Fake Note Detection Paper
Fake Note Detection Paper
1
N 1
N
i=1
(I
i
I)
2
. (4)
The key tone (f
5
p
) value gives us the information
about the intensity zone where most of the information
is stored by calculating the mean of the intensity prole
of the character stroke after masking as given below,
Image Masked character f
5
p
= Mean(Intensity).(5)
Average color (f
6
p
) assesses a reconstituted color ma-
trix based on a scalar parameter (p). This checks the
color composition of the print according to the note
issuing authority of India. For instance, the principal
streams in Intaglio character stroke are blue and black
in 500 denominations. The average color is computed
as below,
f
6
p
=
s(i)
N
(6)
6 Ankush Roy et al.
where s(i) is dened as
s(i) = pB
blue
(i) + (1 p)B
black
(i), 0 < p < 0.5
and B
blue
and B
black
correspond to blue and black
strokes, respectively.
Along with these six features, three other features
are extracted: edge roughness E
PBER
, (f
7
p
) (Eq. 7),
area dierence (f
8
p
) (Eq. 8) and correlation coecient
(f
9
p
). These features are computed based on the work of
Breuel et al. [29], [30]. The edge roughness is computed
as
f
7
p
= E
PBER
= (p
a
p
b
)/p
b
(7)
where p
a
is the perimeter of the original image, p
b
is perimeter of the ltered (median lter) binary image
and E
PBER
is the perimeter based edge roughness. In
calculating this feature, the character image is rst bi-
narized using Otsu threshold value (say, T) (A
otsu
) and
then the same image is again binarized using a dierent
threshold value that is calculated by adding a normal-
ized parameter sc to T (A
otsu+sc
). The area dierence
is computed as
f
8
p
= Area Dierence =
|A
otsu+sc
A
otsu
|
A
otsu
. (8)
The correlation coecient is computed as
f
9
p
=
(i,j)ROI
(A(i, j)
A)(B(i, j)
B)
(i,j)
(A(i, j)
A)
2
(i,j)
(B(i, j)
B)
2
(9)
where (i, j) ROI, A is the original gray value
image, B is the corresponding binary image,
A and
B
are the mean of A and B, respectively.
Based on the above nine features, classiers are trained
to identify fake notes based on printing technique.
3.2.2 Ink Properties
The reaction of the ink on a particular substrate is dif-
ferent for dierent inks. This dierence actually lends a
typical signature indicating the authenticity of a note.
CCRatio (f
1
i
) Colour composition of the central zone
(Fig. 4) of a note is analysed by doing an independent
component analysis. This was followed by a ltration
method that keeps those pixels ON where the green
component index in the RGB color space is higher than
the blue component index which is in turn higher than
the red component index to generate a mask. Compu-
tationally it is represented by color composition ratio
(CCRatio) feature which is dened as
f
1
i
=
#ON Pixel in mask
#Pixels in mask
. (10)
The number of pixels are xed as the images are regis-
tered using a 4-point registration prior to processing.
(a) (b)
(c) (d)
Fig. 4 Analysis of colour composition: (a) and (c) UV scans
of fake and original image; (b) and (d) are resultant images
from the left hand side counterparts after ltration to check
colour composition.
Micro letter (f
2
i
) This feature appears between the ver-
tical band and Mahatma Gandhi portrait in the notes.
In notes of denominations 20 and above, the denomina-
tional value and RBI constitute the micro letters. In
our study, we have looked into the colour of these micro
letters. The RGB values are rst transformed to a spe-
cic absolute colour space. This adjustment makes the
resulting data device independent. The masked image
was changed from RGB to L
index distribution as
formulated below,
f
2
i
= Spread =
N
i=1
b
i
b
N 1
. (11)
Ink Fluidity (f
3
i
) It is observed that the ink used to
print genuine currency notes blot considerably greater
than the counterfeit ink. The study of uidity of ink as
a vision based feature was done by K. Franke et al. [32].
Following this study we developed a feature that would
computationally help in decision making about the ink
Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes 7
(a) (b)
(c)
Fig. 5 Analysis of micro lettering: (a) genuine banknote, (b)
fake banknote; (c) b
n
p
f(x)
n + 1 p
(12)
where p is the position of the 1st positive entry.
The percentage overshoot is then recorded as a fea-
ture using the steady value in Eq.(13) and computed as
follows,
f
3
i
=
overshoot
steady
=
max
steady
1. (13)
3.2.3 Thread
Two security thread related features are considered: the
registration of the notes and the text in the security
strip.
Registration (f
1
t
) The thread should always appear as
a single line. This is a way to test of the registration
of the notes. We check this using a binary feature, f
1
t
,
(a) (b)
(c) (d)
(e) (f)
Fig. 6 Ink analysis: (a) Genuine ink spread, (b) Fake ink
spread, (c) Histogram of genuine ink, (d), Histogram of fake
ink, (e) Normalized graph with steady value (genuine ink),
and (f ) Normalized graph with steady value (fake ink).
which decides whether a note is genuine (G = 1) or
fake (D = 0). Two sets of thick blobs are found (refer
Fig. 7(i)b), one represents the thread parts seen from
the front while the other represents the thread parts on
the back of the note. Two lines, one for the front and the
other for the back, are t through the centroid (c
x
,c
y
)
points of the corresponding blobs. The centroid of a
blob is calculated using the following formulae where A
be the area of the blob.
c
x
=
n1
i=0
(x
i
+x
i+1
)(x
i
y
i+1
y
i
x
i+1
)
6A
c
y
=
n1
i=0
(y
i
+y
i+1
)(x
i
y
i+1
y
i
x
i+1
)
6A
This is followed by a distance check of the lines using
a threshold distance t, empirically computed from 100
note samples.
d(t
f
, t
b
) < t, Genuine,
>= t, Fake.
(14)
where t
f
= foreground line points, t
b
= background line
points.
The feature, f
1
t
is a binary feature which generates
a decision based on Eq. 14. Fig. 7(i) shows the registra-
tion problem of thread in a fake note.
8 Ankush Roy et al.
Text in Thread (f
2
t
) This is another binary feature that
checks whether thread texts exist. The texts RBI and
Bharat (Hindi for India) in Devanagari script are
written on original notes where these two words appear
alternatively. We extracted the text portion from the
threads and then used conventional pattern matching
tools to compare. There were only 4 such texts patterns
as shown in Fig. 7(ii)(a-d) to compare so the templates
were extracted from the original image and then used
to as ground truth data for pattern matching. Majority
of fake notes showed negligible matching because they
do not have any text as shown in Fig. 7(ii)(f).
(i)
(ii)
Fig. 7 Analysis of security thread: (i) Security Thread: (a)
fake note image (b) thick blobs representing the thread on
the front (c) line in front (d) two lines which do not overlap;
(ii) Text in Security Thread: (a)-(d) four occurring patterns
(e) original note (f) fake note.
3.2.4 Art Work
This section deals with printing patterns that are intri-
cately introduced in note design to prevent the coun-
terfeiters from replicating them. Initially the image is
passed through a median (3 3 sub window) lter to
remove impulsive noise. Next, the centroid of each dot
is mapped as shown in Fig. 8. The three features de-
scribed below are extracted and analysed.
Fig. 8 Analysis of dot distribution: (a) Genuine note (b) dis-
tribution of dots centroids for the genuine note (c) Fake note
(d) distribution of dot centroids for the fake note.
Dot distribution (f
1
a
) The distribution of the dot cen-
troids gives us the impression that in the fake note the
distribution of the dots are far less uniform when com-
pared to the genuine notes. Entropy count provides a
measure of this randomness. The entropy (H) is calcu-
lated as a feature, f
1
a
, and the following equation mea-
sures it as
f
1
a
= H =
n
i=1
p(x
i
) log p(x
i
) (15)
where n is the number of dots.
Cluster distribution and dot density features (f
2
a
and
f
3
a
) We also compute the number of clusters occur-
ring at the character strokes of the letters. An unsu-
pervised agglomerative hierarchical clustering scheme
is used with a Euclidean distance check to calculate the
number of clusters. Let C
1
and C
2
be the two clus-
ters and d is the distance matrix, then max{d(x, y) :
x C
1
, y C
2
}. An iterative process continues until
the separation of the clusters exceeds a threshold (in-
dicated by a Euclidean distance). Cluster density f
2
a
is
dened as
f
2
a
=
#Clusters
Area of Character Stroke
. (16)
From the Fig. 8 it is evident that the original notes have
a more even distribution of dots and far more dots in
the character stroke. This dierence in the dot count
is used as another simple feature which gives the dot
density, f
3
a
as,
f
3
a
=
#dots
Area of Character Stroke
. (17)
Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes 9
Adaptive Otsu threshold removes most of the back-
ground leaving only the character stroke whose area
is calculated.
Reading Latent Denomination (f
4
a
) When viewing the
strip left to the Mahatma Gandhis picture, the denom-
ination of the note is seen engraved quite distinctly.
The machine readability of these denomination digits
is measured in Eq. 18. This zone comprises of two sets
of lines- horizontal and vertical. The vertical lines repre-
sent the text part. The sharpness of the lines is dierent
in the two categories of notes (genuine vs. fake) lending
them dierent readability index f
4
a
which is dened as
f
4
a
= Score of NN classier. (18)
An MLP-NN classier was trained with digit sam-
ples taken from the genuine notes. The vertical lines
need to be extracted for the text to be read properly so
we use a 3 3 convolution matrix (CM)
CM =
2 4 2
2 4 2
2 4 2
T
j=1
V
i=1
(d
ij
y
ij
)
2
V T
,
where V and T are the number of support vectors and
test samples, respectively, d
ij
and y
ij
are the desired
output and the SVM output, respectively for the i-
th support vector and the j-th test sample. The neu-
ral network used for classication consists of three in-
put nodes and 2 output or decision nodes with 1 hid-
den layer. Normal back propagation algorithm has been
used for training with an activation function given by
f(x) =
e
x
1+e
x
. A gradient descent method is used to
nd the optimized set of connection weights that are
updated as per the following equation,
W
t+1
= W
t
+ (
E
W
)|
W(t)
+ (W
t
W
t1
). (19)
Next, we use Fisher linear discrimination analysis
(LDA) [33] to study the performance of individual fea-
tures. Suppose is the normal to the discriminating
hyper plane,
y=0
,
y=1
, are the sample means,
y=0
and
y=1
are the covariance matrices of the two classes
(genuine and fake). Now we can consider that for one
Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes 11
class, y = 0 for
T
.X + b 0 and for the other class,
y = 1 for
T
.X +b < 0. From these equations, param-
eter vector is computed to maximize class separabil-
ity criterion and b is the bias, which lies in between the
means of the training samples projected onto this direc-
tion. The separation between these two distributions is
to be the ratio of the variance between the two classes
and is given by
S =
2
between
2
within
=
(.
y=1
.
y=0
)
2
(
T
y=1
+
T
y=0
)
. (20)
For Fisher LDA, this separation achieves maximum
when
w = (
y=1
+
y=0
)
1
(
y=1
y=0
). (21)
Finally, the cumulative accuracy taking all the features
into consideration is computed and a study is conducted
to nd out a proper sequence in which the features are
to be tested. This is important as this reduces the load
of the machine if at various stages the number of notes
to be checked could be reduced without sacricing the
accuracy.
4.4 Experimental Results
At rst, results are reported based on individual feature
groups. The capacity of these features are then analysed
in the context of detecting fake notes. Finally, results
are reported considering all the features and a sequence
by which features are to be checked is highlighted in
order to authenticate a bank note in question.
Accuracy of Ink Based Features. There are three ink
based features: f
1
i
,f
2
i
and f
3
i
. The bi-clustering results
on Set 1 using these three features are shown in Ta-
ble 3. Table 4 reports the classication results when
SVM and ANN, respectively are used as classiers.
Table 3 Bi-Clustering using Ink Based Features
#Samples of #Sample of Clustering
Genuine (G) Fake (F) Accuracy
G D G D
Iteration1 478 11 22 489 967 (96.7%)
Iteration2 471 18 29 482 953 (95.3%)
Iteration3 464 22 36 478 942 (94.2%)
Avg. 95.4%
Accuracy of Art Work Based Features. There are four
features which are captured from the note artwork: f
1
a
,f
2
a
,
Table 4 Ink Features based classication of Currency Notes
using SVM and ANN on Test set
SVM ANN
%Correct MSE
Poly RBF Poly RBF
Fold1 100.0 94.0 0.491 0.530 100.00%
Fold2 98.0 94.0 0.217 0.219 99.30%
Fold3 98.0 92.0 0.103 0.199 98.50%
Fold4 98.0 98.0 0.064 0.256 96.00%
Avg. 98.5 94.5 0.219 0.301 98.45%
f
3
a
and f
4
a
as discussed in Section-3. Bi-clustering re-
sults using these features are shown in Table 5. Clas-
sication accuracies by SVM and ANN are reported in
Table 6.
Table 5 Bi-Clustering using Artwork Based Features
#Samples of #Sample of Clustering
Genuine (G) Fake (F) Accuracy
G D G D
Iteration1 476 15 24 485 961 (96.10%)
Iteration2 474 14 26 486 960 (96.00%)
Iteration3 478 18 22 482 960 (96.00%)
Avg. 96.0%
Table 6 Art work based classication of Currency Notes us-
ing SVM and ANN on Test set
SVM ANN
%Correct MSE
Poly RBF Poly RBF
Fold1 99.00 98.00 0.011721 0.00527 100.0%
Fold2 100.00 100.00 0.018473 0.008652 98.0%
Fold3 100.00 99.00 0.012698 0.006285 99.0%
Fold4 98.00 99.00 0.010526 0.008807 99.0%
Avg. 99.25 99.00 0.0133545 0.007253 99.0%
Accuracy of printing based features. A comprehensive
study of the printing based features (f
1
p
-f
9
p
) is presented
in Table 7.
Table 7 Printing Technique based classication of Currency
Notes using SVM and ANN on test set
SVM ANN
%Correct MSE
Poly RBF Poly RBF
Fold1 100 100.00 0.000121 0.00527 100.00%
Fold2 100 100.00 0.000873 0.008652 99.30%
Fold3 100 100.00 0.01028 0.006285 98.50%
Fold4 100 99.00 0.000205 0.008807 98.00%
Avg. 100 99.75 0.002869 0.007253 98.95%
12 Ankush Roy et al.
In spite of the high accuracy of the individual fea-
ture group more than one feature group makes the sys-
tem more robust. This makes it more immune to the
counterfeiters eort, even if the fake note generators
happen to develop means to surpass the security mea-
sures of any particular feature set. Use of other features
would help in maintaining the high performance of the
system.
With currency notes we are extra careful in mak-
ing the system conservative so that no fake currency
passes through the system. The two thread based fea-
tures (f
1
t
,f
2
t
) are therefore used upfront that are bi-
nary in nature and discriminate notes based on either
the presence or absence of two features (namely regis-
tration (f
1
t
) and text(f
2
2
) as dened in Sec.3.2.3) into
Genuine (G) and Fake (F). This reduces the processing
time too which we have analysed next.
Recognition accuracy of the complete system. The per-
formance of individual feature group is quite good but
not perfect. Now all the features are taken together to
test the system. Individual feature groups are selected
in dierent sequence in order to optimize the perfor-
mance of the system in terms of accuracy, speed and
computational overhead. The Table 8 shows that the
system operates fastest if the thread based features is
placed in the beginning. A total of 1000 notes (500:G,
500:F ) were used to compute the speed of the system.
The time reported here comprises the time required to
scan the notes using the four scanning methods men-
tioned in Table 1, for registration to gure out which
part of the image should be fed to which module and
nally to execute the authentication framework. With
an improved scanner this time would certainly go down.
Table 8 Processing time under dierent ordering of security
features
Ordering of Test Set Accuracy Time
features G:Genuine (Mins)
F:Fake
1.Thread (F:500 100% 160
2.Ink G:500)
3.Printing Technique
4.Art Work
1.Ink (F:500 100% 222
2.Thread G:500)
3.Printing Technique
4.Art Work
1.Ink (F:500 100% 271
2.Printing Technique G:500)
3.Thread
4.Art Work
1.Ink (F:500 100% 324
2.Printing Technique G:500)
3.Art Work
4.Thread
It is also noted that all the features are needed to
make the system as accurate as possible. The nal sys-
tem integrates the two classiers (SVM and ANN) that
are used for discrimination between genuine and fake
currencies. A majority vote approach is followed in in-
tegrating results from these two classiers. A note is
rejected if a tie occurs during majority voting. This
makes the system conservative but reduces the risk of
accepting a fake sample as genuine.
Comparison with Respect to Human Experts. We con-
ducted a comparative study to check the systems per-
formance with respect to human experts. Two cate-
gories of people were involved in this experiment. The
rst group consisted of trained forensic experts and
the other group referred to bank employee who were
the rst in line to receive the bank notes from circula-
tion. The result is tabulated in Table 9. At every run
the notes were selected at random from Set 2 of the
database as mentioned in Sec. 4.1.
Forensic experts analyse each note individually us-
ing various optoelectronic devices which takes quite some
time. So, the dataset was kept deliberately small to ac-
count for this long process. The bank sta has a rea-
sonable speed of producing results but there accuracy
suers mainly because of the qualitative aspect involved
in the authentication process. Bank stas generally au-
thenticate notes by feeling the currency paper and quick
checking the note under light. They go for further ver-
ication only if any suspicious note is encounter but
then again the lack of sophisticated machines hampers
the overall accuracy.
Table 9 Performance with respect to human subjects (accu-
racies are reported for detection of fake notes).
Testing Samples Test Accuracy Time
Method Result (%) (min)
Forensic F:50, G:25 F:50, G:25 100 124
Experts F:50, G:50 F:50, G:50 100 166
F:25, G:100 F:25, G:100 100 204
Bank F:50, G:25 F:46, G:25 92 28
Employees F:50, G:50 F:47, G:50 94 36
F:25, G:100 F:23, G:100 92 41
Our F:50, G:25 F:50, G:25 100 12
System F:50, G:50 F:50, G:49 100 16
F:25, G:100 F:25, G:97 100 20
Relative performance of the feature group The ability
of the three feature groups, namely Ink, Artwork and
Printing technique based features, in detecting fake cur-
rency notes is analysed using Fisher linear discrimina-
tion analysis (LDA) [33]. The previous sub-section (4.3)
Machine Assisted Authentication of Paper Currency: an Experiment on Indian Banknotes 13
highlights how we use LDA for this purpose. The pro-
jection of the individual feature groups are taken on the
best discriminant plane and further mapped to show the
separability of the feature groups in a 2-D plot. Fig. 11
shows the results. Finally, performance of the individ-
ual features on a 0-100% accuracy scale is reported in
Fig. 12. The relative performance of the features gives
vital information to the note designers as to which fea-
ture is performing the best and which feature is more
susceptible to counterfeiting attack.
(a)
(b)
(c)
Fig. 11 Separability of notes in feature space using: (a) ink
features, (b) artwork features, and (c) printing technique
based features.
Fig. 12 Performance of individual features. The features are
along the x-axis and the corresponding accuracies (%) are
along the y-axis.
5 Conclusion
An automatic method for authentication of currency
notes is explored. This research is particularly impor-
tant when the problem of fake bank notes is considered
as a serious problem in many countries. The present ex-
periment considers Indian bank notes as reference. This
study investigates how the security features can be com-
putationally captured in order to automate the authen-
tication process. Exhaustive evaluation of the method
using real life samples brings out the potential of the
approach.
The complexity of the overall system is kept optimal
so that a low cost hardware realization of the proposed
method is feasible. A low cost system is in demand so
that a large scale deployment of such a system becomes
possible. For this purpose, we are in touch with a few
companies who are interested in prototyping such a sys-
tem. Some algorithmic optimization may be needed for
embedded realization of the present system.
Another immediate extension of this study is to
evaluate the method on a dierent test collection. We
are in process of collecting a new set of samples from
another laboratory (dierent from the one from which
we received the current data set) of the Department of
Forensic Sciences. Exploiting new features and method
for authentication is indeed needed to make the system
robust against future counterfeiting eorts. In fact, the
present study does not consider one important secu-
rity feature, namely the watermark feature of the cur-
rency notes. The reason behind this refers to the strange
habits of Indian people scribbling by ink pen over the
blank region on the note where watermark is embedded.
Such scribbling marks make the use of the watermark
feature very sensitive in authenticating bank notes. Our
future eort will explore how to get rid of such scrib-
14 Ankush Roy et al.
bling marks and use the embedded watermark as one
of the security features.
6 Acknowledgement
The authors sincerely thank the questioned document
examiners of the Central Forensic Science Laboratory
(CFSL), Govt. of India for their kind help and cooper-
ation.
References
1. Counterfeit Currency in Canada, Publication of Royal
Canadian Mounted Police, December, 2007
2. R. Kaushal, Fake money circulation boosts black economy
India Today, August 5, 2009.
3. Reserve Bank of India, High Level RBI Group Suggests
Steps to Check Menace of Fake Notes, Press release 2009-
2010/232, Dated 11 August, 2009
4. T. Thompson, Security clampdown on the home PC ban-
knote forgers, The Observer, June, 2004
5. R.L. van Renesse, Paper based document security-a review,
IEEE European Conference on Security and Detection
(ECOS), 75-80, 1997.
6. Steven J. Murdoch, and Ben Laurie, The Convergence
of Anti-Counterfeiting and Computer Security, Lecture at
21st Chaos Communication Congress, Berliner Congress
Center, Berlin, Germany, 2004
7. Department of Financial Services, Ministry of Finance,
Govt. of India, Counterfeit Notes from ATM, Press
release number F No 11/16/2011-FI, 3rd Floor, Jeevan
Deep Building, New Delhi, India, 6th July, 2012.
8. C.D. Seropyan, Means of Preventing Counterfeiting Bank
Notes, US Patent, No. 17,473, January 2, 1857.
9. E. Gotaas, Sensor for verication of genuineness of security
paper, US Patent 5,122,754, June 16, 1992.
10. S.K. Harbaugh, Capacitive verication device for a se-
curity thread embedded within currency paper, US Patent
5,417,316, May 23, 1995.
11. E. Slepyan, A. Kugel and J. Eisenberg, Currency Veri-
cation, US Patent, No. 6,766,045, July 20, 2004.
12. M. Massimo, Device for validating banknotes, EPO Patent,
No. EP 0537513 (A1), April 21, 1993.
13. B.T.Graves, W.J.Jones, D.U.Mennie and F.M.Sculits,
Method and Apparatus for Authenticating and Discriminat-
ing Currency, US Patent, No. 5,960,103, September 28,
1999.
14. F. Takeda and S. Omatu, Recognition System of US Dollars
Using a Neural Network with Random Masks, in Proc. of
the Int. Joint Conf. on Neural Networks, Nagoya, Japan,
Vol. 2, 1993.
15. A. Frosini, M. Gori and P. Priami, A Neural Network-
Based Model for Paper Currency Recognition and Verica-
tion, IEEE Transactions on Neural Networks, 7(6):1482-
1490, 1996.
16. M. Aoba, T. Kikuchi and Y. Takefuji, Euro Banknote
Recognition System Using a Three Layered Perceptron and
RBF Networks, IPSJ Trans. on Mathematical Modelling
and Its Applications, 44:99-109, 2003.
17. K.K. Debnath, S. Ahmed and Md. Shahjahan, A Pa-
per Currency Recognition System Using Negatively Corre-
lated Neural Network Ensemble, Journal of Multimedia,
5(6):560-567, 2010.
18. H. Hassanpour and P.M. Farahabadi, Using Hidden
Markov Models for paper currency recognition, Expert Sys-
tems with Applications, Elsevier, 36:1010510111, 2009.
19. A. Vila, N. Ferrer, J. Mantecon, D. Breton and J.F. Gar-
cia, Development of a fast and non-destructive procedure
for characterizing and distinguishing original and fake euro
notes, Analytica Chimica Acta, 559(2):257-263, 2006.
20. K. Yoshida, M Kamruzzaman, F.A. Jewel and R.F. Sa-
jal, Design and implementation of a machine vision based
but low cost stand-alone system for real time counterfeit
Bangladeshi bank notes detection, in Proc. 10th Int. Conf.
on Computer and Information Technology (ICCIT), pp.
1-5, Dhaka, Dec. 2007.
21. Features & Utility of Paradigm EXC 6700-I, E-Brochure,
Paradigm Cash Systems Pvt. Ltd., 2009.
22. A. Roy, B. Halder and U. Garain, Authentication of Cur-
rency Notes through Printing Technique Verication, in
Proc. of ACM, Indian Conference on Computer Vision,
Graphics and Image processing (ICVGIP), Dec 12-15,
Chennai, India, 2010.
23. R.D. Warner, R.M. Adams and M. Believe, Introduc-
tion to Security Printing, Graphic Arts Center Publishing
Company, ISBN 0883623757, 2005.
24. K.W. Bender, Moneymakers: the secret world of banknote
printing, Wiley-VCH Publishers, 2006.
25. Reserve Bank of India, Detection and Impounding of Coun-
terfeit Notes, Master Circular, released on July 01, 2011.
26. R.C. Gonzalez and R.E. Woods, Digital Image Processing,
Prentice Hall, 2008.
27. R.O. Duda, P.E. Hart and D.G. Strok, Pattern Classica-
tion, Wiley, 2001.
28. J.S. Kelly and B.S. Lindblom (Eds), Scientic Examina-
tion of Questioned Documents, 2nd Edition (Forensic and
Police Science Series), CRC Press, 2006.
29. C. Schulze, M. Schreyer, A. Stahl and T.M. Breuel, Eval-
uation of Gray level Features for Printing Technique Clas-
sication in High Throughput Document Management Sys-
tems, in 2nd Int. Workshop on Computational Forensics
(IWCF), LNCS, Springer Berlin/Heidelberg, 5158:3546,
Washington, DC, USA, August, 2008.
30. C.H. Lampert, L. Mei and T.M. Breuel, Printing Tech-
nique Classication for Document Counterfeit Detection, in
Proc. of Int. Conf. on Computational Intelligence and
Security, pp. 639-644, China, 2006.
31. R.G. Kuehni, Color Space and Its Divisions: Color Order
from Antiquity to the Present, John Wiley and Sons, 2003.
32. K. Franke and S. Rose, Ink-deposition model: The rela-
tion of writing and ink deposition processes, In Proc. of the
Ninth International Workshop on Frontiers in Handwrit-
ing Recognition (IWFHR), pp. 173178, 2004.
33. J. Duchene and S. Leclercq, An optimal transformation
for discriminant and principal component analysis, IEEE
Transaction on Pattern Analysis and Machine Intelli-
gence, 10(6):978-983, 1988.