Advertisement

Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images

  • Saeed KhazaeeEmail author
  • Maryam Sharifi Rad
  • Ching Y. Suen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10149)

Abstract

In image-based coin detection, making the image readable is an indispensable part of the feature extraction. However using a 2-D image processing approach for detecting a counterfeit coin is nearly impossible in case of destroyed coins whose textures are severely burnt, sulfated, rusted, or colored.

In this research, we used a 3-D scanner to scan and model an acceptable number of coins capturing height and depth instead of levels of color. The most important advantage of 3-D scanning is to compensate for the above-mentioned destructions of the coin surface. Despite this advantage, we had several unexpected degradations due to shiny coin images. To solve this problem, the 3-D image was decomposed column-wise to a number of separate 1-D signals, which were analyzed separately and restored by the proposed method. This approach gave remarkable results when used to extract valuable features.

Keywords

Counterfeit detection Coin recognition 3D-images Restoration 

References

  1. 1.
    Goldsborough, R.: Counterfeit Coin Detection (2013). http://rg.ancients.info/guide/counterfeits.html
  2. 2.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn, p. 311. Prentice, Pearson, Upper Saddle River (2008)Google Scholar
  3. 3.
    Hassoubah, R.S., Aljebry, A.F., Elrefaei, L.A.: Saudi riyal coin detection and recognition. In: 2nd IEEE International Conference on Image Information Processing (ICIIP), Int. J. Comput. Appl., pp. 62–66, December 2013Google Scholar
  4. 4.
  5. 5.
  6. 6.
    Huber, R., Ramoser, H., Mayer, K., Penz, H., Rubik, M.: Classification of coins using an eigenspace approach. Pattern Recognit. Lett. 26(1), 61–75 (2005)CrossRefGoogle Scholar
  7. 7.
    Inksure Technologies. Coin anti-counterfeiting (2014). http://www.inksure.com/banknotesecurity/254-coin-anti-counterfeiting
  8. 8.
    Kaiser, J.F.: On a simple algorithm to calculate the ‘energy’ of a signal. In: Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP 1990, Albuquerque, NM, vol. 1, pp. 381–384 (1990)Google Scholar
  9. 9.
    Khazaee, S., Faez, K.: A novel classification method using hybridization of fuzzy clustering and neural networks for intrusion detection. IJMECS 6(11), 11–24 (2014)CrossRefGoogle Scholar
  10. 10.
    Kim, S., Lee, S.H., Ro, Y.M.: Image-based coin recognition using rotation-invariant region binary patterns based on gradient magnitudes. J. Vis. Commun. Image Res. 32, 217–223 (2015)CrossRefGoogle Scholar
  11. 11.
    Maaten, L.J., Postma, E.O.: Towards automatic coin classification, 1st EVA-Vienna, April 2006, pp. 19–26Google Scholar
  12. 12.
    Mehta, D., Sagar, A.: An efficient way to detect and recognize the overlapped coins using Otsu’s algorithm based on Hough transform technique. Int. J. Comput. Appl. 73(9), 18–21 (2013)Google Scholar
  13. 13.
    Saranya, Y.M., Pugazhenthi, R.: Harris-Hessian algorithm for coin apprehension. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1689–1693 (2013)Google Scholar
  14. 14.
    Shen, L., Jia, S., Ji, Z., Chen, W.S.: Extracting local texture features for image-based coin recognition. IET Image Process. 5(5), 394–401 (2011)CrossRefGoogle Scholar
  15. 15.
    Sun, K., Feng, B.Y., Atighechian, P., Levesque, S., Sinnott, B., Suen, C.Y.: Detection of counterfeit coins based on shape and letterings features. In: Proceedings of 28th ISCA International Conference on Computer Applications in Industry and Engineering, San Diego, USA, pp. 165–170, October 2015Google Scholar
  16. 16.
    Tresanchez, M., Pallejà, T., Teixidó, M., Palacín, J.: Using the optical mouse sensor as a two-euro counterfeit coin detector. Sensors (Basel, Switzerland) 9(9), 7083–7096 (2009)CrossRefGoogle Scholar
  17. 17.
    Yoshida, T.H.: Fundamentals of Three Dimensional Digital Image Processing. Springer, New York (2009)zbMATHGoogle Scholar
  18. 18.
    Zhang, C., Xu, J., Xi, N., Zhao, J., Shi, Q.: A robust surface coding method for optically challenging objects using structured light. IEEE Trans. Autom. Sci. Eng. 11(3), 775–788 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Saeed Khazaee
    • 1
    Email author
  • Maryam Sharifi Rad
    • 1
  • Ching Y. Suen
    • 1
  1. 1.CENPARMIConcordia UniversityMontrealCanada

Personalised recommendations