Detection of counterfeit coins based on 3D height-map image analysis

https://doi.org/10.1016/j.eswa.2021.114801Get rights and content

Highlights

  • Creating six height-map image datasets for fake coin detection.

  • Proposing 3D Precipice Border Detection Algorithm for detecting 3D borders.

  • No need for image restoration for degraded images in this method.

  • Extracting features with a high discriminating capability.

  • Feeding an ensemble classifier by feature matrices instead of feature vectors.

Abstract

Detecting a counterfeit coin using 2D image processing is nearly impossible in some cases, especially when the coin is damaged, corroded or worn out. Edge detection is one of the most widely used techniques to extract features from 2D images. However, in 2D images, the height information is missing, losing the hidden characteristics. In this paper, we propose a 3D approach to detect and analyze the precipice borders from the coin surface and extract significant features to train an ensemble classification system. To extract the features, we also propose Binned Borders in Spherical Coordinates (BBSC) to analyze different parts of precipice borders at different polar and azimuthal angles. The proposed method is robust even against degradation which appears on shiny coins after 3D scanning. Therefore, there is no need to restore the degraded images before the feature extraction process. Here, the system has been trained and tested with four types of Danish and two types of Chinese coins. We take advantage of stack generalization to classify the coins and add the reject option to increase the reliability of the system. The results illustrate that the proposed method outperforms other counterfeit coin detectors. The accuracy obtained by testing Danish 1990, 1991, 1996, and 2008 datasets are 98.6%, 98.0%, 99.8%, and 99.9% respectively. In addition, results for half Yuan Chinese 1942 and one Yuan Chinese 1997 were 95.5% and 92.2% respectively.

Introduction

Over the past several decades, a lot of counterfeit money has caused significant damage to the society. They have been made by criminals or unknown coin collectors for thousands of years as an illegal industry (Travers, 2008). It is worth noting that as a significant topic of security, counterfeit coin detection has become the focus of research in the field of numismatics. The data drawn from the Counterfeit Monitoring System (CMS) indicate that only in Europe, the total number of counterfeit euro coins removed from circulation from 2013 to 2017 was equal to 837,910 pieces whose value amounted to 1,330,401 Euros (“The protection of Euro coins in 2017,” 2017). It is expected a very large number of counterfeit euro coins still remain in circulation. In addition, as an example of an old coin which is being traded in the market, we can mention a half Chinese Yuan 1942. The price of the best quality of this coin in the market is over $1200, which illustrates the importance of counterfeit detection for old coins.

With the continuous development of 3D technologies and the fast evolution of depth sensors attached to handheld devices, 3D approaches have become a hot topic of computer vision due to its applications in areas such as recognition, security, and biometrics. It also motivates the extension of novel image processing and computer vision techniques. Because of the progress of 3D applications for different purposes, the notion of 3D approaches has determined itself as one of the most significant alternatives for 2D approaches and has attracted considerable attention of the community in recent years. In addition, it is worth noting that 3D approaches are gradually emerging as an appealing area for the design and implementation of a classification scheme, especially by those employing image datasets. Up to now, several studies based on image processing techniques and classification algorithms have been proposed that exploit images for counterfeit coin detection. Fundamentally, fake coin detection is an effortful procedure because of widely varying input templates, cluttered images, and various rotations which are the big challenges. Most of the existing image-based methods for counterfeit coin detection relied only on 2D images, failing to equip some statistical information about the height and depth, and often lose the hidden characteristics or suffer from low accuracy. Although researchers have recently achieved fruitful results in 2D image-based systems, these studies have an important drawback: it is not conceivable to rely only on 2D images, when the coins are corrupted, colored, or worn out and 2D detected edges are the only source of information. As a remedy to this limitation, the development of techniques to establish a 3D structure from a coin image can discover the complex characteristics of the coin.

Based on the type of analysis carried out, the potential of a 3D image-based method has not yet been applied for counterfeit coin detection and is still an open field of research. Despite the significance of the 3D technologies, the research in this regard is relatively scant. In this paper, we propose a 3D approach to detect and analyze the coin surface and extract significant features to train an ensemble classification system. To do this, a novel method to detect specific parts of objects on the coins that we name it Precipice Border Detection Algorithm (PBDA) will be proposed which is incorporated into the proposed framework for counterfeit coin detection. Considering the nature of the data in height-map images, we extract effective 3D features related to height or depth of the coin surface and prove the robustness of the method with cases not considered in previous works (Khazaee et al., 2018, Khazaee et al., 2017). In this method, the height-map image of the coins will be triangulated, and a clustering scheme based on the Fuzzy C-Means algorithm (Bezdek, 1981, Bezdeket al., 1984) will cluster the triangles to detect precipice borders of the coin surface. Then, we propose a method to analyze the precipice borders and extract the valuable features for training a stacking classifier with a reject option.

The focus of this paper is to propose a method to detect counterfeit coins. However, the proposed algorithms have much broader applications in the context of 3D image classification. The major contributions of the proposed framework are summarized as the following:

  • a.

    Creating six height-map image datasets and proving the competency of 3D approaches in counterfeit coin detection: we successfully detect the precipice border of the surface on the coin with our proposed 3D Precipice Border Detection Algorithm (PBDA) and use it for the feature extraction process.

  • b.

    No need for image restoration or enhancement for degraded images: the precipice borders are not affected by the degradation problem.

  • c.

    Extracting features with a high discriminating capability: we propose a system to consider the direction of the precipice borders as well as their approximate areas in the feature extraction module that we name it Binned Borders in Spherical Coordinates (BBSC).

  • d.

    Feeding an ensemble classifier by feature matrices: a feature extraction methodology is proposed to extract a feature matrix instead of a feature vector in which each row of the matrix is used separately.

The rest of the paper is organized as follows. To illustrate the current state of research on the field of image-based coin detection, we provide a literature review in Section 2. The preprocessing steps like resizing, rotation, and normalization are described in Section 3. Section 4 presents the concept and proposes a method for precipice border detection and analysis. Section 5 discusses the design of an efficient ensemble classifier with a reject option for the classification process. In Section 6, the experimental results are given to show the performance of the proposed method regarding counterfeit coin detection. Finally, the paper concludes with a summary of the primary contributions of this research and suggests an outline for future work in Section 7.

Section snippets

Literature review

In recent years, several studies have been made to recognize coins through different methods such as Gabor filter, Hough Transform, Heuristics, and Artificial Neural Networks. Recently, several image-based approaches to detect the fake coins have been proposed that extracted effective features from the texture of the coin image (J. Kim & Pavlovic, 2014). In particular, edge detection information has been widely used in the feature extraction process. In reference (Sun et al., 2015), an edge map

Preprocessing

All the coins used in this study have circular shapes. However, there are rare cases that the output of poor scanning results in an ellipse instead of a circle for a coin image. Therefore, the Hough transform is employed for ellipse detection (Yao & Yi, 2016) as the first preprocessing step for separating the coin from the background. The original resolution of the height-map images is 3550×3550 and we resize them to 400×400 with the gray level of 0 to 255. Despite the advantages of 3D scanning

Precipice border detection algorithm (PBDA)

In this part, we explain our proposed precipice border detection on the coin surface which can be extended for any height-map images. Instead of the normal edge detection in 2D approaches, a new 3D bordering concept that we name it a precipice border is proposed for the height-map images. In two-dimensional edge detection, an edge is a line separating two segments or regions while in our proposed border detection, a precipice border separates two segments leading to a set of attributes. It

Detecting counterfeit coins using an ensemble classifier

In this section, we explain how to apply an ensemble learning method in the proposed method. As mentioned in subsection 4.2, the proposed feature extraction method represents a coin by a matrix whose records are the set of features extracted from the various Bins of coin BBSC. It is clear that an individual classifier is not able to get a matrix as an input to build a model. To do this, we can easily concatenate these features to form a vector. However, we also take advantage of stacking

Experimental results

We conducted experiments to evaluate the performance of the proposed method for counterfeit coin detection. Several types of coins were used, and we applied a precise 3D scanner to scan a large number of Danish and Chinese coins. In addition, the effect of the parameters involved in the proposed method is rigorously examined. In order to demonstrate the impact of the proposed ensemble method, we compare it with the recently related published methods. Moreover, we compare the effectiveness of

An explainable approach for coin experts

In this section, we apply eXplainable AI (XAI) to improve the explainability of our proposed method (Arrieta et al., 2020). Therefore, we present a selective part of XAI that is intended to be accessible to coin experts to understand, appropriately trust, and effectively manage the emerging generation of artificially intelligent partners. It deals with the ability of the user to understand the process followed by the model to produce any given output from its input data. As there is not yet any

Conclusion

In this study, we have developed an efficient method to detect different types of counterfeit coins. In this research, four major contributions have been made. First, we created six height-map image datasets of coins and proved that 3D approaches are remarkable in counterfeit coin detection. Secondly, in our proposed method, there was no need for restoring the degraded images. Thirdly, we extracted high discriminating features based-on precipice border analysis. Finally, an ensemble classifier

CRediT authorship contribution statement

Saeed Khazaee: Conceptualization, Software, Validation, Resources, Data curation, Visualization. Maryam Sharifi Rad: Software, Visualization, Investigation. Ching Y. Suen: Supervision, Funding acquisition.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Saeed Khazaee was a full-time faculty member at Azad University and a visiting lecturer at the University of Guilan, Iran. He received his Ph.D. at 2020 in Concordia University, Montreal, Canada. He has also been awarded several times related to his research Like “Concordia Award of Excellence”, “Concordia Acceleration Award”, “Concordia University Conference and Exposition Award”, and so on. He has been in contact with several universities and companies to increase his research productivity.

References (33)

  • S. Dalila et al.

    3D face shape prediction from a frontal image using cylindrical coordinates and partial least squares

    Pattern Recognition Letters

    (2013)
  • R. Fan et al.

    Pothole detection based on disparity transformation and road surface modeling

    IEEE Transactions on Image Processing

    (2020)
  • M.A. Fischler et al.

    Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography

    Communications of the ACM

    (1981)
  • A. Gavrijaseva et al.

    Acoustic spectrum analysis of genuine and counterfeit Euro coins

    Elektronika IR Elektrotechnika

    (2015)
  • B. Hanczar et al.

    Classification with reject option in gene expression data

    Bioinformatics

    (2008)
  • Z. Jin et al.

    Depth image-based plane detection

    Big Data Analytics

    (2018)
  • Cited by (6)

    Saeed Khazaee was a full-time faculty member at Azad University and a visiting lecturer at the University of Guilan, Iran. He received his Ph.D. at 2020 in Concordia University, Montreal, Canada. He has also been awarded several times related to his research Like “Concordia Award of Excellence”, “Concordia Acceleration Award”, “Concordia University Conference and Exposition Award”, and so on. He has been in contact with several universities and companies to increase his research productivity. Saeed does research in Computer and Society, Data mining, Image Processing and Pattern Recognition. He has published 20 journal or conference papers, and 1 book chapter in the field of Data mining, pattern recognition, and image processing. He was also a reviewer for several International journals and conferences. He has been doing his research in CENPARMI, Concordia University and has an experience of collaborating with Nanchang University as a visiting scholar for a full semester.

    Maryam Sharifi Rad received her B.S. degree, M.Sc., and Ph.D. degrees in computer engineering in 2007, 2010, and 2020 respectively. She has been graduated as a top student (the 1st distinguished student based on the GPA among all Software Engineering students), in her both B.S. and M.S. degrees and has also been awarded several times related to her research. She was a full-time faculty member in Software Engineering Department of Azad University-Lahijan Branch and a visiting lecturer at the University of Guilan, Iran. Her research interests include Data Mining, Pattern Recognition, Artificial Neural Networks, and Intelligent Systems. Maryam has published about 10 papers in ISI journals, conferences, and 1 book chapter. She has been serving several journals and conferences in Iran and Canada as a reviewer.

    Ching Y. Suen is the Director of CENPARMI and the Concordia Honorary Chair on AI \& Pattern Recognition. He received his Ph.D. degree from UBC (Vancouver) and his master’s degree from the University of Hong Kong. He has served as the Chairman of the Department of Computer Science and as the Associate Dean (Research) of the Faculty of Engineering and Computer Science of Concordia University. Dr. Suen is the recipient of numerous awards, including the Gold Medal from the University of Bari (Italy 2012), the IAPR ICDAR Award (2005), the ITAC/NSERC national award (1993), and the “Concordia Lifetime Research Achievement” and “Concordia Fellow” awards (2008 and 1998 respectively), and the “Teaching Excellence Award” given by the Concordia Council of Student Life in 1995. Prof. Suen is a fellow of the IEEE (since 1986), IAPR (1994), and the Academy of Sciences of the Royal Society of Canada (1995). Currently, he is the Emeritus Editor-in-Chief of “Journal of Pattern Recognition”, and a previous Adviser and Associate Editor of “Pattern Recognition Letters”, and Editor of 6 other journals like “Expert system with Application”, “Signal, Image and Video Processing”, and Editor of a new book series on “Language Processing and Pattern Recognition”. He is not only the founder of four conferences: ICDAR, IWFHR/ICFHR, and the new conference series of ICPRAI (International Conference on Pattern Recognition and Artificial Intelligence, ICPRAI 2018 in Montreal, Canada, and a virtual ICPRAI 2020) but has also organized numerous international conferences including ICPR, ICDAR, ICFHR, ICCPOL, and as Honorary Chair of numerous international conferences. In 1997, he created the IAPR ICDAR Awards, to honor both young and established outstanding researchers in the field of Document Analysis and Recognition.

    View full text