Fake Currency Detection Using Image Processing
Fake Currency Detection Using Image Processing
Pimpri Chinchwad College of Engineering (PCCOE), Pune, India. Aug 18-19, 2023
Abstract—Advancements in color printing have led to a rise have been advocating for the development of a reliable and
in the number of counterfeit currency notes being created and effective cash identification system. Nowadays, it is very
duplicated on a massive scale. In the past, it was very difficult common to see machines that can identify banknotes in the
to do this, but now anyone with a laser printer can easily do it.
Due to the rise of fake notes, the number of counterfeit currency vending machines of various types of goods, such as soft
notes has increased significantly in India. This is a major issue drinks, candies, and train tickets. The goal of this system is
that the country is facing due to its various problems such as to extract the necessary information from the currency notes.
black money and corruption. A system that can detect the fake Although there are many methods that are currently being used
currency notes in a fraction of the time is being developed. to identify the notes, the ideal method is to use the multiple
The proposed system will use image processing techniques to
verify the authenticity of Indian currency notes. This method characteristics of the note [11]. For instance, the size and color
will involve extracting various features from the notes. Some of the note are two of the most common factors that are used
of these include the Bleed Line, Water marking, Fluorescence, to determine its authenticity. Unfortunately, this method is not
Security thread, Micro Lettering, and Identification mark. The effective because dirty notes have significantly altered their
proposed system is using software known as MATLAB. The color. In order to improve the accuracy of the system, it must
Support vector machine is a supervised learning model that is
used for extracting the notes’ features. It is also used for analyzing first extract the relevant features from the image.
data related to regression and classification. We have also tested
the other methods related to this proposed work, such as the
graphical black Box algorithm. The proposed system has various II. M ETHODOLOGY
advantages, such as its high-performance speed and simplicity. It
will be able to determine if the currency notes are real or fake. The proposed system as shown in below Fig. 1, can perform
Its accuracy is also measured using the Confusion Matrix.
this task. It uses the captured image of the note under
Index Terms—Image processing, SVM, counterfeiting, fake
currency detection ultraviolet light. Currency notes can be captured by a digital
camera using the ultraviolet light [2]. The captured image is
I. I NTRODUCTION then converted into grayscale using a process known as Edge
Due to the increasing demand for banknote recognition detection. The paper currency’s features are then segmented
systems, researchers have been developing various robust and and cropped. The intensity of the extracted features is then
dependable methods to automate the process. One of the calculated and the note is declared to be real if the condition
most common goals of these systems is to ensure that the is satisfied.
accuracy and speed of the recognition are maintained. Various
applications, such as vending machines and selling goods,
require banknote recognition software [9]. In order to ensure
that the system is reliable and accurate, it must be able to
extract the necessary data from the currency [1]. This is very
challenging for system designers due to the complexity of the
task. The proposed system can be easily implemented using
the Matlab software. The output will determine if the note is
fake. Due to the rapid technological advancements that have
occurred in the financial sector, the need for automatic cash
identification has become more important. This is especially Fig. 1: System Architecture of proposed system.
true in vending machines and sales machines. Researchers
E. Feature Extraction
Feature extraction is a process that involves reducing the
dimensionality of an image [8]. It allows users to see the
Fig. 3: Gray Scale Conversion.
appealing parts of the image as a compact feature. This method
can be useful when it comes to performing various tasks,
such as searching for and matching pictures [7]. The following
D. Image Segmentation features are being extracted from currency.
In order to process the collected information, segmentation 1) Security Thread: The security thread of the Rs. 2000
is performed. This process involves breaking down the image note is readable and features the inscriptions ”RBI”, ”2000”,
into sections that correspond to objects. and ”Bharat” in Hindi. This design feature indicates that the
2
Authorized licensed use limited to: Marathwada Mitra Mandal's College of Engg. Downloaded on August 22,2024 at 08:47:57 UTC from IEEE Xplore. Restrictions apply.
banknote’s color changes as it is tilted as shown in below fig.8.
On the other hand, the security thread of the Rs.100 and 500
notes has similar inscriptions [4].
When held up to the light, the security threads of Rs.2000,
Rs.500, and Rs.100 notes can be seen as continuous lines. In
addition, the embedded security threads of Rs.10, Rs.20, and
Rs.50 notes feature the inscriptions ”Bharat” and ”RBI.”
2) Serial Number: The bottom left and top right sides of the
note have a panel that displays the serial numbers of banknotes
as shown in Fig. 9.
F. Image Evaluation
An image analysis is a process that involves breaking
down a picture into its basic elements. This can help retrieve
information such as the type of objects in the image and their
properties.
Fig. 9: Serial Number.
G. Classification Using Support Vector Machine
3) Latent Image: The front side of a currency bill features a After collecting the various features of banknote images,
vertical band that contains a latent image of the denomination it is important that the banknote pattern is identified by the
[12]. It can be seen when the bill is held horizontal as shown extracted characteristics. This paper proposes a method that
in below Fig. 10. uses a classifier to identify the appropriate banknote pattern.
This method is commonly used in support vector machine
analysis [14]. The proposed method can be used to identify
counterfeit banknotes by training the classifier on images that
have been pre-processed. In a working scenario, a banknote
image is taken by a scanner or mobile camera. After going
through the various features of the image, the classifier is able
to identify the genuine notes.
3
Authorized licensed use limited to: Marathwada Mitra Mandal's College of Engg. Downloaded on August 22,2024 at 08:47:57 UTC from IEEE Xplore. Restrictions apply.
Fig. 16: Edge Detection.
Fig. 13: Input Image.
4
Authorized licensed use limited to: Marathwada Mitra Mandal's College of Engg. Downloaded on August 22,2024 at 08:47:57 UTC from IEEE Xplore. Restrictions apply.
true positive indicates that the prediction accurately identified
the notes, while the false positive shows that the algorithm
identified the non-100 rupee notes incorrectly.
TABLE I: Algorithm Accuracy Comparison. Fig. 22: Graph for Rs. 200 Note Accuracy.
Algorithm Accuracy Precision F-Score A confusion matrix graph for the accuracy of a 200 rupee
Proposed(SVM) 99.9 99.9 99.9 note detection algorithm would display the true positive,
SVC 97.5 99.7 98.6 false positive, true negative, and false negative rates for the
GBC 99.4 99.9 99.7 algorithm’s predictions. The true positive rate represents the
percentage of actual 200-rupee notes that the algorithm cor-
rectly identified as such, while the false positive rate represents
the percentage of non-200-rupee notes that the algorithm
incorrectly identified as 200-rupee notes.
TABLE II: Note Type and their Detection Rate Value
Fig. 21: Graph for Rs. 100 Note Accuracy. Fig. 23: Graph For 500 Note Accuracy.
A representation of the accuracy of an algorithm for de- The accuracy of an algorithm that detects the value of 500
tecting 100 rupee notes shows the predicted false negatives, rupee notes is depicted in a matrix with the predicted false
true positives, true positive, and false negative rates. The negatives, true negatives, false positives, and true positive
5
Authorized licensed use limited to: Marathwada Mitra Mandal's College of Engg. Downloaded on August 22,2024 at 08:47:57 UTC from IEEE Xplore. Restrictions apply.
rates. The false positive indicates that the prediction is able [8] C. Shewale, S. B. Shinde, Y. B. Gurav, R. J. Partil, and S. U. Kadam,
to identify the notes accurately, while the true positive shows “Compiler optimization prediction with new self-improved optimization
model,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 2, 2023.
that the algorithm is able to identify the non-500 rupee notes [9] M. N. Shende and P. P. Patil, “A Review on Fake Currency Detection
incorrectly. using Image Processing,” Int J Futur Revolut Comput Sci Commun Eng,
vol. 4, no. 1, pp. 391–393, 2018.
[10] Arya and D. M. Sasikumar, “Fake currency detection,” in 2019 Interna-
tional Conference on Recent Advances in Energy-efficient Computing
and Communication (ICRAECC), 2019.
[11] S. Khoje and S. Shinde, “Evaluation of ripplet transform as a texture
characterization for Iris recognition,” J. Inst. Eng. (India) Ser. B, vol.
104, no. 2, pp. 369–380, 2023.
[12] K. Sawant and C. More, “Currency recognition using image processing
and minimum distance classifier technique,” Int. J. Adv. Eng. Res. Sci.,
vol. 3, no. 9, pp. 1–8, 2016.
[13] K. B. Zende, B. Kokare, S. Pise, and P. S. Togrikar, “Fake Note Detection
System,” IJIRT, vol. 4, pp. 46–49, 2017.
[14] S. B. Shinde, M. Alagirisamy, K. Wagh, and P. Dhore, “Math accessi-
bility for blind people in society using machine learning,” ECS Trans.,
vol. 107, no. 1, pp. 18071–18090, 2022.
[15] A. Ali and M. Manzoor, “Recognition system for Pakistani paper cur-
rency,” Res. J. Appl. Sci. Eng. Technol., vol. 6, no. 16, pp. 3078–3085,
2013.
Fig. 24: Graph For 2000 Note Accuracy.
6
Authorized licensed use limited to: Marathwada Mitra Mandal's College of Engg. Downloaded on August 22,2024 at 08:47:57 UTC from IEEE Xplore. Restrictions apply.