Abstract
Counterfeit currency varies from low quality color scanner/printer-based notes to high quality counterfeits whose production is sponsored by hostile states. Due to their harmful effect on the economy, detecting counterfeit currency notes is a task of national importance. However, automated approaches for counterfeit currency detection are effective only for low quality counterfeits; manual examination is required to detect high quality counterfeits. Furthermore, no automatic method exists for the more complex – and important – problem of identifying the source of counterfeit notes. This paper describes an efficient automatic framework for detecting counterfeit currency notes. Also, it presents a classification framework for linking genuine notes to their source printing presses. Experimental results demonstrate that the detection and classification frameworks have a high degree of accuracy. Moreover, the approach can be used to link high quality fake Indian currency notes to their unauthorized sources.
Chapter PDF
Similar content being viewed by others
References
C. Chang, T. Yu and H. Yen, Paper currency verification with support vector machines, Proceedings of the Third IEEE International Conference on Signal-Image Technologies and Internet-Based Systems, pp. 860–865, 2007.
S. Gupta, D. Handa, R. Singh and K. Kumar, Forensic identification of Rs. 1,000 – Awareness for genuineness, CBI Bulletin, pp. 41–45, July-September 2011.
G. Gupta, C. Mazumdar, M. Rao and R. Bhosale, Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents, Digital Investigation, vol. 3(1), pp. 43–55, 2006.
G. Gupta, S. Saha, S. Chakraborty and C. Mazumdar, Document frauds: Identification and linking fake documents to scanners and printers, Proceedings of the International Conference on Computing Theory and Applications, pp. 497–501, 2007.
G. Gupta, R. Sultania, S. Mondal, S. Saha and B. Chanda, A structured approach to detect a scanner-printer used in generating fake documents, Proceedings of the Third International Conference on Information Systems Security, pp. 250–253, 2007.
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I. Witten, The WEKA data mining software: An update, ACM SIGKDD Explorations Newsletter, vol. 11(1), pp. 10–18, 2009.
M. Ionescu and A. Ralescu, Fuzzy Hamming distance based banknote validator, Proceedings of the Fourteenth IEEE International Conference on Fuzzy Systems, pp. 300–305, 2005.
C. Liu, S. Ruan, G. Huang, Y. Jian and L. Zhang, Research on identification of counterfeits by recognizing infrared images, Proceedings of the International Conference on Microwave and Millimeter Wave Technology, vol. 4, pp. 2081–2084, 2008.
S. Ryu, H. Lee, I. Cho and H. Lee, Document forgery detection with SVM classifier and image quality measures, Proceedings of the Ninth Pacific Rim Conference on Multimedia, pp. 486–495, 2008.
J. van Beusekom, F. Shafait and T. Breuel, Document signature using intrinsic features for counterfeit detection, Proceedings of the Second International Workshop on Computational Forensics, pp. 47–57, 2008.
J. Xie, C. Qin, T. Liu, Y. He and M. Xu, A new method to identify the authenticity of banknotes based on the texture roughness, Proceedings of the IEEE International Conference on Robotics and Biomimetics, pp. 1268–1271, 2009.
C. Yeh, W. Su and S. Lee, Employing multiple-kernel support vector machines for counterfeit banknote recognition, Applied Soft Computing, vol. 11(1), pp. 1439–1447, 2011.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Sarkar, A., Verma, R., Gupta, G. (2013). Detecting Counterfeit Currency and Identifying Its Source. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics IX. DigitalForensics 2013. IFIP Advances in Information and Communication Technology, vol 410. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41148-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-41148-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41147-2
Online ISBN: 978-3-642-41148-9
eBook Packages: Computer ScienceComputer Science (R0)