Machine-assisted authentication of paper currency: an experiment on Indian banknotes

  • Ankush Roy
  • Biswajit HalderEmail author
  • Utpal Garain
  • David S. Doermann
Original Paper


Automatic authentication of paper money is becoming an increasingly urgent problem because of new and improved uses of counterfeits. In this paper, we describe a system developed for discriminating fake notes from genuine ones and apply it to Indian banknotes. Image processing and pattern recognition techniques are used to design the overall approach. The ability of the embedded security aspects is thoroughly analysed for detecting fake currencies. Real samples are used in the experiments that show a high-precision machine can be developed for authentication of paper money. The system performance is reported for both accuracy and processing speed. The analysis of security features to prevent counterfeiting highlights some of the issues that should be considered in designing of currency notes in the future.


Support Vector Machine Linear Discriminant Analysis Security Feature Printing Technique Currency Note 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



The authors sincerely thank the questioned document examiners of the Central Forensic Science Laboratory (CFSL), Govt. of India and some staff of different Indian banks for their kind help and cooperation. One of the authors thanks Indo-US Science and Technology Forum for providing him with a Fellowship to do collaborative research in USA.


  1. 1.
    Reserve Bank of India, High Level RBI Group Suggests Steps to Check Menace of Fake Notes, Press release 2009–2010/232, Dated 11 August (2009)Google Scholar
  2. 2.
    Kaushal, R.: Fake money circulation boosts black economy India Today, 5 August (2009)Google Scholar
  3. 3.
    Counterfeit Currency in Canada: Publication of Royal Canadian Mounted Police (December 2007)Google Scholar
  4. 4.
    Thompson, T.: Security clampdown on the home PC banknote forgers. The Observer (2004)Google Scholar
  5. 5.
    van Renesse, R.L.: Paper based document security-a review. In: IEEE European Conference on Security and Detection (ECOS), pp. 75–80 (1997)Google Scholar
  6. 6.
    Murdoch, S.J., Laurie, B.: The Convergence of Anti-Counterfeiting and Computer Security, Lecture at 21st Chaos Communication Congress. Berliner Congress Center, Berlin (2004)Google Scholar
  7. 7.
    Department of Financial Services, Ministry of Finance, Govt. of India: Counterfeit Notes from ATM. Press release number F No 11/16/2011-FI, 3rd Floor, Jeevan Deep Building, New Delhi, India, 6th July (2012)Google Scholar
  8. 8.
    Seropyan, C.D.: Means of Preventing Counterfeiting Bank Notes, US Patent, No. 17, 473, 2 Jan (1857)Google Scholar
  9. 9.
    Gotaas, E.: Sensor for Verification of Genuineness of Security Paper, US Patent 5,122,754, 16 June (1992)Google Scholar
  10. 10.
    Harbaugh, S.K.: Capacitive Verification Device for a Security Thread Embedded Within Currency Paper, US Patent 5,417,316, 23 May (1995)Google Scholar
  11. 11.
    Slepyan, E., Kugel, A., Eisenberg, J.: Currency Verification, US Patent, No. 6,766,045, 20 July (2004)Google Scholar
  12. 12.
    Massimo, M.: Device for Validating Banknotes, EPO Patent, No. EP 0537513 (A1), 21 April (1993)Google Scholar
  13. 13.
    Graves, B.T., Jones, W.J., Mennie, D.U., Sculits, F.M.: Method and Apparatus for Authenticating and Discriminating Currency, US Patent, No. 5,960,103, 28 Sept (1999)Google Scholar
  14. 14.
    Takeda, F., Omatu, S.: Recognition system of US dollars using a neural network with random masks. In: Proceedings of the International Joint Conference on Neural Networks, Nagoya, Japan, Vol. 2 (1993)Google Scholar
  15. 15.
    Frosini, A., Gori, M., Priami, P.: A neural network-based model for paper currency recognition and verification. IEEE Trans. Neural Netw. 7(6), 1482–1490 (1996)zbMATHCrossRefGoogle Scholar
  16. 16.
    Aoba, M., Kikuchi, T., Takefuji, Y.: Euro banknote recognition system using a three layered perceptron and RBF networks. IPSJ Trans. Math. Model. Appl. 44, 99–109 (2003)Google Scholar
  17. 17.
    Debnath, K.K., Ahmed, S., Shahjahan, Md: A paper currency recognition system using negatively correlated neural network ensemble. J. Multimed. 5(6), 560–567 (2010)CrossRefGoogle Scholar
  18. 18.
    Hassanpour, H., Farahabadi, P.M.: Using hidden Markov models for paper currency recognition. Expert Syst. Appl. 36, 1010510111 (2009)CrossRefGoogle Scholar
  19. 19.
    Vila, A., Ferrer, N., Mantecon, J., Breton, D., Garcia, J.F.: Development of a fast and non-destructive procedure for characterizing and distinguishing original and fake euro notes. Anal. Chim. Acta 559(2), 257–263 (2006)CrossRefGoogle Scholar
  20. 20.
    Yoshida, K., Kamruzzaman, M., Jewel, F.A., Sajal, R.F.: Design and implementation of a machine vision based but low cost stand-alone system for real time counterfeit Bangladeshi bank notes detection. In: Proceedings of 10th International Conference on Computer and Information Technology (ICCIT), pp. 1–5, Dhaka (2007)Google Scholar
  21. 21.
    Features & Utility of Paradigm EXC 6700-I, E-Brochure, Paradigm Cash Systems Pvt. Ltd. (2009)Google Scholar
  22. 22.
    Garain, U., Halder, B.: On automatic authenticity verification of printed security documents. In: Proceedings of Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), pp. 706–713, Bhubaneswar, India (2008)Google Scholar
  23. 23.
    Garain, U., Halder, B.: Machine authentication of security documents. In: Proceedings of International Conference on Document Analysis and Recognition (ICDAR), pp. 718–722, Bacelona, Spain (2009)Google Scholar
  24. 24.
    Roy, A., Halder, B., Garain, U.: Authentication of currency notes through printing technique verification. In: Proceedings of ACM, Indian Conference on Computer Vision, Graphics and Image processing (ICVGIP), pp. 383–390, Chennai, India (2010)Google Scholar
  25. 25.
    Warner, R.D., Adams, R.M., Believe, M.: Introduction to Security Printing. Graphic Arts Center Publishing Company. ISBN 0883623757 (2005)Google Scholar
  26. 26.
    Bender, K.W.: Moneymakers: The Secret World of Banknote Printing. Wiley-VCH Publishers, Hoboken, NJ (2006)Google Scholar
  27. 27.
    Reserve Bank of India, Detection and Impounding of Counterfeit Notes, Master Circular, released on 01 July (2011)Google Scholar
  28. 28.
    Halder, B., Darbar, R., Garain, U.: Investigating the role of fluorescent paper pulp for detecting counterfeit Banknotes. In: 5th IAPR International Workshop on Computational Forensics (IWCF), pp. 13–23. ICPR, Tsukuba, Japan (2012)Google Scholar
  29. 29.
    Halder, B., Darbar, R., Garain, U., Mondal, A.C.: Analysis of fluorescent paper pulps for detecting counterfeit Indian paper money. In: Proceedings of 10th International Conference on Information Systems Security (ICISS), pp. 411–424, Hyderabad, India (2014)Google Scholar
  30. 30.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice Hall, Upper Saddle River, NJ (2008)Google Scholar
  31. 31.
    Duda, R.O., Hart, P.E., Strok, D.G.: Pattern Classification. Wiley, Hoboken, NJ (2001)Google Scholar
  32. 32.
    Kelly, J.S., Lindblom, B.S. (eds.): Scientific Examination of Questioned Documents. Forensic and Police Science Series, 2nd edn. CRC Press, Boca Raton, FL (2006)Google Scholar
  33. 33.
    Schulze, C., Schreyer, M., Stahl, A., Breuel, T.M.: Evaluation of gray level features for printing technique classification in high throughput document management systems. In: 2nd International Workshop on Computational Forensics (IWCF), LNCS, Springer, Berlin, 5158:3546, Washington (2008)Google Scholar
  34. 34.
    Kuehni, R.G.: Color Space and its Divisions: Color Order from Antiquity to the Present. Wiley, Hoboken, NJ (2003)Google Scholar
  35. 35.
    Franke, K., Rose, S.: Ink-deposition model: the relation of writing and ink deposition processes. In: Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition (IWFHR), pp. 173-178 (2004)Google Scholar
  36. 36.
    Visual Spectral Comparator 5000, (VSC 5000).
  37. 37.
    Duchene, J., Leclercq, S.: An optimal transformation for discriminant and principal component analysis. IEEE Trans. Pattern Anal. Mach. Intell. 10(6), 978–983 (1988)zbMATHCrossRefGoogle Scholar
  38. 38.
    Halder, B., Garain, U., Darbar, R., Mondal, A.C.: Inverse of low resolution line halftone images for document inspection. In: Proceedings of 6th IAPR International Workshop on Computational Forensics (IWCF), Springer (2015) (in press)Google Scholar
  39. 39.
    Halder, B., Garain, U.: Color feature based approach for determining ink age in printed documents. In: Proceedings of International Conference on Patter Recognition (ICPR), Istanbul, Turkey, pp. 3212–3215 (2010)Google Scholar
  40. 40.
    Garain, U., Parui, S.K., Paquet, T., Heutte, L.: Machine dating of handwritten manuscripts. In: Proceedings of International Conference on Document Analysis and Recognition (ICDAR), pp. 759–763, Curitiba, Brazil (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Department of Computing ScienceUniversity of AlbertaEdmontonCanada
  2. 2.Department of Computer ScienceThe University of BurdwanBardhamanIndia
  3. 3.CVPR UnitIndian Statistical UnitKolkataIndia
  4. 4.Institute of Advanced Computer StudiesUniversity of MarylandMDUSA

Personalised recommendations