{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:41:56Z","timestamp":1768272116330,"version":"3.49.0"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T00:00:00Z","timestamp":1392854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11042-013-1809-x","type":"journal-article","created":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T01:44:39Z","timestamp":1392774279000},"page":"4013-4043","source":"Crossref","is-referenced-by-count":41,"title":["Currency security and forensics: a survey"],"prefix":"10.1007","volume":"74","author":[{"given":"J.","family":"Chambers","sequence":"first","affiliation":[]},{"given":"W.","family":"Yan","sequence":"additional","affiliation":[]},{"given":"A.","family":"Garhwal","sequence":"additional","affiliation":[]},{"given":"M.","family":"Kankanhalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,20]]},"reference":[{"key":"1809_CR1","doi-asserted-by":"crossref","unstructured":"Adams G, Pollard S, Simske S (2011) A study of the interaction of paper substrates on printed forensic imaging. In: Proceedings of the 11th ACM symposium on Document engineering (DocEng \u201911), New York, USA, pp 263\u2013266","DOI":"10.1145\/2034691.2034743"},{"key":"1809_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed DH, Sung HJ, Kim DS (2011) Simulation of non-Newtonian ink transfer between two separating plates for gravure-offset printing. In: International Journal of Heat and Fluid Flow, vol. 32, no. 1, pp 298\u2013307","DOI":"10.1016\/j.ijheatfluidflow.2010.06.011"},{"key":"1809_CR3","doi-asserted-by":"crossref","unstructured":"Arabo A (2008) Secure cash withdrawal through mobile phone\/device. In: International Conference on Computer and Communication Engineering (ICCCE 2008), vol. 1, pp 818\u2013822","DOI":"10.1109\/ICCCE.2008.4580719"},{"key":"1809_CR4","doi-asserted-by":"crossref","unstructured":"Beekhof FP, Voloshynovskiy S, Koval O, Villan R, Topak E (2008) Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. In: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop (e-Forensics\u201908), pp 1\u20135","DOI":"10.4108\/e-forensics.2008.2647"},{"key":"1809_CR5","volume-title":"Moneymakers: the secret world of banknote printing","author":"KW Bender","year":"2006","unstructured":"Bender KW (2006) Moneymakers: the secret world of banknote printing. Wiley-VCH, Weinheim"},{"issue":"1","key":"1809_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s00339-006-3723-9","volume":"86","author":"S Berthier","year":"2007","unstructured":"Berthier S, Boulenguez J, B\u00e1lint Z (2007) Multiscaled polarization effects in Suneve coronata (Lepidoptera) and other insects: application to anti-counterfeiting of banknotes. Appl Phys A Mater Sci Process 86(1):123\u2013130","journal-title":"Appl Phys A Mater Sci Process"},{"key":"1809_CR7","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.3390\/s130202515","volume":"2","author":"A Bruna","year":"2013","unstructured":"Bruna A, Guarnera GC, Battiato S (2013) Forgery detection and value identification of Euro banknotes. Sensors 2:2515\u20132529","journal-title":"Sensors"},{"key":"1809_CR8","doi-asserted-by":"crossref","unstructured":"Bulan O, Mao J, Sharma G (2009) Geometric distortion signatures for printer identification. In: Proceedings of the 2009 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201909), Washington D. C. USA, pp 1401\u20131404","DOI":"10.1109\/ICASSP.2009.4959855"},{"key":"1809_CR9","volume-title":"The devil\u2019s workshop: a memoir of the Nazi counterfeiting operation","author":"A Burger","year":"2009","unstructured":"Burger A (2009) The devil\u2019s workshop: a memoir of the Nazi counterfeiting operation. Frontline Books, Barnsley"},{"key":"1809_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch J, Lysyanskaya A, Meyerovich M (2007) Endorsed e-Cash. In: IEEE Symposium on Security and Privacy (SP\u201907), pp 101\u2013115","DOI":"10.1109\/SP.2007.15"},{"key":"1809_CR11","doi-asserted-by":"crossref","unstructured":"Cao B, Liu J (2010) Currency recognition modelling research based on BP neural network improved by gene algorithm. In: Proceedings of the Second International Conference on Computer Modelling and Simulation (ICCMS\u201910), Washington, DC, USA, pp 246\u2013250","DOI":"10.1109\/ICCMS.2010.270"},{"key":"1809_CR12","first-page":"477","volume-title":"Communication and networking, ser. communications in computer and information science","author":"S-H Chae","year":"2009","unstructured":"Chae S-H, Kim JK, Pan SB (2009) A study on the Korean banknote recognition using RGB and UV information. In: Slezak D, Kim T-H, Chang AC-C, Vasilakos T, Li M, Sakurai K (eds) Communication and networking, ser. communications in computer and information science, vol 56. Springer, Berlin, pp 477\u2013484"},{"key":"1809_CR13","doi-asserted-by":"crossref","unstructured":"Chang CC, Yu TX, Yen HY (2007) Paper currency verification with support vector machines. In: Third International IEEE Conference on Signal-Image Technologies and Internet-Based System (SITIS\u201907), Washington, DC, USA, pp 860\u2013865","DOI":"10.1109\/SITIS.2007.146"},{"issue":"24","key":"1809_CR14","doi-asserted-by":"crossref","first-page":"22 054","DOI":"10.1364\/OE.17.022054","volume":"17","author":"TH Chia","year":"2009","unstructured":"Chia TH, Levene MJ (2009) Detection of counterfeit U.S. paper money using intrinsic fluorescence lifetime. Opt Express 17(24):22 054\u201322 061","journal-title":"Opt Express"},{"issue":"2","key":"1809_CR15","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MSP.2008.931082","volume":"26","author":"P-J Chiang","year":"2009","unstructured":"Chiang P-J, Khanna N, Mikkilineni A, Segovia MVO, Suh S, Allebach J, Chiu G, Delp E (2009) Printer and scanner forensics. Signal Proc Mag 26(2):72\u201383","journal-title":"Signal Proc Mag"},{"key":"1809_CR16","doi-asserted-by":"crossref","unstructured":"Clarkson W, Weyrich T, Finkelstein A, Heninger N, Halderman JA, Felten EW (2009) Fingerprinting blank paper using commodity scanners. In: 30th IEEE Symposium on Security and Privacy, pp 301\u2013314","DOI":"10.1109\/SP.2009.7"},{"key":"1809_CR17","doi-asserted-by":"crossref","unstructured":"Daraee F, Mozaffari S (2010) Eroded money notes recognition using wavelet transform. In: 6th Iranian Machine Vision and Image Processing (MVIP\u201910), pp 1\u20135","DOI":"10.1109\/IranianMVIP.2010.5941144"},{"key":"1809_CR18","doi-asserted-by":"crossref","unstructured":"Das V (2009) Protocol for anonymous e-cash for secure electronic commerce - initiation. In: Second International Conference on Future Information Technology and Management Engineering (FITME\u201909), pp 119\u2013123","DOI":"10.1109\/FITME.2009.35"},{"key":"1809_CR19","doi-asserted-by":"crossref","unstructured":"Dasari H, Bhagvati C (2007) Identification of non-black inks using HSV colour space. In: Ninth International Conference on Document Analysis and Recognition (ICDAR\u201907), vol. 1. IEEE, pp 486\u2013490","DOI":"10.1109\/ICDAR.2007.4378757"},{"key":"1809_CR20","doi-asserted-by":"crossref","unstructured":"Dass R, Muttukrishnan R (2011) Security framework for addressing the issues of trust on mobile financial services. In: 7th International Conference on Next Generation Web Services Practices (NWeSP), pp 99\u2013104","DOI":"10.1109\/NWeSP.2011.6088160"},{"key":"1809_CR21","doi-asserted-by":"crossref","unstructured":"Dayakshini, Sathisha K (2011) Bank automation system for Indian currency- a novel approach. In: Recent Advances in Intelligent Computational Systems (RAICS\u201911), pp 299\u2013302","DOI":"10.1109\/RAICS.2011.6069322"},{"key":"1809_CR22","doi-asserted-by":"crossref","unstructured":"Debnath KK, Ahdikary JK, Shahjahan M (2009) A currency recognition system using negatively correlated neural network ensemble. In: 12th International Conference on Computers and Information Technology (ICCIT \u201909), pp 367\u2013372","DOI":"10.1109\/ICCIT.2009.5407265"},{"key":"1809_CR23","doi-asserted-by":"crossref","unstructured":"Debnath KK, Ahmed SU, Shahjahan M (2010) A paper currency recognition system using negatively correlated neural network ensemble. In: 12th International Conference on Computers and Information Technology (ICCIT\u201909), vol. 5, no. 6, pp 367\u2013372","DOI":"10.4304\/jmm.5.6.560-567"},{"key":"1809_CR24","doi-asserted-by":"crossref","unstructured":"Gaubatz MD, Simske SJ (2009) Printer-scanner identification via analysis of structured security deterrents. In: First IEEE International Workshop on Information Forensics and Security (WIFS\u201909), pp 151\u2013155","DOI":"10.1109\/WIFS.2009.5386463"},{"key":"1809_CR25","doi-asserted-by":"crossref","unstructured":"Gaubatz MD, Simske SJ, Gibson S (2009) Distortion metrics for predicting authentication functionality of printed security deterrents. In: 16th IEEE International Conference on Image Processing (ICIP\u201909), Washington, DC, USA, pp 1489\u20131492","DOI":"10.1109\/ICIP.2009.5414608"},{"key":"1809_CR26","doi-asserted-by":"crossref","unstructured":"Geusebroek J-M, Markus P, Balke P (2011) Learning banknote fitness for sorting. In: International Conference on Pattern Analysis and Intelligent Robotics (ICPAIR\u201911), vol. 1, pp 41\u201346","DOI":"10.1109\/ICPAIR.2011.5976909"},{"key":"1809_CR27","doi-asserted-by":"crossref","unstructured":"Glock S, Gillich E, Schaede J, Lohweg V (2009) Feature extraction algorithm for banknote textures based on incomplete shift invariant wavelet packet transform. In: Proceedings of the 31st DAGM Symposium on Pattern Recognition. Berlin, Heidelberg: Springer-Verlag, pp 422\u2013431","DOI":"10.1007\/978-3-642-03798-6_43"},{"key":"1809_CR28","doi-asserted-by":"crossref","unstructured":"Gou H, Li X, Li X, Yi J (2011) A reliable classification method for paper currency based on LVQ neural network. In: Advances in Computer Science and Education Applications. Springer Berlin Heidelberg, vol. 202, pp 243\u2013247","DOI":"10.1007\/978-3-642-22456-0_35"},{"key":"1809_CR29","doi-asserted-by":"crossref","unstructured":"Grijalva F, Rodriguez JC, Larco J, Orozco L (2010) Smartphone recognition of the U.S. banknotes\u2019 denomination, for visually impaired people. In: IEEE ANDESCON 2010, pp 1\u20136","DOI":"10.1109\/ANDESCON.2010.5631773"},{"key":"1809_CR30","doi-asserted-by":"crossref","unstructured":"Guedes A, Algarra M, Prieto AC, Valentim B, Hortelano V, Neto S, Algarra R, Noronha F (2013) Raman microspectroscopy of genuine and fake euro banknotes. Spectrosc Lett Int J Rapid Commun, 569\u2013576","DOI":"10.1080\/00387010.2013.769007"},{"key":"1809_CR31","doi-asserted-by":"crossref","unstructured":"Guo J, Chow A (2008) Virtual money systems: a phenomenal analysis. In: 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and EServices, pp 267\u2013272","DOI":"10.1109\/CECandEEE.2008.91"},{"key":"1809_CR32","doi-asserted-by":"crossref","unstructured":"Guo J, Zhao Y, Cai A (2010) A reliable method for paper currency recognition based on LBP. In: 2nd IEEE International Conference on Network Infrastructure and Digital Content, Washington, DC, USA, pp 359\u2013363","DOI":"10.1109\/ICNIDC.2010.5657978"},{"key":"1809_CR33","doi-asserted-by":"crossref","unstructured":"Halder B, Garain U (2010) Color feature based approach for determining ink age in printed documents. In: 20th International Conference on Pattern Recognition (ICPR\u201910), pp 3212\u20133215","DOI":"10.1109\/ICPR.2010.785"},{"key":"1809_CR34","doi-asserted-by":"crossref","unstructured":"Hasanuzzaman FM, Yang X, Tian Y (2011) Robust and effective component-based banknote recognition by SURF features. In: 20th Annual Wireless and Optical Communications Conference (WOCC\u201911), pp. 1\u20136","DOI":"10.1109\/WOCC.2011.5872294"},{"key":"1809_CR35","doi-asserted-by":"crossref","unstructured":"Hasanuzzaman FM, Yang X, Tian Y (2012) Robust and effective component-based banknote recognition for the blind. IEEE Trans Syst Man Cybern C Appl Rev (99):1\u201310","DOI":"10.1109\/TSMCC.2011.2178120"},{"issue":"6","key":"1809_CR36","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.eswa.2009.01.057","volume":"36","author":"H Hassanpour","year":"2009","unstructured":"Hassanpour H, Farahabadi PM (2009) Using Hidden Markov models for paper currency recognition. Expert Syst Appl 36(6):105\u2013111","journal-title":"Expert Syst Appl"},{"key":"1809_CR37","doi-asserted-by":"crossref","unstructured":"He K, Peng S, Li S (2008) A classification method for the dirty factor of banknotes based on neural network with sine basis functions. In: International Conference on Intelligent Computation Technology and Automation (ICICTA\u201908), vol. 1, pp 159\u2013162","DOI":"10.1109\/ICICTA.2008.35"},{"key":"1809_CR38","doi-asserted-by":"crossref","unstructured":"Heudt L, Debois D, Zimmerman TA, K\u00f6hler L, Bano F, Partouche F, Duwez A-S, Gilbert B, Pauw ED (2012) Raman spectroscopy and laser desorption mass spectrometry for minimal destructive forensic analysis of black and color inkjet printed documents. Forensic Sci Int 64\u201375","DOI":"10.1016\/j.forsciint.2011.12.001"},{"key":"1809_CR39","doi-asserted-by":"crossref","unstructured":"Hong Z (2009) The impact of e-money on the economy. In: WRI World Congress on Computer Science and Information Engineering, vol. 3, pp 126\u2013130","DOI":"10.1109\/CSIE.2009.194"},{"key":"1809_CR40","doi-asserted-by":"crossref","unstructured":"Hrishikesh C, Shefali S (2009) Printed document watermarking using phase modulation. In: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET\u201909), pp 222\u2013227","DOI":"10.1109\/ICETET.2009.183"},{"issue":"2","key":"1809_CR41","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/TIFS.2007.897255","volume":"2","author":"S Huang","year":"2007","unstructured":"Huang S, Wu JK (2007) Optical watermarking for printed document authentication. IEEE Trans Inf Forensic Secur 2(2):164\u2013173","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1809_CR42","doi-asserted-by":"crossref","unstructured":"Huber-M\u00f6rk R, Heiss-Czedik D, Mayer K, Penz H, Vrabl A (2007) Print process separation using interest regions. In: Proceedings of the 12th international conference on Computer analysis of images and patterns (CAIP\u201907). Berlin, Heidelberg: Springer-Verlag, pp 514\u2013521","DOI":"10.1007\/978-3-540-74272-2_64"},{"key":"1809_CR43","doi-asserted-by":"crossref","unstructured":"Ishigaki T, Higuchi T (2008) Dynamic spectrum classification by divergence-based kernel machines and its application to the detection of worn-out banknotes. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201908). Washington, DC, USA: IEEE Computer Society, pp 1873\u20131876","DOI":"10.1109\/ICASSP.2008.4517999"},{"key":"1809_CR44","doi-asserted-by":"crossref","unstructured":"Jahangir N, Chowdhury AR (2007) Bangladeshi banknote recognition by neural network with axis symmetrical masks. In: 10th international conference on Computer and information technology (ICCIT\u201907). IEEE, pp 1\u20135","DOI":"10.1109\/ICCITECHN.2007.4579423"},{"key":"1809_CR45","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/LSP.2008.921470","volume":"15","author":"Y Jin","year":"2008","unstructured":"Jin Y, Song L, Tang X, Du M (2008) A hierarchical approach for banknote image processing using homogeneity and FFD model. IEEE Signal Process Lett 15:425\u2013428","journal-title":"IEEE Signal Process Lett"},{"key":"1809_CR46","doi-asserted-by":"crossref","unstructured":"Jing L, Shuang L, Jin MS, Wei W (2010) About RMB number identification with genetic evolution neural network. In: International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE\u201910), vol. 1, Washington D.C. USA, pp 286\u2013288","DOI":"10.1109\/CMCE.2010.5610492"},{"key":"1809_CR47","doi-asserted-by":"crossref","unstructured":"Kee E, Farid H (2008) Printer profiling for forensics and ballistics. In: Proceedings of the 10th ACM Workshop on Multimedia and Security (Sec\u201908), New York, NY, USA, pp 3\u201310","DOI":"10.1145\/1411328.1411332"},{"key":"1809_CR48","volume-title":"The art of making money: the story of a master counterfeiter","author":"J Kersten","year":"2010","unstructured":"Kersten J (2010) The art of making money: the story of a master counterfeiter. Penguin Group, USA"},{"key":"1809_CR49","doi-asserted-by":"crossref","unstructured":"Kim T, Kim U, Jung G, Choi J (2009) Design of an UHF RFID tag antenna for paper money management system. In: Asia Pacific Microwave Conference (APMC\u2019 09), pp 1056\u20131059","DOI":"10.1109\/APMC.2009.5384368"},{"key":"1809_CR50","doi-asserted-by":"crossref","unstructured":"Kim HY, Mayer J (2007) Data hiding for binary documents robust to print-scan, photocopy and geometric distortions. In: XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI\u201907), pp 105\u2013112","DOI":"10.1109\/SIBGRAPI.2007.31"},{"issue":"3","key":"1809_CR51","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.dyepig.2010.01.014","volume":"86","author":"R Kul\u010dar","year":"2010","unstructured":"Kul\u010dar R, Fri\u0161kovec M, Hauptman N, Vesel A, Gunde MK (2010) Colorimetric properties of reversible thermochromic printing inks. Dyes Pigments 86(3):271\u2013277","journal-title":"Dyes Pigments"},{"key":"1809_CR52","doi-asserted-by":"crossref","unstructured":"Kumar D, Gonsalves T, Jhunjhunwala A, Raina G (2010) Mobile payment architectures for india. In: National Conference on Communications (NCC\u201910), pp 1\u20135","DOI":"10.1109\/NCC.2010.5430160"},{"key":"1809_CR53","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-03969-0_17","volume-title":"Engineering applications of neural networks, ser. communications in computer and information science","author":"P Kumpulainen","year":"2009","unstructured":"Kumpulainen P, Mett\u00e4nen M, Lauri M, Ihalainen H (2009) Relating halftone dot quality to paper surface topography. In: Palmer-Brown D, Draganova C, Pimenidis E, Mouratidis H (eds) Engineering applications of neural networks, ser. communications in computer and information science, vol 43. Springer, Berlin, pp 178\u2013189"},{"issue":"6","key":"1809_CR54","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1007\/s00521-010-0497-y","volume":"20","author":"P Kumpulainen","year":"2011","unstructured":"Kumpulainen P, Mett\u00e4nen M, Lauri M, Ihalainen H (2011) Relating halftone dot quality to paper surface topography. Neural Comput Appl 20(6):803\u2013813","journal-title":"Neural Comput Appl"},{"key":"1809_CR55","doi-asserted-by":"crossref","unstructured":"Lee KH, Park TH (2010) Image segmentation of UV pattern for automatic paper-money inspection. In: 11th International Conference on Control Automation Robotics Vision (ICARCV\u201910), pp 1175\u20131180","DOI":"10.1109\/ICARCV.2010.5707429"},{"key":"1809_CR56","doi-asserted-by":"crossref","unstructured":"Li L, Yu-tang Y, Yu X, Liang P (2010) Serial number extracting and recognizing applied in paper currency sorting system based on RBF Network. In: International Conference on Computational Intelligence and Software Engineering (CiSE\u201910), pp 1\u20134","DOI":"10.1109\/CISE.2010.5677049"},{"key":"1809_CR57","doi-asserted-by":"crossref","unstructured":"Li Z, Zhou X, Chen Y (2009) Research for the intelligent RMB sorter based on ANN. In: 9th International Conference on Electronic Measurement and Instruments (ICEMI\u201909), pp 1\u2013103","DOI":"10.1109\/ICEMI.2009.5274513"},{"key":"1809_CR58","unstructured":"Ling Y, Xiang Y, Wang X (2007) RSA-based secure electronic cash payment system. In: IEEE International Conference on Industrial Engineering and Engineering Management, pp 1898\u20131902"},{"key":"1809_CR59","doi-asserted-by":"crossref","unstructured":"Mirembe D, Kizito J, Tuheirwe D, Muyingi H (2008) A model for electronic money transfer for low resourced environments: M-cash. In: Third International Conference on Broadband Communications, Information Technology Biomedical Applications, pp 389\u2013393","DOI":"10.1109\/BROADCOM.2008.37"},{"key":"1809_CR60","doi-asserted-by":"crossref","unstructured":"Morshidi MA, Marhaban MH, Jantan A (2008) Color segmentation using multi layer neural network and the HSV colour space. In: International Conference on Computer and Communication Engineering. ICCCE 2008. Washington, DC, USA: IEEE Computer Society, pp 1335\u20131339","DOI":"10.1109\/ICCCE.2008.4580822"},{"key":"1809_CR61","doi-asserted-by":"crossref","unstructured":"Nah J, Kim J, Kim J (2009) A new image watermarking using peak position modulation for ID photos. In: 11th IEEE International Symposium on Multimedia (ISM \u201909), pp 595\u2013599","DOI":"10.1109\/ISM.2009.82"},{"issue":"19","key":"1809_CR62","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1016\/j.chroma.2010.12.070","volume":"1218","author":"C Neumann","year":"2011","unstructured":"Neumann C, Ramotowski R, Genessay T (2011) Forensic examination of ink by high-performance thin layer chromatography - the United States Secret Service Digital Ink Library. J Chromatogr A 1218(19):2793\u20132811","journal-title":"J Chromatogr A"},{"key":"1809_CR63","doi-asserted-by":"crossref","unstructured":"Nieves J, Ruiz-Agundez I, Bringas PG (2010) Recognizing banknote patterns for protecting economic transactions. In: IEEE Workshop on Database and Expert Systems Applications (DEXA\u201910), pp 247\u2013249","DOI":"10.1109\/DEXA.2010.86"},{"key":"1809_CR64","unstructured":"Nishimura K (2009) Banknote recognition based on continuous change in strictness of examination. In: ICCAS-SICE. IEEE, pp 5347\u20135350"},{"issue":"1","key":"1809_CR65","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala T, Pietik\u00e4inen M, Harwood D (1996) A comparative study of texture measures with classification based on feature distributions. Pattern Recogn 29(1):51\u201359","journal-title":"Pattern Recogn"},{"key":"1809_CR66","doi-asserted-by":"crossref","unstructured":"Omatu S, Yoshioka M, Kosaka Y (2009) Reliable banknote classification using neural networks. In: 3rd International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP\u201909), pp 35\u201340","DOI":"10.1109\/ADVCOMP.2009.37"},{"key":"1809_CR67","doi-asserted-by":"crossref","unstructured":"Peng H, Niu L (2009) Two-way exchange of virtual currency: future tendency and inherent risks. In: International Conference on Future Networks, pp 220\u2013224","DOI":"10.1109\/ICFN.2009.20"},{"issue":"8","key":"1809_CR68","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.polgeo.2011.09.007","volume":"30","author":"J Penrose","year":"2011","unstructured":"Penrose J (2011) Designing the nation. banknotes, banal nationalism and alternative conceptions of the state. Polit Geogr 30(8):429\u2013440","journal-title":"Polit Geogr"},{"key":"1809_CR69","doi-asserted-by":"crossref","unstructured":"Pollard SB, Simske SJ, Adams GB (2010) Model based print signature profile extraction for forensic analysis of individual text glyphs. In: Workshop on Information Forensics and Security (WIFS\u201910)","DOI":"10.1109\/WIFS.2010.5711442"},{"key":"1809_CR70","doi-asserted-by":"crossref","unstructured":"Pramoun T, Amornraksa T (2009) Improved image watermarking using pixel averaging and unbiased retrieval In: 9th International Symposium on Communications and Information Technology (ISCIT\u201909), Washington D. C. USA, pp 247\u2013249","DOI":"10.1109\/ISCIT.2009.5341100"},{"key":"1809_CR71","doi-asserted-by":"crossref","unstructured":"Preradovic S, Karmakar N (2009) Design of fully printable chipless RFID tag on flexible substrate for secure banknote applications. In: 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID\u201909), pp 206\u2013210","DOI":"10.1109\/ICASID.2009.5276935"},{"key":"1809_CR72","doi-asserted-by":"crossref","unstructured":"Qi W, Li X, Yang B (2009) Bilinear coons patch and its application in security pattern design. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP\u201909), pp 881\u2013884","DOI":"10.1109\/IIH-MSP.2009.58"},{"key":"1809_CR73","unstructured":"Qian S, Zuo X, He Y, Tian G, Zhang H (2011) Detection technology to identify money based on pulsed eddy current technique. In: 17th International Conference on Automation and Computing (ICAC\u201911), pp 230\u2013233"},{"key":"1809_CR74","doi-asserted-by":"crossref","unstructured":"Roy A, Halder B, Garain U (2010) Authentication of currency notes through printing technique verification. In: Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP\u201910), New York, NY, USA, pp 383\u2013390","DOI":"10.1145\/1924559.1924610"},{"issue":"2","key":"1809_CR75","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.dyepig.2008.07.020","volume":"81","author":"V Rusanov","year":"2009","unstructured":"Rusanov V, Chakarova K, Winkler H, Trautwein AX (2009) M\u00f6ssbauer and X-ray fluorescence measurements of authentic and counterfeited banknote pigments. Dyes Pigments 81(2):254\u2013258","journal-title":"Dyes Pigments"},{"key":"1809_CR76","volume-title":"The image processing handbook","author":"JC Russ","year":"2007","unstructured":"Russ JC (2007) The image processing handbook, 5th edn. CRC Press, Raleigh","edition":"5"},{"key":"1809_CR77","doi-asserted-by":"crossref","unstructured":"Ryu S-J, Lee H-Y, Cho I-W, Lee H-K (2008) Document forgery detection with SVM classifier and image quality measures. In: Huang Y-MR, Xu C, Cheng K-S, Yang J-FK, Swamy MN, Li S, Ding J-W (eds) Proceedings of the 9th Pacific Rim Conference on Multimedia (PCM\u201908), pp 486\u2013495","DOI":"10.1007\/978-3-540-89796-5_50"},{"key":"1809_CR78","doi-asserted-by":"crossref","unstructured":"Sajal RF, Kamruzzaman M, Jewel FA (2008) A machine vision based automatic system for real time recognition and sorting of Bangladeshi bank notes. In: 11th International Conference on Computer and Information Technology (ICCIT\u201908), pp 533\u2013535","DOI":"10.1109\/ICCITECHN.2008.4803060"},{"key":"1809_CR79","unstructured":"Schulze C, Schreyer M, Stahl A, Breuel TM (2008) Evaluation of gray level-features for printing technique classification in high-throughput document management systems. In: Proceedings of the 2nd international workshop on Computational Forensics(IWCF \u201908). Berlin, Heidelberg: Springer-Verlag, pp 35\u201346"},{"key":"1809_CR80","doi-asserted-by":"crossref","unstructured":"Shan G, Peng L, Jiafeng L, Xianglong T (2009) The design of HMM based banknote recognition system. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS\u201909), vol. 4, pp 106\u2013110","DOI":"10.1109\/ICICISYS.2009.5357719"},{"issue":"5","key":"1809_CR81","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.measurement.2008.10.012","volume":"42","author":"NG Shankar","year":"2009","unstructured":"Shankar NG, Ravi N, Zhong ZW (2009) A real-time print-defect detection system for web offset printing. Measurement 42(5):645\u2013652","journal-title":"Measurement"},{"key":"1809_CR82","doi-asserted-by":"crossref","unstructured":"Simske S, Adams G, Aronoff J, Sturgill M (2009) New findings in security printing and imaging. In: 25th International Conference on Digital Printing Technologies and Digital Fabrication 2009 (NIP25), vol. 25, pp 158\u2013160","DOI":"10.2352\/ISSN.2169-4451.2009.25.1.art00044_1"},{"key":"1809_CR83","doi-asserted-by":"crossref","unstructured":"Simske S, Aronoff S, Sturgill M, Collins F, Golodetz G, Israel R (2007) Security printing deterrents: a comparison of TIJ, DEP and LEP printing. In: International Conference on Digital Printing Technologies and Digital Fabrication, vol. 23, pp 543\u2013548","DOI":"10.2352\/ISSN.2169-4451.2007.23.1.art00009_2"},{"issue":"5","key":"1809_CR84","doi-asserted-by":"crossref","first-page":"050 201","DOI":"10.2352\/J.ImagingSci.Technol.(2008)52:5(050201)","volume":"52","author":"SJ Simske","year":"2008","unstructured":"Simske SJ, Aronoff JS, Sturgill MM, Golodetz G (2008) Security printing deterrents: a comparison of thermal ink jet, dry electrophotographic, and liquid electrophotographic printing. J Imaging Sci Technol 52(5):050 201\u2013050 207","journal-title":"J Imaging Sci Technol"},{"issue":"4","key":"1809_CR85","first-page":"34","volume":"16","author":"B Singh","year":"2011","unstructured":"Singh B, Badoni P, Verma K (2011) Computer vision based currency classification system. Int J Comput Appl 16(4):34\u201338","journal-title":"Int J Comput Appl"},{"key":"1809_CR86","doi-asserted-by":"crossref","unstructured":"Solymar Z, Stubendek A, Radvanyi M, Karacs K (2011) Banknote recognition for visually impaired. In: 20th European Conference on Circuit Theory and Design (ECCTD\u201911), pp 841\u2013844","DOI":"10.1109\/ECCTD.2011.6043828"},{"key":"1809_CR87","doi-asserted-by":"crossref","unstructured":"Sun B, Li J (2008) Recognition for the banknotes grade based on CPN. In: International Conference on Computer Science and Software Engineering, vol. 1, pp 90\u201393","DOI":"10.1109\/CSSE.2008.881"},{"key":"1809_CR88","doi-asserted-by":"crossref","unstructured":"Sun B, Li J (2008) The recognition of new and old banknotes based on SVM. In: Second International Symposium on Intelligent Information Technology Application (IITA\u201908), vol. 2, pp 95\u201398","DOI":"10.1109\/IITA.2008.157"},{"key":"1809_CR89","volume-title":"Moneymakers: the wicked lives and surprising adventures of three notorious counterfeiters","author":"B Tarnoff","year":"2011","unstructured":"Tarnoff B (2011) Moneymakers: the wicked lives and surprising adventures of three notorious counterfeiters. The Penguin Press HC, USA"},{"key":"1809_CR90","doi-asserted-by":"crossref","unstructured":"Tobbin P (2011) Understanding mobile money ecosystem: ROLES, structure and strategies. In: Tenth International Conference on Mobile Business (ICMB\u201911), pp 185\u2013194","DOI":"10.1109\/ICMB.2011.19"},{"issue":"1","key":"1809_CR91","doi-asserted-by":"crossref","first-page":"10 201","DOI":"10.2352\/J.ImagingSci.Technol.(2009)53:1(010201)","volume":"53","author":"A Tr\u00e9meau","year":"2009","unstructured":"Tr\u00e9meau A, Muselet D (2009) Recent trends in colour image watermarking. J Imaging Sci Technol 53(1):10 201\u201310 215","journal-title":"J Imaging Sci Technol"},{"key":"1809_CR92","unstructured":"van Beusekom J, Schreyer M, Breuel T (2010) Automatic counterfeit protection system code classification. In: Proceedings of SPIE Media Forensics and Security XII. SPIE, pp 1\u20138"},{"key":"1809_CR93","doi-asserted-by":"crossref","unstructured":"van Beusekom J, Shafait F (2011) Distortion measurement for automatic document verification. In: International Conference on Document Analysis and Recognition (ICDAR\u201911), pp 289\u2013293","DOI":"10.1109\/ICDAR.2011.66"},{"issue":"10","key":"1809_CR94","doi-asserted-by":"crossref","first-page":"13 441","DOI":"10.1016\/j.eswa.2011.04.035","volume":"38","author":"A Verikas","year":"2011","unstructured":"Verikas A, Lundstram J, Bacauskiene M, Gelzinis A (2011) Advances in computational intelligence-based print quality assessment and control in offset colour printing. Expert Syst Appl 38(10):13 441\u201313 447","journal-title":"Expert Syst Appl"},{"key":"1809_CR95","doi-asserted-by":"crossref","unstructured":"Vila A, Ferrer N, Garcia JF (2007) Chemical composition of contemporary black printing inks based on infrared spectroscopy: Basic information for the characterization and discrimination of artistic prints. In: Analytica Chimica Acta, vol. 591, no. 1. Elsevier, pp 97\u2013105","DOI":"10.1016\/j.aca.2007.03.060"},{"key":"1809_CR96","doi-asserted-by":"crossref","unstructured":"Wang L (2009) A new multi-bank e-cash protocol with anonymity control. In: Fifth International Conference on Information Assurance and Security (IAS\u201909), vol. 1, pp 536\u2013539","DOI":"10.1109\/IAS.2009.23"},{"key":"1809_CR97","unstructured":"Wang D-X, Teng J-K (2010) Research and analysis of electronic cash payment system. In: International Conference on Educational and Information Technology (ICEIT\u201910), vol. 3, pp V3\u2013335 \u2013V3\u2013339"},{"key":"1809_CR98","doi-asserted-by":"crossref","unstructured":"Wenhong L, Wenjuan T, Xiyan C, Zhen G (2010) Application of support vector machine (SVM) on serial number identification of RMB. In: 8th World Congress on Intelligent Control and Automation (WCICA). Washington, DC, USA: IEEE Computer Society, pp 6262\u20136266","DOI":"10.1109\/WCICA.2010.5554382"},{"key":"1809_CR99","unstructured":"Wu Y, Kong X, You X, Guo Y(2009) Printer forensics based on page document\u2019s geometric distortion. In: IEEE International Conference on Image Processing (ICIP\u201909), Washington D.C. USA, pp 2909\u20132912"},{"key":"1809_CR100","doi-asserted-by":"crossref","unstructured":"Wu Q, Zhang Y, Ma Z, Wang Z, Jin B (2009) A banknote orientation recognition method with BP network. In: Proceedings of the 2009 WRI Global Congress on Intelligent Systems (GCIS\u201909), Washington, DC, USA, pp 3\u20139","DOI":"10.1109\/GCIS.2009.225"},{"key":"1809_CR101","doi-asserted-by":"crossref","unstructured":"Xie J, Qin C, Liu T, He Y, Xu M (2009) A new method to identify the authenticity of banknotes based On the texture roughness. In: IEEE International Conference on Robotics and Biomimetics (ROBIO\u201909), pp 1268\u20131271","DOI":"10.1109\/ROBIO.2009.5420820"},{"key":"1809_CR102","doi-asserted-by":"crossref","unstructured":"Yang CN, Chen JR, Chiu CY, Wu GC, Wu CC (2009) Enhancing privacy and security in RFID-enabled banknotes. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, pp 439\u2013444","DOI":"10.1109\/ISPA.2009.77"},{"key":"1809_CR103","doi-asserted-by":"crossref","unstructured":"Yeh CY, Su WP, Lee SJ (2011) Employing multiple-kernel support vector machines for counterfeit banknote recognition. In: IEEE Applied Soft Computing, vol. 11, no. 1, pp 1439\u20131447","DOI":"10.1016\/j.asoc.2010.04.015"},{"key":"1809_CR104","doi-asserted-by":"crossref","unstructured":"Yoshida K, Kamruzzaman M, Jewel FA, Sajal RF (2007) Design and implementation of a machine vision based but low cost stand alone system for real time counterfeit Bangladeshi bank notes detection. In: 10th international conference on Computer and information technology (ICCIT\u201907), pp 1\u20135","DOI":"10.1109\/ICCITECHN.2007.4579427"},{"key":"1809_CR105","doi-asserted-by":"crossref","unstructured":"Zhang J, Ma L, Wang Y (2007) Fair e-cash system without trustees for multiple banks. In: International Conference on Computational Intelligence and Security Workshops (CISW\u201907), pp 585\u2013587","DOI":"10.1109\/CISW.2007.4425563"},{"key":"1809_CR106","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/s11801-008-8039-x","volume":"4","author":"L-L Zhao","year":"2008","unstructured":"Zhao L-L, Gu Z-C, Fang Z-L (2008) A morphology screen coding anticounterfeiting method based on visual characteristics. Optoelectron Lett 4:371\u2013374","journal-title":"Optoelectron Lett"},{"key":"1809_CR107","doi-asserted-by":"crossref","unstructured":"Zhou W, Xie G, Liu B (2008) The application of mixed GA-BP algorithm on remote sensing image classification. In: Liu L, Li X, Liu K, Zhang X (eds) Geoinformatics 2008 and Joint Conference on GIS and Built Environment: Classification of Remote Sensing Images, vol. 7147, no. 1. SPIE. doi: 10.1117\/12.813210","DOI":"10.1117\/12.813210"},{"key":"1809_CR108","doi-asserted-by":"crossref","unstructured":"Zhu Y, Rice J (2009) A lightweight architecture for secure two-party mobile payment. In: International Conference on Computational Science and Engineering (CSE\u201909), vol. 2, pp 326\u2013333","DOI":"10.1109\/CSE.2009.364"},{"issue":"2\u20133","key":"1809_CR109","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.infrared.2009.01.001","volume":"52","author":"V \u017diljak","year":"2009","unstructured":"\u017diljak V, Pap K, \u017diljak I (2009) CMYKIR security graphics separation in the infrared area. Infrared Phys Technol 52(2\u20133):62\u201369","journal-title":"Infrared Phys Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1809-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1809-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1809-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T15:25:01Z","timestamp":1689002701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1809-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,20]]},"references-count":109,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["1809"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1809-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,20]]}}}