Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images
In image-based coin detection, making the image readable is an indispensable part of the feature extraction. However using a 2-D image processing approach for detecting a counterfeit coin is nearly impossible in case of destroyed coins whose textures are severely burnt, sulfated, rusted, or colored.
In this research, we used a 3-D scanner to scan and model an acceptable number of coins capturing height and depth instead of levels of color. The most important advantage of 3-D scanning is to compensate for the above-mentioned destructions of the coin surface. Despite this advantage, we had several unexpected degradations due to shiny coin images. To solve this problem, the 3-D image was decomposed column-wise to a number of separate 1-D signals, which were analyzed separately and restored by the proposed method. This approach gave remarkable results when used to extract valuable features.
KeywordsCounterfeit detection Coin recognition 3D-images Restoration
- 1.Goldsborough, R.: Counterfeit Coin Detection (2013). http://rg.ancients.info/guide/counterfeits.html
- 2.Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn, p. 311. Prentice, Pearson, Upper Saddle River (2008)Google Scholar
- 3.Hassoubah, R.S., Aljebry, A.F., Elrefaei, L.A.: Saudi riyal coin detection and recognition. In: 2nd IEEE International Conference on Image Information Processing (ICIIP), Int. J. Comput. Appl., pp. 62–66, December 2013Google Scholar
- 7.Inksure Technologies. Coin anti-counterfeiting (2014). http://www.inksure.com/banknotesecurity/254-coin-anti-counterfeiting
- 8.Kaiser, J.F.: On a simple algorithm to calculate the ‘energy’ of a signal. In: Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP 1990, Albuquerque, NM, vol. 1, pp. 381–384 (1990)Google Scholar
- 11.Maaten, L.J., Postma, E.O.: Towards automatic coin classification, 1st EVA-Vienna, April 2006, pp. 19–26Google Scholar
- 12.Mehta, D., Sagar, A.: An efficient way to detect and recognize the overlapped coins using Otsu’s algorithm based on Hough transform technique. Int. J. Comput. Appl. 73(9), 18–21 (2013)Google Scholar
- 13.Saranya, Y.M., Pugazhenthi, R.: Harris-Hessian algorithm for coin apprehension. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1689–1693 (2013)Google Scholar
- 15.Sun, K., Feng, B.Y., Atighechian, P., Levesque, S., Sinnott, B., Suen, C.Y.: Detection of counterfeit coins based on shape and letterings features. In: Proceedings of 28th ISCA International Conference on Computer Applications in Industry and Engineering, San Diego, USA, pp. 165–170, October 2015Google Scholar