Banknote Authentication with Mobile Devices

被引:14
|
作者
Lohweg, Volker [1 ]
Hoffmann, Jan Leif [1 ]
Doerksen, Helene [1 ]
Hildebrand, Roland [1 ]
Gillich, Eugen [1 ]
Hofmann, Juerg [2 ]
Schaede, Johannes [2 ]
机构
[1] Ostwestfalen Lippe Univ Appl Sci, InIT Inst Ind IT, D-32657 Lemgo, Germany
[2] KBA NotaSys SA, CH-1018 Lausanne, Switzerland
关键词
Banknote; Authentication; Mobile Device; smartphone; Wavelet Transform; Classification; Adaptation; Sound-of-Intaglio; FEATURE-EXTRACTION; WAVELET;
D O I
10.1117/12.2001444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Maintaining confidence in security documents, especially banknotes, is and remains a major concern for the central banks in order to maintain the stability of the economy around the world. In this paper we describe an image processing and pattern recognition approach which is based on the Sound-of-Intaglio principle for the usage in smart devices such as smartphones. Today, in many world regions smartphones are in use. These devices become more and more computing units, equipped with resource-limited, but effective CPUs, cameras with illumination, and flexible operating systems. Hence, it is obvious to apply smartphones for banknote authentication, especially for visually impaired persons. Our approach shows that those devices are capable of processing data under the constraints of image quality and processing power. Strictly a mobile device as such is not an industrial product for harsh environments, but it is possible to use mobile devices for banknote authentication. The concept is based on a new strategy for constructing adaptive Wavelets for the analysis of different print patterns on a banknote. Furthermore, a banknote specific feature vector is generated which describes an authentic banknote effectively under various illumination conditions. A multi-stage Linear-discriminant-analysis classifier generates stable and reliable output.
引用
下载
收藏
页数:14
相关论文
共 50 条
  • [1] Generalisation Approach for Banknote Authentication by Mobile Devices Trained on Incomplete Samples
    Suermeli, Bari Guen
    Gillich, Eugen
    Doerksen, Helene
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT II, 2023, 14255 : 332 - 343
  • [2] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [3] ECG Authentication for Mobile Devices
    Arteaga-Falconi, Juan Sebastian
    Al Osman, Hussein
    El Saddik, Abdulmotaleb
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2016, 65 (03) : 591 - 600
  • [4] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [5] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95
  • [6] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [7] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [8] Rethinking Authentication on Smart Mobile Devices
    Wang, Ding
    Shen, Jian
    Liu, Joseph K.
    Choo, Kim-Kwang Raymond
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [9] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [10] Face recognition for authentication on mobile devices
    Vazquez-Fernandez, Esteban
    Gonzalez-Jimenez, Daniel
    IMAGE AND VISION COMPUTING, 2016, 55 : 31 - 33