Abstract
In image-based coin detection, making the image readable is an indispensable part of the feature extraction. However using a 2-D image processing approach for detecting a counterfeit coin is nearly impossible in case of destroyed coins whose textures are severely burnt, sulfated, rusted, or colored.
In this research, we used a 3-D scanner to scan and model an acceptable number of coins capturing height and depth instead of levels of color. The most important advantage of 3-D scanning is to compensate for the above-mentioned destructions of the coin surface. Despite this advantage, we had several unexpected degradations due to shiny coin images. To solve this problem, the 3-D image was decomposed column-wise to a number of separate 1-D signals, which were analyzed separately and restored by the proposed method. This approach gave remarkable results when used to extract valuable features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goldsborough, R.: Counterfeit Coin Detection (2013). http://rg.ancients.info/guide/counterfeits.html
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn, p. 311. Prentice, Pearson, Upper Saddle River (2008)
Hassoubah, R.S., Aljebry, A.F., Elrefaei, L.A.: Saudi riyal coin detection and recognition. In: 2nd IEEE International Conference on Image Information Processing (ICIIP), Int. J. Comput. Appl., pp. 62–66, December 2013
Huber, R., Ramoser, H., Mayer, K., Penz, H., Rubik, M.: Classification of coins using an eigenspace approach. Pattern Recognit. Lett. 26(1), 61–75 (2005)
Inksure Technologies. Coin anti-counterfeiting (2014). http://www.inksure.com/banknotesecurity/254-coin-anti-counterfeiting
Kaiser, J.F.: On a simple algorithm to calculate the ‘energy’ of a signal. In: Proceedings of the International Conference on Acoustics, Speech, and Signal Processing ICASSP 1990, Albuquerque, NM, vol. 1, pp. 381–384 (1990)
Khazaee, S., Faez, K.: A novel classification method using hybridization of fuzzy clustering and neural networks for intrusion detection. IJMECS 6(11), 11–24 (2014)
Kim, S., Lee, S.H., Ro, Y.M.: Image-based coin recognition using rotation-invariant region binary patterns based on gradient magnitudes. J. Vis. Commun. Image Res. 32, 217–223 (2015)
Maaten, L.J., Postma, E.O.: Towards automatic coin classification, 1st EVA-Vienna, April 2006, pp. 19–26
Mehta, D., Sagar, A.: An efficient way to detect and recognize the overlapped coins using Otsu’s algorithm based on Hough transform technique. Int. J. Comput. Appl. 73(9), 18–21 (2013)
Saranya, Y.M., Pugazhenthi, R.: Harris-Hessian algorithm for coin apprehension. Int. J. Adv. Res. Comput. Eng. Technol. 2(5), 1689–1693 (2013)
Shen, L., Jia, S., Ji, Z., Chen, W.S.: Extracting local texture features for image-based coin recognition. IET Image Process. 5(5), 394–401 (2011)
Sun, K., Feng, B.Y., Atighechian, P., Levesque, S., Sinnott, B., Suen, C.Y.: Detection of counterfeit coins based on shape and letterings features. In: Proceedings of 28th ISCA International Conference on Computer Applications in Industry and Engineering, San Diego, USA, pp. 165–170, October 2015
Tresanchez, M., Pallejà , T., Teixidó, M., PalacÃn, J.: Using the optical mouse sensor as a two-euro counterfeit coin detector. Sensors (Basel, Switzerland) 9(9), 7083–7096 (2009)
Yoshida, T.H.: Fundamentals of Three Dimensional Digital Image Processing. Springer, New York (2009)
Zhang, C., Xu, J., Xi, N., Zhao, J., Shi, Q.: A robust surface coding method for optically challenging objects using structured light. IEEE Trans. Autom. Sci. Eng. 11(3), 775–788 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Khazaee, S., Sharifi Rad, M., Suen, C.Y. (2017). Detection of Counterfeit Coins Based on Modeling and Restoration of 3D Images. In: Barneva, R., Brimkov, V., Tavares, J. (eds) Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications. CompIMAGE 2016. Lecture Notes in Computer Science(), vol 10149. Springer, Cham. https://doi.org/10.1007/978-3-319-54609-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-54609-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54608-7
Online ISBN: 978-3-319-54609-4
eBook Packages: Computer ScienceComputer Science (R0)