0% found this document useful (0 votes)
10 views

minor_project_report[2]

The document presents a minor project report on a Fake Currency Detection System using machine learning, developed by students at the Kumaon Institute of Technology. The system aims to accurately identify counterfeit Indian currency notes by analyzing various security features through advanced image processing techniques. The report details the project's methodology, system architecture, and the importance of automating currency validation to enhance efficiency and accuracy in financial transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

minor_project_report[2]

The document presents a minor project report on a Fake Currency Detection System using machine learning, developed by students at the Kumaon Institute of Technology. The system aims to accurately identify counterfeit Indian currency notes by analyzing various security features through advanced image processing techniques. The report details the project's methodology, system architecture, and the importance of automating currency validation to enhance efficiency and accuracy in financial transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

BIPIN TRIPHATI KUMAON INSTITUTE OF TECHNOLOGY, DWARAHAT

MINOR PROJECT REPORT


ON
FAKE CURRENCY DETECTION SYSTEM USING
MACHINE LEARNING
BY
PRIYANKA THAKUR
(210180101049)
PRANJAL THAPA
(210180101046)
NEHA MALL
(720180101010)

UNDER THE GUIDANCE OF


Dr. ARCHANA VERMA
ASSISTANT PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
BIPIN TRIPHATI KUMAON INSTITUTE OF TECHNOLOGY, DAWARAHAT
Acknowledgement
We are immensely grateful to Dr. ARCHANA VERMA, our
project guide, for their invaluable guidance, support, and
expertise throughout this project. Their insights and suggestions
have been instrumental in shaping this research, and their
encouragement was a constant source of motivation.
We would like to thank our head of the department, our
respective faculty members, who provided us with the necessary
feedback and constructive criticism to refine the work. We are
very grateful for the stimulating discussions and the exchange of
ideas that have enriched this project.
Lastly, we extend our heartfelt gratitude to our family and friends
for their unwavering support, patience, and encouragement
throughout our academic pursuits. Their belief in us have been a
source of strength and inspiration.
This project would not have been possible without the collective
support and encouragement of all these individuals, to whom I am
deeply indebted.
Abstract
The Fake Currency Detection System addresses the critical issue of
counterfeit currency circulation, which poses significant challenges to
global economies and financial institutions. This system leverages
advanced technologies such as image processing, machine learning,
and deep learning to accurately identify counterfeit currency notes.
The detection process involves analysing various security features of
currency notes, including watermarks, security threads, micro-
printing, holograms, and serial numbers.
The proposed system is designed to be user-friendly, efficient, and
capable of detecting counterfeit currency in real-time, ensuring
minimal human intervention. Extensive testing demonstrates the
system's accuracy, reliability, and robustness in identifying fake notes
under various conditions. This report outlines the system's
architecture, methodologies, and implementation details, highlighting
its potential applications in banks, ATMs, and retail sectors to
safeguard financial transactions and maintain economic integrity.

Priyanka Thakur
Pranjal Thapa
Neha Mall
Table of contents
ACKNOWLEDGEMENT …………………………
ABSTRACT…………………………………………
INTRODUCTION……………………………………
1. LITERATURE SURVEY……………………
2. METHODOLOGY…………………………..
3. PROBLEM STATEMENT
4. SYSTEM ARCHITECTURE
5. REQUIREMENT ANALYSIS
6. FEATURES OF CURRENCY
7. METHODOLOGY
8. RESULT AND ANALYSIS
9. CONCLUSION
10. REFRENCES
I. INTRODUCTION

Currency duplication or production of counterfeit currency notes illegally by imitating the


actual manufacturing process is a huge problem that every country is facing. Fake
currency can reduce the value of real money and cause inflation due to an unauthorized
and unnatural increase in the money supply. Manual authentication of currency notes is a
solution but it is a very time-consuming, inaccurate, and difficult process. Automatic
testing of currency notes is, therefore, necessary for handling large volumes of currency
notes and then, getting accurate results in a very short time span. In this project, we
propose a fake currency note detection system using various image processing techniques
and algorithms. The proposed system is designed to validate Indian currency notes of
denomination 500 and 2000 rupees. The system consists of three main algorithms and
checks the authenticity of various features in a currency note. The first algorithm consists
of several steps including image acquisition, pre-processing, greyscale conversion, feature
extraction, image segmentation, comparisons of images and output, and uses advanced
image processing methods such as ORB and SSIM. The second algorithm authenticates
the bleed lines of the currency notes whereas the third algorithm authenticates the number
panel of the currency notes. Finally, the processed output is displayed for each currency
note. This system provides a hassle-free way to authenticate currency notes quickly and
accurately. This automated system can replace the existing manual methods and can be
used by anyone easily to detect fake currency.

A. Commonly Used Security Features to Detect Fake Notes

1) Bleed lines: There are angular bleed lines on 500 and 2000 note on left and right corner
of note in raised print. In 500Rs. note there are 5 bleed lines and In 2000Rs. note, 7 bleed
lines.
2) Security Thread: A colour-shifting security thread with the inscription Bharat (in
Hindi).RBI and 2000 (500 for 500 note). The colour changes from green to blue when it
is tilted.
3) Latent Image : Latent images of number 2000 / 500 can be seen when note is held at 45
degrees angle.
4) Water mark: Watermark of Mahatma Gandhi and electrotype of numeral 2000/500.
5) Denominational Numeral: See-through register, with denominational numeral 2000,
can be seen when you hold the note against the light.
6) Portrait of Mahatma Gandhi: Portrait of Mahatma Gandhi with RBI written on his
spectacle which can be read using a magnifying glass .
7) Number panel: Numerals growing from small to big size, is printed on the top left side
and bottom right side.
8) Denominational numeral: On left side of Mahatma Gandhi there is a 500/2000 in
Devnagari script.
9) Ashoka Pillar: There is Ashoka Pillar on right bottom side.
10) Guarantee and promise clause: The guarantee and promise clause of RBI is present in
devnagri as well as in english in the top left and top right corner of the currency notes
respectively.
11) RBI seal: The seal of RBI is present just below the Governor’s signature. This seal as
well as the guarantee clause, etc are in intaglio printing.
12) Denominational value in words: The denominational value of the currency note is
written in devnagiri script in the top central region of the note.

II. LITERATURE SURVEY

[1] In this paper an automatic system is designed for identification of Indian currency
note is fake or original. The automatic system is very useful in the banking system and
other fields also. In India increase in the fake currency notes of 100, 500, and 1000
rupees. As there are increases in technology, like scanning, colour printing, and
duplicating, there is an increase in the counterfeit problem. In this model first the image
acquisition is done and applies to pre-process to the image. In pre-processing crop,
smooth and adjust then convert the image into grey colour after conversion applies the
image segmentation then extract features and reduce, finally comparing image.

[2] In this paper, An automatic recognition of fake Indian paper currency note using
MATLAB is implemented and feature extraction with HSV colour space and other
applications of image processing. The proposed architecture is as follows Image
Acquisition, Gray-Scale Conversion, Edge Detection, Image Segmentation, Characteristic
Extraction, Comparison, Output. In the project setup, a note is placed in front of the
camera to check whether it is fake or genuine. The clicked pictures of notes are analysed
by MATLAB program installed on the computer. This algorithm works for Indian
denomination 100, 500, 1000. If the note is genuine, the respective message is appeared
on the screen and vice-versa.

[3] In this paper, a hybrid fake currency detection model was proposed and implemented
on MATLAB. The model was designed to detect fake Bangladeshi notes. In the proposed
model, three image processing algorithms were chosen namely Optical Character
Recognition(OCR), Hough Transformation and Face recognition(MSD) to get enhanced
results. Then, the results of the proposed model were compared with each model used.
The algorithm followed six basic steps: data collection, pre-processing of the collected
data, edge detection, feature extraction, identification and output results. In addition,
although the proposed model took slightly longer to process, it displayed 93.33%
accuracy which was significantly higher compared to the individual algorithms applied.

[4] In this paper two ways are used: one by using analysis through hyper spectral
imaging and the second one is the Extraction of different features in fake and real
currency notes and through comparing with each other we can able to differentiate the
fake note from the real note. The different colour lights used for hyper spectral imaging
are Ultraviolet (UV) light, Normal LED Bulb, Red LED light, Green LED light and Blue
LED light with different wavelengths ranging from 360 nm to 800nm respectively. This
all modules are implemented in MATLAB. They have implemented a fake note detection
unit with image processing algorithms. The experimental results indicate that the results
achieved are nearly accurate.

[5] In this paper the recognition and verification of the paper currency is explained with
the use of image processing techniques. The proposed approach consists of multiple
element transactions like Image Acquisition, Feature extraction and comparison, Texture
features, and Voice output. This system is divided into two parts. The first part is to
identify the currency denomination through image processing. The second part is the oral
output to notify the visually impaired person about the denomination of the note that
he/she is currently having. The desired results will be in text and voice output of the
currency recognized and verified.
III. PROBLEM STATEMENT

To test the authenticity of Indian currency notes by preparing a system which takes the
image of currency bill as input and gives the final result by applying various image
processing and computer vision techniques and algorithms.

A. Objectives

• The main objective of the project is to identify the fake Indian currency notes through
an automated system by using Image processing and computer vision techniques.
• The system should have high accuracy.
• The system should be able to give the final results in a short time.
• The system should have an User-friendly interface, to make it convenient to use and
understand.

IV. SYSTEM ARCHITECTURE


V. REQUIREMENT ANALYSIS

The implementation requirement details are given in this section. Requirement Analysis
method is intended in such a way that it takes fewer resources to figure out work correctly.
The minimum needs that we’d like to take care of: The system would require a minimum of 4
GB (Gigabyte) of RAM (Random Access memory) to run all the options sleek and
unforeseen. It wants a minimum of 2 GHz (Gigahertz) processor to run the system smoothly.
The system can be operated by common people as well as commercial people.

Python:
Python is an interpreter, object-oriented, high-level, dynamically semantic programming
language. It is particularly desirable for Rapid Application Development as well as for usage
as a scripting or glue language to tie existing components together due to its high-level built-
in data structures, dynamic typing, and dynamic binding. Python's straightforward syntax
prioritizes readability and makes it simple to learn, which lowers the cost of program
maintenance. Python's support for modules and packages promotes the modularity and reuse
of code in programs. On all popular platforms, the Python interpreter and the comprehensive
standard library are freely distributable and available in source or binary form.

Python Libraries:
OpenCV: OpenCV is a sizable open-source library for image processing, machine learning,
and computer vision. It now plays a significant part in real-time operation, which is crucial in
modern systems. With it, one may analyse pictures and movies to find faces, objects, and
even human handwriting. To install OpenCV run the command - pip install opencv-python.
Python is able to handle the OpenCV array structure for analysis when it is integrated with
different libraries, such as NumPy. We use vector space and apply mathematical operations to
these features to identify visual patterns and their various features.

NumPy: Many mathematical operations can be carried out on arrays with NumPy. It provides
a vast library of high-level mathematical functions that work on these arrays and matrices, as
well as strong data structures that ensure efficient calculations with arrays and matrices. To
install NumPy run the command - pip install numpy.

Jupyter: Debugging, task execution, and version control are supported by the simplified
code editor Jupyter Notebook. It tries to give developers only the tools they require for a
short cycle of code-build-debugging and leaves more sophisticated processes to IDEs.
VI. FEATURES OF CURRENCY
All features of Indian currency 2000 showing in fig

Fig : All security features of Indian currency 2000

Portrait of Mahatma Gandhi at the Center:


The intaglio printing of portrait of Mahatma Gandhi at the center of the
currency.

Fig : Portrait of Mahatma Gandhi


Security Thread:
When held up to the light, the security thread, which has "RBI" and "Bharat"
inscribed on it continually, can be seen at the left side of the watermark. The
photo of the Mahatma has a security thread on one side.

Fig : Security Thread

See through Register:


The denomination numeral is displayed in the see-through register. Both sides
of this register are printed. One side of the two sides is hollow, and the other
side is filled with material. The micro lettering has been written horizontally
along this register. The note has a latent image on the left side. Moreover, this
register is shown above the latent image. When viewed in contrast to the light,
this register appears as a single design.

Fig : See through Register


Ashoka Pillar:
On the right side of the coin there is a picture of the Ashoka pillar.

Fig : Ashoka Pillar

Identification Mark:
Just over the Ashoka's pillar symbol, there is an identification mark.

Fig: Identification Mark

Guarantee Clause:
Located to the right of Mahatma Gandhi's image, the guarantee clause is signed
by the governor and includes a promise clause that is printed in intaglio.
Fig : Guarantee Clause

Currency Numeral with the Rupees Symbol:


Fluorescent ink will be used for printing. When viewed from different
perspectives, the numerals change.

Fig : Currency Numeral with the Rupees Symbol

Bleed Lines:
The oblique lines that protrude from the sides of banknotes are known as bleed
lines.

Fig : Bleed Lines

Latent Image of Denomination Numeral:


The right side of Mahatma Gandhi's portrait is bordered by a vertical band on
the opposite side of the denomination. A latent image of the corresponding
denominational value is present in it. Its denominational value is represented by
a numerical value. The latent picture can be seen when the coin is held
horizontally, and it should also be held at eye level. While using counterfeit
money, it is not noticeable.

Fig : Latent Image of Denomination Numeral


Micro Lettering:
Between the vertical band and the image of Mahatma Gandhi, micro lettering is
visible. The term "RBI" and the denominational value are written in tiny letters.
The micro letters on counterfeit money are incorrectly printed.

Fig : Micro Lettering

Government of India:
The words "Government of India" are printed at the top of the one rupee note,
directly over the Devanagari-scripted number one. The smallest currency note
now in use in India is 1 rupee, and it is the only one that was produced by the
Government of India rather than the Reserve Bank of India like the others.
Because of this, it is the only one with the Finance Secretary's signature rather
than the RBI Governor's.

Fig : Government of India


VII. METHODOLOGY

A. Preparation of Dataset
• The first step is the preparation of a dataset containing images of different currency
notes (both fake and real) and images of different features of each of the currency notes
• The dataset will contain the following repositories:
– Sub- dataset for Rs. 500 currency notes
1) Images of real notes
2) Images of fake notes
3) Multiple images of each security feature (template)
– Sub- dataset of Rs. 2000 currency notes (Similar structure)
• The various security features that we are considering are: (for Rs. 500 currency notes-
Total 10 features)
– Rs. 500 in Devanagari and English script (2 features)
– Ashoka pillar Emblem (1 feature)
– RBI symbols in Hindi and English (2 features)
– 500 rupees written in Hindi (1 feature)
– RBI logo (1 feature)
– Bleed Lines on Left and right side (2 features)
– Number Panel (1 feature)

B. Image Acquisition
Next, the image of the test-currency note is taken as input and fed it into the system. The
image should be taken from a digital camera or preferably, using a scanner. The image
should have a proper resolution, proper brightness and should not be hazy or unclear.
Blurred images and images with less detail may adversely affect the performance of the
system.

C. Pre-processing
Next, the pre-processing of the input image is done. In this step, first the image is resized
to a fixed size. A fixed size of image makes a lot of computations simpler. Next up, image
smoothening is performed by using Gaussian Blurring method. Gaussian blurring
removes a lot of noise present in the image and increases the efficiency of the system.

D. Gray- scale conversion


Gray scale conversion is mainly used because an RGB image has 3 channels whereas a
gray image has only one channel. This makes the computation and processing on images
much more easier in the case of gray scaled images.

Algorithm for feature 1- 7

1) Feature detection and matching using ORB:

After completing the necessary processing of the image, feature detection and matching
is done using ORB. Our dataset already contains the images of different security features
present in a currency note (total 10). Further, we have multiple images of varying
brightness and resolutions corresponding to each security feature (6 templates for each
feature). Using the ORB algorithm, each security feature is detected in the test image. To
make the searching of the security feature (template image) easier and more accurate, a
search area will be defined on the test currency image where that template is most likely
to be present. Then, ORB will be used to detect the template in the test image and the
result will be highlighted properly with a marker. This process will be applied for every
image of each security feature present in the data-set and every time the detected part of
the test image will be highlighted properly using proper markers, outliers or anomalies in
the dataset. While these methods have shown promise, they have not yet provided a
consistent and permanent solution to the issue of fraud detection. The dynamic nature of
fraud requires continuous adaptation and improvement of these techniques.
2) Feature Extraction: Now, using ORB location of each template has been detected in
the input image within the highlighted area. The highlighted area is then cropped by
slicing the 3D pixel matrix of the image. Next, we apply Gray scaling and Gaussian
blur to further smoothen the image and now our feature is ready to be compared with
the corresponding feature in our trained model.

Fig. : Features in 500 rupees currency bill

Fig. : Features in 2000 rupees currency bill

3) Feature comparison using SSIM : From the previous step, the part of the test currency
image which matches with each of the
4) templates will be generated. In this method, the original template will be compared
with the extracted feature and then a score will be given for the similarity between the
two images using SSIM.
SSIM(x, y) = (2µxµy + c1)(2σxy + c2) (µ2 x + µ2 y + c1)(σ 2 x + σ 2 y + c2) .

The Structural Similarity Index (SSIM) is a scoring system that quantifies the image
quality degradation that is caused by processing such as data compression or by losses in
data transmission. Basically it looks for similarity between two images. It is a part of
skimage library and uses the above mentioned formula to calculate similarity. It returns a
value between -1 and 1. Closer the SSIM to 1, higher is the similarity. So, for every
security feature, the SSIM value between each image of that security feature and the
corresponding extracted feature from the test image will be calculated. Then, the mean
SSIM for each security feature is calculated and stored.

Flowchart for defining the working


Algorithm 2: For feature 8 and 9
Every currency note contains bleed lines near the left and right edges. There are 5 lines in
case of 500 currency note and 7 lines in case of Rs. 2000 currency near each of the two sides.
This algorithm is being used to count and verify the number of bleed lines present in the left
and right sides of a currency note. (feature 8 and 9)
1) Feature Extraction:
In the first step, the region in which the bleed lines are present are extracted by cropping the
image. So, a part near the left and right edges of the input currency note image is carefully
extracted.
2) Image Thresholding:
In the 2nd step, the image is thresholded using a suitable value. This ensures that only the
black bleed lines remain on a white background and makes further processing quite easy.
3) Calculation of number of bleed lines:
The 3rd step involves calculation of number of bleed lines. In this step, first we iterate over
each column of the thresholded image. Then we iterate over each pixel of each column.
Then, we calculate the number of black regions in each column by increasing a counter
whenever current pixel of the column is white and the immediate next pixel is black.
Similarly we, count number of black regions for each column, but, if the number of black
regions is too large (>= 10), then that column is erroneous and it is discarded. Finally, the
average count of black regions is calculated by considering the non- erroneous columns only
and the result is displayed as the number of bleed lines. This count should be approximately
5 for Rs 500 currency notes and 7 for Rs 2000 currency notes.

VIII. RESULT AND ANALYSIS

Result
There are other ways to detect if the money is phony or not, but they all follow the same basic
stages. Image capture, edge recognition, segmentation, grayscale conversion, and feature
extraction are among them. Most of the articles use MATLAB as their computation tool,
however we ultimately used OpenCV and Python as our programming language. To perform
comparisons and determine the outcome, a number of characteristics that identify genuine
currency apart from counterfeit ones are taken into account. We are aware that these tools are
used at banks and businesses to help identify counterfeit money, but the average person who
lacks these resources is susceptible to this. Our goal is to offer a low-cost system with quick
computations that can make decisions in a matter of seconds. The entire process ought to
function for Indian denomination 2000 and 500. It would be simple for the general public to
use, relatively portable, and reasonably priced. The model has some limitations. However, it
is still more precise than human detection. It can currently be utilized as an additional tool to
lessen human mistake. Additionally, the model's accuracy can be increased any further with
more data and better analysis.

Analysis
The proposed system authenticates the input image of currency note through image
processing. The input image passes through various algorithms in which the image is
processed and each extracted feature is thoroughly examined. The results are calculated in the
following manner:

• Algorithm 1 (Feature 1-7): This algorithm finally collects the average SSIM score
and the max. SSIM score for each feature. A feature passes the test and is real if the average
SSIM score is greater than a minimum value (this value has to be decided after proper
testing). A feature also passes the test if the max. SSIM score is too high (probably greater
than 0.8).

• Algorithm 2 (Feature 8-9): This algorithm finally returns the average number of bleed
lines present in the left and right sides of a currency note. Each feature passes the test if the
average number of bleed lines is closer to 5, in case of Rs 500 currency note, and 7, in case of
2000 currency note.

Displaying Output
Finally, the result of all algorithms is displayed to the user. The extracted image of each
feature and the various important data collected for each feature is displayed properly in a
GUI window. Further, the status (Pass/ Fail) of each feature is displayed along with the
details. Finally the total number of features that have passed successfully for the input image
of currency note is displayed and based upon that it is decided whether the note is fake or not.
The entire GUI is programmed in python itself using tkinter library.
Fig. : Intially no image is dislayed and user is asked to insert image

Fig. : Browsing image


Fig. : Input image of currency note

Fig. : Image sent for processing...


IX.CONCLUSION

In this paper, a fake currency detection model has been proposed for authentication of Indian
currency notes of denomination 500 and 2000 and implemented using OpenCV image
processing library in Python3. In this model, 10 features of the input currency note are
considered and then analyzed using 3 different algorithms. The input image is taken through a
GUI which allows the user to browse the image in his/ her system. Then the results of the
implemented model are computed and the analysis of each feature is displayed in detail
through a graphical user interface (GUI) created using Tkinter GUI library. The model takes
less time (about 5 sec- when only final results are shown leaving unnecessary details) for
processing an input image.
As using money is a vital requirement for all of us, it is important to monitor its authenticity
at all times. India uses paper currency considerably more frequently than other nations,
consequently there is a great demand for a mechanism to identify counterfeit money. While
various banknotes are frequently employed in businesses, the suggested system appears to be
highly helpful for users to determine whether a currency is authentic or not. This module
compares more characteristics of the currency's grayscale image for feature extraction than
any other proposed systems. Thus, the proposed module detects the fake currency and it will
be very helpful for the common people to use it.

Advantages :
 The application will be very helpful in identifying counterfeit money.
 The software is simple to use and accessible.
 It will lessen the user's effort and save time.
 It provides the user methods that are more affordable, accurate, and give accurate
recognition of money notes.
 Minimizes the circulation of counterfeit money, protecting the economy from inflationary
pressures caused by fake currency.
 Prevents financial losses by identifying counterfeit notes before they are accepted in
transactions.
 Reduces long-term costs associated with financial losses and legal issues stemming from
counterfeit money.
 Speeds up transactions by quickly verifying the authenticity of currency, improving overall
workflow in high-cash environments.

Limitations:
 This project cannot be able to detect the currencies whether it is fake or not, of other
countries except India.
 This project is only able to detect the currencies whether it is fake or not with
denomination 2000 and 500 of Indian rupees.

Future Scope
 This project cannot be able to detect the currencies of other countries except India. So in
the future we can make this project possible to detect the currencies of other countries also.
 This project is only able to detect the currencies whether it is fake or not with
denomination 2000 and 500 of Indian rupees. So in the future we can make it possible that it
will detect the currencies with all denomination.
 In this project, we worked using a few features of the currencies. So in the future we can be
able to work with all features of currencies to increase the accuracy of the project.
 In this project we have only implemented algorithm 1 and 2 for features 1 to 9 but we have
not implemented any algorithm for feature 10(number panel detection) which will be done in
the next upcoming project module.

X.REFRENCES
[1] S. R. Darade and G. Gidveer, “Automatic recognition of fake indian currency note,” in
2016 international conference on Electrical Power and Energy Systems (ICEPES). IEEE,
2016, pp. 290–294.
[2] B. P. Yadav, C. Patil, R. Karhe, and P. Patil, “An automatic recognition of fake indian
paper currency note using matlab,” Int. J. Eng. Sci. Innov. Technol, vol. 3, pp. 560–566,
2014.
[3] A. Zarin and J. Uddin, “A hybrid fake banknote detection model using ocr, face
recognition and hough features,” in 2019 Cybersecurity and Cyberforensics Conference
(CCC). IEEE, 2019, pp. 91–95.
[4] M. S. Veling, M. J. P. Sawal, M. S. A. Bandekar, M. T. C. Patil, and M. A. L. Sawant,
“Fake indian currency recognition system by using matlab.”
[5] F. A. B, P. Mangayarkarasi, Akhilendu, A. A. S, and M. K, “Fake indian currency note

You might also like