the instant checks without having human supervision
involved. Unlike existing approaches, this work
presents the first systematic comparison of several
ML and DL models to find the best solution and
provides a practical framework of improving the
capability of counterfeit detection beyond current
level. These systems offer the promise that they will
help reduce the occurrence of financial fraud, beef up
their security, and restore confidence in monetary
systems all around the globe, which is definitely
something that is sorely needed in today’s technology
filed financial landscape (Yin & Li, 2020; Borges &
Silva, 2021).
2 RESEARCH AREA
2.1 Data Collection and Preprocessing
To start, a dataset of images of banknotes that are real
and fake is obtained. To this end, publicly available
databases or datasets particular to this case will
comprise high resolution images of different
denominations of banknotes from different countries
(Yadav & Verma, 2018). The format of the images is
made standard along with its size and resolution. To
increase the variability of data, some coupled image
augmentation techniques, e.g., rotation, scale change,
and noise addition, are performed to prevent
overfitting (Chen & Liu, 2017). Therefore,
transformations like the grayscale conversion and the
histogram equalization can be applied to improve
contrast of the banknote images and simplify
identification of texture, edges and the fine features
and details (Sharma & Kumar, 2019).
2.2 Feature Extraction
After preprocessing of the images, in the process of
ML based counterfeit detection the subsequent step
after the preprocessing of the images is feature
extraction which plays a very crucial role. The
pertinent features which can be edges, texture, and
color patterns are to be manually extracted in legacy
machine learning type of models like SVM, KNN,
and Random Forests using methods like HOG
(Histogram of Oriented Gradients), Gabor Filters, and
SIFT (Scale-Invariant Feature Transform) (Arora &
Sharma, 2018). In deep learning models types like
CNNs, feature extraction is not required through the
convolutional layers of the network, which learn
hierarchical features from the raw image data (Tan &
Duan, 2021).
2.3 Model Development and Training
At this phase, we implement multiple ML and DL
algorithms to train the models in order to identify
counterfeits. We use manually extracted features to
train the SVM model and kernel functions such as
linear or radial basis function (RBF) to provide better
classification (Chen & Liu, 2017). KNN and Random
Forest are also trained from the extracted features,
where KNN predicts based on closeness to nearest
neighbours and Random Forest generates an
ensemble of decision trees for hard classification
(Sami & Gaurav, 2019). The CNN model, on the other
hand, comprises several convolutional layers to learn
and extract features automatically and dense layers
for the final classification into real or fake classes
(Vijay & Kaur, 2019). The models are trained on a
training data set and cross validation methods used to
validate them in an effort to make them generalizable
(Zhou & Wang, 2016).
2.4 Model Evaluation
After training, the models' performances are
evaluated through a series of metrics: accuracy,
precision, recall, F1-score, and confusion matrix (Tan
& Duan, 2021). These enable one to see how well
each algorithm detects fake currency and
distinguishes it from real notes. The evaluation also
includes testing the models on an independent test set
that was not used in training. The CNN model, being
a deep learning-based approach, ought to perform
better than the standard ML models on accuracy in
terms of its ability to learn complex patterns from
images automatically (Vijay & Kaur, 2019).
However, all models are compared to determine the
most computationally efficient algorithm in terms of
computational resources, training time, and
classification performance (Chen & Liu, 2017).
Further, how different preprocessing steps, e.g.,
image resizing or color correction, influence the
pipeline is examined to determine the optimal
pipeline for counterfeit detection (Sharma & Kumar,
2019). This approach allows for an end-to-end
evaluation of the performance of various ML and DL
techniques, yielding valuable insights into the
practical applicability of the technologies in fake
banknote detection (Arora & Sharma, 2018).
3 EXISTING SYSTEM
Most current methods of counterfeit banknote
detection rely on physical examination and security