknotes are known as bleed lines.

Fig 3.9: Bleed Lines[1]

Latent Image of Denomination Numeral:

The right side of Mahatma Gandhi's portrait is bordered by a vertical band on the opposite
sideofthedenomination. A latent image of the corresponding denominational value is present in
it. Its denominational value is represented by a numerical value. The latent picture can be
seenwhenthecoinisheldhorizontally,anditshouldalsobeheldateyelevel.Whileusingcounterfeit
money, it is not noticeable.

Fig 3.10: Latent Image of Denomination Numeral[1]

MicroLettering:

BetweentheverticalbandandtheimageofMahatmaGandhi,microletteringisvisible.Theterm "RBI"
and the denominational value are written in tiny letters. The micro letters on counterfeit money
are incorrectly printed.

Fig3.11.MicroLettering[1]
Government of India:

The words "Government of India" are printed at the top of the one rupee note, directly overthe
Devanagari-scripted number one. The smallest currency note now in useinIndiais1rupee,andit is
the only one that was produced bytheGovernmentofIndiaratherthantheReserveBankof India like
the others. Because of this, it is the only one with the Finance Secretary's signature rather than
the RBI Governor's.

Fig 3.12. Government of India[1]

RequiredAlgorithm:

Image acquisition:

The act of obtaining an image from sources is known as image acquisition. Hardware systems
like cameras, encoders, sensors, etc. can be used to do this. It is without a doubt the most
important phase in the MV (Machine Version) workflow because a bad image would make the
workflow ineffective as a whole. As machine vision systems don't study the acquired digital
image of the object and not the object itself, acquiring an image with the proper clarity and
contrast is crucial. A set of photo-sensitive sensors turn an object's incoming light wave into an
electrical signal during the image acquisition step. These little components provide the function
of accurately describing the object to your machine vision algorithms.It'safrequentfallacythat
with an MV system, choosing the correct colors is crucial. However it's not always the case.
Colors frequently increase noise and makedetectionmorechallenging.Themainobjectiveofan
imageacquisitionsystemistoincreasecontrastfortheimportantfeatures.Theidealimageisone in which
the camera can clearly see the object of interest. [45]
The major image acquisition components have been mentioned below:

1. Trigger
2. Camera
3. Optics
4. Illumination

RGB to Grayscale:

Taking the average of the red, green, and blue pixelvaluesforeachpixeltoobtainthegrayscale value
is a straightforward technique to convert a color image's 3D array to a grayscale image's2D
array. This creates an approximate gray color by combining the lightness or brightness
contributions from each color band. [46]

TheAveragemethodtakestheaveragevalueofR,G,andBasthegrayscalevalue.[47] Grayscale = (R +

G+B)/3

Theweightedmethod,alsocalledtheluminositymethod,weighsred,green,andblueaccording to their
wavelengths. The improved formula is as follows:

Grayscale = 0.299R + 0.587G + 0.114B

Image Segmentation:

Image segmentation is a technique for breaking up a digital imageintosmallergroupingscalled


image segments, which reduces the complexity of the image and makes each segment more
easily processed or analyzed. Technically, segmentation is the process of giving labels to pixels
in an image in order to distinguish between objects, persons, orothersignificantaspects.Object
detection is a frequent use of image segmentation. It is usual practice to first apply an image
segmentation method to discover things of interest in the image before processing the complete
image. The object detector can then work with a bounding box that the segmentation algorithm
has previously established. By stopping the detector from processing the entire image,accuracyis
increased and inference time is decreased. A crucial component of computer vision technologies
and algorithms is image segmentation. It is employed in a variety of real-world
contexts, including as face identification and recognition in video surveillance, medical image
analysis, computer vision for autonomous cars, and satellite image analysis.[48]

FeatureMeasurement:

The process of "feature detection" involves computing abstractions of image data and locally
determining whether or not each image point contains an image feature of a specific type. A
fundamental aspect of image processing is feature detection. This meansthatitistypicallydone
astheinitial operation on an image and checks each pixel to see if a feature is present there. If this
is acomponentofabiggeralgorithm,thealgorithmwillusuallyjustlookattheimagewhere the features
are. The term "feature description" refers to a technique for describing the local attributes of an
image at identified key points in an image. These algorithms take advantage of key points
discovered in the image data to extract interesting information. The information produced by
these feature description techniques is frequently organized by encoding it as the constituent
parts of a single vector, or feature vector. A feature space is the collection of all feasible feature
vectors. [49]

Finding Correlation:

For finding Correlation of two images we have to follow this steps:

1. Load two images and extract their pixel-by-pixel information


2. Normalize and down sample the pixel information
3. Calculate cross-correlation using the processed pixel information
4. Generatevisualsummariesofcross-correlation,highlightingareasofmaximumimage
overlap. [50]
Flowchart:

Fig 3.13: Block Diagram of Fake Currency Detection


WorkflowofProposedSystem:

1. Image Acquisition: The model receives the image. Images should be present: the note
you're trying to identify and its real-world counterpart. Picture capture of an Indian
banknote with a basic digital camera or scanner.

2. RGB to GRAYSCALE: Acquired picture is A GRAYSCALE image is created by


converting an RGB image. The RGB image is dense and noisier. Instead of processing
threecomponentsR(Red),G(Green),andB,theimageisreducedinsizeandgainseasy- to-
process intensity information when it is converted to gray scale (Blue).

3. Segmentation: Gandhi Ji's image and a narrow strip image are cropped fromtheoriginal
image. The observe and reverse aspects of the Indian paper currency willbeclippedand
split. The technique of segmenting an image into separate segments and sets of pixelsis
done digitally.Itisalsoknownas"picturethresholding,"whereathresholdissetand,ifa specific
pixel's value exceeds it, the pixel turns white; otherwise, it turns black.
4. Feature Measurement: Feature measurement is done to measure thenumberoflinesona
thin strip. This is a really lengthy process.

5. Finding Correlation: We find correlation between Gandhi Ji’s image on the real note &
fake note using distance-weighted algorithm. If the outcome is greater than 0.5 then we
will consider it legitimate otherwise the currency is fake.

6. Classification:Finally,wewillclassifytheimageasrealorfake

ImplementationStepsofProposed System:

1. At first, OpenCV was used to read the real and fake photos after importing the Modules.
2. The colorful image was then changed to black and white because a black and whiteimage
makes it simpler to identify key aspects.
3. Then Gandhi Ji's picturewasbeingtakenfromtheoriginalnote.Thecoordinatesmustbe
changed each time Gandhi Ji's image is extracted. The same thing also be done for fake
notes.
4. Then the thin strip was extracted from the real and fake notes.
5. Then the image was being converted to HSV (Hue Saturation Value). Simple terms, the
format is different. A numerical evaluation of the color in the photograph iscalledHSV.
The unit of measurement is degrees. Hue in RGB is the direction that the colors are
facing.
6. Then, the thin strip was extracted from the HSV images and fake images.
7. Then, the thresh value was specifiedinthiscase,andonlyvaluesmorethanthespecified values
were extracted from the cropped image. The '&'ofbothvalueswillthenbetaken. The goal of
the entire procedure was to extract the thin strip's lines from the thin strip image.
8. Bwareaopen is a function that will find the connectivity in a picture. It will be used to
determine how many lines there are in a short strip. It will be employed later on in the
procedure.
9. Then, the code for morphologically extracting the thin strip image can be seen. Thisisa
crucial step in determining the amount of lines in an image.
10. Then Bwareaopen function for the thin strip was used.
11. In next step, final counting of the number of lines in real and fake note was made.
12. A correlation function was being defined. This correlation function to our Gandhi Ji
image was applied. Simply said, we were looking to compare Gandhi Ji's image on the
real andfalsephotos.Thiswillaccepttwotwo-dimensionalmatricesasinputandreturna
resultintheformofanumberbetween0and1.GandhiJi'sphotoonafakenoteislegal if the
outcome is larger than 0.5; otherwise, it is not.
13. Lastly the correlation function was being used. Also, we were building our code to
determine whether or not the correlation value is greater than 0.5. If it islargerthan0.5,
then we were determining whether or not there are an equal number of lines.
Chapter Four

ResultsandDiscussion

4.1ResultsandDiscussion

Results:

There are other ways to detect if the money is phony or not, but they all follow the same basic
stages. Image capture, edge recognition, segmentation, grayscale conversion, and feature
extraction are among them. Most of the articles use MATLAB as their computation tool,however
we ultimately used OpenCV and Python as our programming language. To perform comparisons
and determine the outcome, a number of characteristics that identify genuine currency apart from
counterfeit ones are taken into account.

We are aware that these tools are used at banks and businesses to help identify counterfeit money,
but the average person who lacks these resources is susceptible to this. Our goal is to offer a low-
cost system with quick computations thatcanmakedecisionsinamatterofseconds. The entire
process ought to function for Indian denomination 2000. It would be simple for the general
publictouse,relativelyportable,andreasonablypriced.Themodelhassomelimitations. We can get at
most 81% of accuracy which may be sufficient. However, it is still more precise than human
detection. It can currently be utilized as an additional tooltolessenhumanmistake. Additionally,
the model's accuracy can be increased any further with more data and better analysis.

Accuracy: The percentage of accurately classified data samples over all the data is known as
accuracy. Accuracy can be calculated by the following equation. [52]

Accuracy = (TP+TN)/(TP+FP+TN+FN)
Discussion:

The comparision between accuracy that we found in our project with others project:

Nameof Big Data Mobilene Detectionof Areviewof Areviewof Fake


Paper Analyticsto t fake Fake Fake Currency
Authenticat V2-FCD: currency Currency Currency Detection
e Bank Fake usingimage Recognitio Recognitio
[our
NotesUsing Currency processing n Methods n Methods
Propose
K- Means Note
[29] [32] [32] d
Clustering Detectio
system]
n
[11]
[10]
Algorithm Algorithm: Algorithm: Algorithm: Algorithm: Algorithm: Algorithm:

K-Means CNN K-means SVM Edge Distance


Clustering algorith detectio -
m n weighted
Accuracy 87% 85% 99% 82.7% 90.45% 81%
ChapterFive

Conclusion

Advantages

● The application will be very helpful in identifying counterfeit money.


● The software is simple to use and accessible.
● Itwilllessen theuser'seffort andsave time.
● Itprovidestheusermethodsthataremoreaffordable,accurate,andgiveaccurate
recognition of money notes.

Restriction:

● Thisprojectcannotbeabletodetectthecurrencieswhetheritisfakeornot,ofother countries
except India.
● Thisprojectisonlyabletodetectthecurrencieswhetheritisfakeornotwith
denomination 2000 of Indian rupees.

FutureScope

● This project cannot be able to detect the currencies ofothercountriesexceptIndia.Soin the


future we can make this project possible to detect the currencies of other countries also.
● This project is only able to detect the currencies whether it is fake or not with
denomination 2000 of Indian rupees. So in the future we canmakeitpossiblethatitwill
detect the currencies with all denomination.
● In this project, we worked using a few features ofthecurrencies.Sointhefuturewecan be
able to work with all features of currencies to increase the accuracy of the project.
Reference

1. Colaco, Rencita Maria, Rieona Fernandes, and S. Sowmya. "Efficient Image Processing
Technique for Authentication of Indian Paper Currency."2021 International Conference
on Computer Communication and Informatics (ICCCI). IEEE, 2021.
2. Vadnere, G. V., Khilari, S. A., Sonawane, H. P., sharad Sanap, P., Koneri, A. M., &
Shinde, M. J. Indian Currency Identification UsingImageProcessing.Journalhomepage:
www. ijrpr. com ISSN, 2582, 7421.
3. Jamkhandikar, Dayanand, Sahana Kaveri, and V. Poojashree Sudharani."IndianCurrency
Recognition System."(2021).
4. Sangogi, Mrs Jyoti, Ms Prachi Patil, and Ms Anuradha Jadhav. "FAKE CURRENCY
DETECTION USING IMAGE PROCESSING."
5. Shiby, Ashik, Fevitha Francis, Philip Jose, and Rintu Augustine. "FAKE CURRENCY
DETECTION USING IMAGE PROCESSING."
6. Warke,K.S.,Kanthi,R.,Makadia,D.,Mogarkar,S.,&Pawar,P.(2022).COUNTERFEIT
CURRENCY DETECTION USING IMAGE PROCESSING
7. Patil, Deepika P., Girija Varma, Shweta Poojary, Shraddha Sawant, and Aditya Sharma.
"Counterfeit Currency Detection based on AI."
8. Kudalkar et al., “Fake Currency DetectionUsingImageProcessing”.AIJRPreprints,388,
Version 1, 2022.
9. Pallavi, S., et al. "FAKE CURRENCY DETECTION."International Research Journalof
Modernization in Engineering Technology and Science (4076-4081) 4.06 (2022).
10. Potluri, T., Jahnavi, S., Motupalli, R. (2021). Mobilenet V2-FCD: Fake Currency Note
Detection. In: Luhach, A.K., Jat, D.S., Bin Ghazali, K.H., Gao, XZ., Lingras, P. (eds)
Advanced Informatics for Computing Research. ICAICR 2020. Communications in
Computer and Information Science, vol 1393. Springer, Singapore.
11. Khan, Mudassir, and Mahtab Alam. "Big Data Analytics to Authenticate Bank Notes
Using K-Means Clustering."Helix-The Scientific Explorer Peer Reviewed Bimonthly
International Journal 11.3 (2021): 1-6.
12. Vidhate, A., Shah, Y., Biyani, R., Keshri, H., & Nikhare, R. Fake Currency Detection
Application-Know Your Currency! PCE JCE_, 25.
13. Kumar, P. V., Akhila, V., Sushmitha, B., & Anusha, K.DetectionofFakeCurrencyUsing
KNN Algorithm.
14. NR, Deepak. "A Review on Fake currency detection using feature extraction."Availableat
SSRN 4041599 (2022).
15. Siddiki, Marjuk Ahmed, et al. "Bangladeshi Currency Identification and Fraudulence
Detection Using Deep Learning and Feature Extraction." (2023).
16. Naseem, Syeda Aimen, et al. "Counterfeit Recognition of Pakistani Currency."KIET
Journal of Computing and Information Sciences 6.1 (2023): 123-147.
17. Saxena, Ankur, et al. "Fake currency detection using image processing."Int J Eng
Technology (UAE) 7 (2018): 199-205
18. Kanojia, Mahendra, Niketa Gandhi, and Amruta Rane. "Recognition and verification of
Indian currency notes using digital image processing."JOURNAL OF INFORMATION
ASSURANCE AND SECURITY 13.1 (2018): 30-37.
19. Shah, Raj, Mayank Champaneri, and Pujan Sheth. "Currency Counting Fake Note
Detection."Pujan and Gaikwad (Mohite), Vaishali, Currency Counting Fake Note
Detection (October 30, 2018).
20. Gaikwad, Mayadevi A., Vaijinath V. Bhosle, and Vaibhav D. Patil. "Automatic Indian
New Fake Currency Detection."International Journal of Engineering Research &
Technology (IJERT) 6.11 (2017).
21. Agasti, Tushar, et al. "Fake currency detection using image processing."IOP Conference
Series: Materials Science and Engineering. Vol. 263. No. 5. IOP Publishing, 2017.
22. Tele, Gouri Sanjay, et al. "Detection of fake Indian currency."International Journal of
Advance Research, Ideas and Innovations in Technology 4.2 (2018): 170-176.
23. Amirsab, Shaikh Ajij, Mohammad Mudassir, and Mohammad Ismail. "An automated
recognition of fake or destroyed Indian currency notes."International journal ofadvance
scientific research and engineering trends volume 2.7 (2017).
24. Deepak, M. P., and N. B. Prajwala. "Identification of fake notes and denomination
recognition."2018 International Conference on Communication and Signal Processing
(ICCSP). IEEE, 2018.
25. Reserve Bank of India. Annual Report 2018-19. Available online:
https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/ANRP201920F2210F9814A5B4A5B5E
5A5EF9BE9EDAB43.PDF (accessed on 1 July 2021).
26. Sawant, K. and More, C. (2016) "Currency Recognition Using Image Processing and
Minimum Distance Classifier Technique," International Journal ofAdvancedEngineering
Research and Science (IJAERS), Vol. 3, Issue 9, pp. 1-5. ISSN: 2349-6495.
27. Roy, V., Mishra, G., Mannadiar, R., & Patil, S. (2019). Fake Currency Detection Using
Image Processing. International Journal of Computer Science and Mobile Computing,
8(4), 88-93. ISSN 2320-088X.
28. Sonali R. Darade, Prof. G. R. Gidveer, “Automatic Recognition of Fake Indian Currency
Note”, 2016 International Conference on Electrical Power andEnergySystems(ICEPES)
Maulana Azad National Institute of Technology,Bhopal, India. Dec 15-16, 2016
29. Singh,A.(2019).Detectionoffakecurrencyusingimageprocessing.InternationalJournal of
Engineering Research & Technology, 8(12).
30. Miss.I. Santhiya Irulappasamy. "Research on Fake Indian Currency Note Detection using
Image Processing." International Journal of Scientific Development and Research
(IJSDR), vol. 6, issue 3, March 2021, pp. 196. ISSN: 2455-2631.
31. Atchaya, S., Harini, K., Kaviarasi, G., & Swathi, B. (2016). Fake Currency Detection
Using Image Processing. International Journal of Trend in Research and Development
(IJTRD), ISSN: 2394-9333.
32. Sruthy R. (2022) "A review of Fake Currency Recognition Methods". International
Research Journal of Engineering and Technology (IRJET), Volume 09, Issue 07. ISSN:
2395-0056.
33. Arun Anoop M, “ Study in multimedia Security: Multimedia Forgery Detection and
History A survey”, International Journal of Printing Packaging and Allited Sciences, vol
4,No 4, December 2016.
34. Aakash S Patel,”Indian Paper Currency Detection” International Journal for Scientific
Research and Development(IJSRD), vol 7, issue 06, ISSN : 2321-0613 (June 2019)
35. Vidhi Roy: Gangey Mishra;Rahul Mannadiar; Sushant Patil “Fake currency detection
using image processing” (ICCSP). IEEE, 2019.
36. Tushar Agasti, Pratik Wade and P Chitra “Fake currency detection using image
processing” (ICCSP). IEEE, 2017.
37. S.Mittal, Indian Banknote Recogniton using Convolutional Neural Network, IEEE, 3 rd
International Conference on Internet of things. (2018)
38. Aman Tekriwal, Prashant Mankani detection of fake currency."International Journal of
Engineering Research & Technology (IJERT) 6.11 (2017).
39. Devang S.Gujarathi, Sushii V.Nikam,PrathmeshP.gogte,currencyrecognitionsystemfor
using image processing ."International journal of advance scientific research and
engineering trends volume 2.7 (2017).
40. Bhurke, Chinmay, Meghana Sirdeshmukh, and M. S. Kanitkar. "Currency recognition
using image processing." Int. J. Innov. Res. Comput. Commun. Eng 3 (2015): 4418-4422.
41. Weblink:“https://www.python.org/doc/essays/blurb/”.Accessed28February2023
42. Weblink:“https://www.geeksforgeeks.org/opencv-overview/”.Accessed30February
2023
43. Weblink:“https://numpy.org/doc/stable/user/absolute_beginners.html”.Accessed28
February 2023
44. Web link: “https://code.visualstudio.com/docs/supporting/FAQ#:~:text=Visual%20Studio
%20Code
%20is%20a,such%20as%20Visual%20Studio%20IDE”.Accessed27February2023.
45. Web link: “https://qualitastech.com/image-acquisition/image-acquisition-in-machine-
vision-trigger- mechanism/#:~:text=What%20is%20Image%20Acquisition%3F,render
%20the%20entire
%20workflow%20useless”. Accessed 26 February 2023
46. Weblink:“https://e2eml.school/convert_rgb_to_grayscale.html”.Accessed28February
2023
47. Web link: “https://www.dynamsoft.com/blog/insights/image-processing/image-rocessing-
101-color-space-conversion/”.Accessed 28 February 2023
48. Web Link: “https://datagen.tech/guides/image-annotation/image-
segmentation/#:~:text=Image%20segmentation%20is%20a%20method,analysis%20of%2
0each%20image%20segment”. Accessed 26 February 2023.
49. Truong, Mai Thanh Nhat, and Sanghoon Kim. "A review on image feature detection and
description."Proceedings of the KoreaInformationProcessingSocietyConference.Korea
Information Processing Society, 2016.
50. Weblink:“https://observablehq.com/@lemonnish/cross-correlation-of-2-images”.
Accessed 26 February 2023.
51. WebLink:“https://www.rbi.org.in”.Accessed30February2023.
52. Samia, Moythry Manir, et al. "Aspect-based Sentiment Analysis for Bengali Text using
BidirectionalEncoderRepresentationsfromTransformers(BERT)."InternationalJournalof
Advanced Computer Science and Applications 13.12 (2022).

You might also like