Mohammad H Alshayeji, Mohammad Al-Rousan, Dunya T. Hassoun
언어
영어(ENG)
URL
https://www.earticle.net/Article/A268244
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Counterfeiting and forging currencies is a serious threat to any economy. Even though currency exists as a variation of coins, banknotes, and electronic data, many economies remain threatened by counterfeiting which is made possible by the ongoing technological advancements in reprographic equipment available to the general public. Clearly, counterfeit currency detection is not a task that can be neglected. Digital image processing is one of the most common and effective techniques used to distinguish counterfeit banknotes from genuine ones. A new approach is presented in this paper using the bit-plane slicing technique to extract the most significant data from counterfeit banknote images with the application of an edge detector algorithm. The proposed technique consists of decomposing original images of 256 gray levels into their equivalent 8 binary images. This is useful in analyzing the relative importance contributed by each bit of the original image. Higher order bit levels are evaluated for grayscale banknote images with the application of Canny edge detection algorithm. The results are then compared with genuine banknotes and with other existing techniques used for detecting counterfeit notes. Unlike existing research, it was observed that the edges obtained using bit-plane sliced images are more accurate and can be detected faster than obtaining them from the original image without being sliced. The detection of counterfeit currency was also achieved by following the process of using Canny edge detection, image segmentation, and feature extraction.
목차
Abstract 1. Introduction 2. Related Work 3. Background 3.1. Counterfeit Currency 3.2. Digital Image Processing 4. Problem Definition 5. Methodology 5.1. Image Acquisition 5.2. Pre-Processing 5.3. Bit-Plane Slicing 5.4. Edge Detection 5.5. Image Segmentation 5.6. Feature Extraction 6. Evaluation 6.1. Performance Metrics 6.2. Experimental Setup 6.3. Case Study 7. Discussion 8. Conclusion and Future Work References
Mohammad H Alshayeji [ Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait ]
Corresponding Author
Mohammad Al-Rousan [ Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait ]
Dunya T. Hassoun [ Computer Engineering Department, College of Computing Sciences and Engineering, Kuwait University, Kuwait ]
보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Multimedia and Ubiquitous Engineering
간기
월간
pISSN
1975-0080
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.11