An Automated Recognition of Fake or Destroyed Indian Currency Notes Using Image Processing
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 10
Abstract
In India Every year RBI (Reserve bank of India) face the problem on counterfeit currency notes. The bank staffs are specially trained to detect counterfeit notes but problem begins once such notes are mixed into the market and circulated through common people. Even receiving fake notes from ATM counters have also been reported at some places. Over the past few years, as a result of the great technology come advances in color printing, duplicating and scanning counterfeiting problems become increases. In the previous, only the printing house has the ability to make counterfeit paper currency, but today it is possible for any person to print counterfeit bank notes simply by using a computer and a laser printer at house. Therefore to stop these issue The Indian currency notes recognition system is very useful .In order to deal with such type of problems, an automated Recognition of currency notes is introduced with the help of feature Extraction, classification based on Image processing .This technique is considered with the computer vision where all processing with the image is done by machine. The machine is fitted with a camera (scanner) which will scan the image of the currency note considering the dimensions of the banknote and software will process the image segments with the help of character recognition methods. To implement this design we are dealing with MATLAB Tool
Authors and Affiliations
Mohd Mudassir Mohd Ismail*
CIRCULAR SRR LOADED UWB ANTENNA WITH WiMAX BAND NOTCH
Now a day’s UWB antenna design is one of the challenging areas. This paper proposes a simple method for filtering out 3.5GHz WiMAX band which is an already allocated band in UWB spectrum. Single circular Split Rin...
EVALUATING PERFORMANCE AND SECURITY OF WPA USING SHA1
Wirelesses Local Area Networks (WLANs) have become more common and are widely used in many places like university campuses etc. With Growing popularity, the security of wireless network has become very important issue...
Value Decomposition and Dimension Selection in Multi-Dimensional Datasets using Map-Reduce Operation
The datasets which are in the form of object-attribute-time format is referred to as three-dimensional (3D) data sets. Clustering these three-dimensional (3D) data sets is a difficult task. So the subspace cluster...
Nodes Self-Scheduling Approach for Maximising Wireless Sensor Network Lifetime
Coverage and energy conservation are two major issues in wireless sensor networks (WSNs), especially when sensors are randomly deployed in large areas. In such WSNs, sensors are equipped with limited lifetime bat...
Automatic Test case Generation from UML Activity Diagrams
Test Case Generation is an important phase in software development. Nowadays much of the research is done on UML diagrams for generating test cases. Activity diagrams are different from flow diagrams in the fact t...