earticle

논문검색

Detection Method for Counterfeit Currency Based on Bit-Plane Slicing Technique

초록

영어

Counterfeiting and forging currencies is a serious threat to any economy. Even though currency exists as a variation of coins, banknotes, and electronic data, many economies remain threatened by counterfeiting which is made possible by the ongoing technological advancements in reprographic equipment available to the general public. Clearly, counterfeit currency detection is not a task that can be neglected. Digital image processing is one of the most common and effective techniques used to distinguish counterfeit banknotes from genuine ones. A new approach is presented in this paper using the bit-plane slicing technique to extract the most significant data from counterfeit banknote images with the application of an edge detector algorithm. The proposed technique consists of decomposing original images of 256 gray levels into their equivalent 8 binary images. This is useful in analyzing the relative importance contributed by each bit of the original image. Higher order bit levels are evaluated for grayscale banknote images with the application of Canny edge detection algorithm. The results are then compared with genuine banknotes and with other existing techniques used for detecting counterfeit notes. Unlike existing research, it was observed that the edges obtained using bit-plane sliced images are more accurate and can be detected faster than obtaining them from the original image without being sliced. The detection of counterfeit currency was also achieved by following the process of using Canny edge detection, image segmentation, and feature extraction.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Background
  3.1. Counterfeit Currency
  3.2. Digital Image Processing
 4. Problem Definition
 5. Methodology
  5.1. Image Acquisition
  5.2. Pre-Processing
  5.3. Bit-Plane Slicing
  5.4. Edge Detection
  5.5. Image Segmentation
  5.6. Feature Extraction
 6. Evaluation
  6.1. Performance Metrics
  6.2. Experimental Setup
  6.3. Case Study
 7. Discussion
 8. Conclusion and Future Work
 References

저자정보

  • Mohammad H Alshayeji Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait
  • Mohammad Al-Rousan Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait
  • Dunya T. Hassoun Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.