Skip to main content

Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images

  • Conference paper
  • First Online:
Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications (CompIMAGE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 10149))

Abstract

In image-based coin detection, making the image readable is an indispensable part of the feature extraction. However using a 2-D image processing approach for detecting a counterfeit coin is nearly impossible in case of destroyed coins whose textures are severely burnt, sulfated, rusted, or colored.

In this research, we used a 3-D scanner to scan and model an acceptable number of coins capturing height and depth instead of levels of color. The most important advantage of 3-D scanning is to compensate for the above-mentioned destructions of the coin surface. Despite this advantage, we had several unexpected degradations due to shiny coin images. To solve this problem, the 3-D image was decomposed column-wise to a number of separate 1-D signals, which were analyzed separately and restored by the proposed method. This approach gave remarkable results when used to extract valuable features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goldsborough, R.: Counterfeit Coin Detection (2013). http://rg.ancients.info/guide/counterfeits.html

  2. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn, p. 311. Prentice, Pearson, Upper Saddle River (2008)

    Google Scholar 

  3. Hassoubah, R.S., Aljebry, A.F., Elrefaei, L.A.: Saudi riyal coin detection and recognition. In: 2nd IEEE International Conference on Image Information Processing (ICIIP), Int. J. Comput. Appl., pp. 62–66, December 2013

    Google Scholar 

  4. http://www.cs.waikato.ac.nz/~ml/weka/

  5. https://en.wikipedia.org/wiki/3D_scanner

  6. Huber, R., Ramoser, H., Mayer, K., Penz, H., Rubik, M.: Classification of coins using an eigenspace approach. Pattern Recognit. Lett. 26(1), 61–75 (2005)

    Article  Google Scholar 

  7. Inksure Technologies. Coin anti-counterfeiting (2014). http://www.inksure.com/banknotesecurity/254-coin-anti-counterfeiting

  8. Kaiser, J.F.: On a simple algorithm to calculate the ‘energy’ of a signal. In: Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP 1990, Albuquerque, NM, vol. 1, pp. 381–384 (1990)

    Google Scholar 

  9. Khazaee, S., Faez, K.: A novel classification method using hybridization of fuzzy clustering and neural networks for intrusion detection. IJMECS 6(11), 11–24 (2014)

    Article  Google Scholar 

  10. Kim, S., Lee, S.H., Ro, Y.M.: Image-based coin recognition using rotation-invariant region binary patterns based on gradient magnitudes. J. Vis. Commun. Image Res. 32, 217–223 (2015)

    Article  Google Scholar 

  11. Maaten, L.J., Postma, E.O.: Towards automatic coin classification, 1st EVA-Vienna, April 2006, pp. 19–26

    Google Scholar 

  12. Mehta, D., Sagar, A.: An efficient way to detect and recognize the overlapped coins using Otsu’s algorithm based on Hough transform technique. Int. J. Comput. Appl. 73(9), 18–21 (2013)

    Google Scholar 

  13. Saranya, Y.M., Pugazhenthi, R.: Harris-Hessian algorithm for coin apprehension. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1689–1693 (2013)

    Google Scholar 

  14. Shen, L., Jia, S., Ji, Z., Chen, W.S.: Extracting local texture features for image-based coin recognition. IET Image Process. 5(5), 394–401 (2011)

    Article  Google Scholar 

  15. Sun, K., Feng, B.Y., Atighechian, P., Levesque, S., Sinnott, B., Suen, C.Y.: Detection of counterfeit coins based on shape and letterings features. In: Proceedings of 28th ISCA International Conference on Computer Applications in Industry and Engineering, San Diego, USA, pp. 165–170, October 2015

    Google Scholar 

  16. Tresanchez, M., Pallejà, T., Teixidó, M., Palacín, J.: Using the optical mouse sensor as a two-euro counterfeit coin detector. Sensors (Basel, Switzerland) 9(9), 7083–7096 (2009)

    Article  Google Scholar 

  17. Yoshida, T.H.: Fundamentals of Three Dimensional Digital Image Processing. Springer, New York (2009)

    MATH  Google Scholar 

  18. Zhang, C., Xu, J., Xi, N., Zhao, J., Shi, Q.: A robust surface coding method for optically challenging objects using structured light. IEEE Trans. Autom. Sci. Eng. 11(3), 775–788 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saeed Khazaee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Khazaee, S., Sharifi Rad, M., Suen, C.Y. (2017). Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images. In: Barneva, R., Brimkov, V., Tavares, J. (eds) Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications. CompIMAGE 2016. Lecture Notes in Computer Science(), vol 10149. Springer, Cham. https://doi.org/10.1007/978-3-319-54609-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54609-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54608-7

  • Online ISBN: 978-3-319-54609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics