{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:16:46Z","timestamp":1778347006049,"version":"3.51.4"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T00:00:00Z","timestamp":1682726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01812-2","type":"journal-article","created":{"date-parts":[[2023,4,29]],"date-time":"2023-04-29T12:02:04Z","timestamp":1682769724000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Machine Learning Algorithms for Identifying Fake Currencies"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6508-5103","authenticated-orcid":false,"given":"S.","family":"Chandrappa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Chandra Shekar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Chaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Dharmanna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. S.","family":"Guruprasad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"1812_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656478","author":"L Liu","year":"2017","unstructured":"Liu L, Lu Y. An image-based approach to detection of fake coins. IEEE Trans Inf Forens Secur. 2017. https:\/\/doi.org\/10.1109\/TIFS.2017.2656478.","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1812_CR2","doi-asserted-by":"crossref","unstructured":"Liu J, Tian Z, Liu P, Jiang J. An approach of semantic web service classification based on Naive Bayes. In: 2016 IEEE International Conference on Services Computing. 2016.","DOI":"10.1109\/SCC.2016.53"},{"key":"1812_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2563436","author":"B Tang","year":"2016","unstructured":"Tang B, Kay S, He H. Toward optimal feature selection in naive bayes for text categorization. IEEE Trans Knowl Data Eng. 2016. https:\/\/doi.org\/10.1109\/TKDE.2016.2563436.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1812_CR4","unstructured":"Pandit A, Naoghare M. Efficiently harvesting deep web interface with reranking and clustering. Int J Adv Res Comput Commun Eng. 2016;5(1):263\u2013265."},{"key":"1812_CR5","unstructured":"Kumar A, Kumar R, Nigle S, Shahakar M. Review on extracting the web data through deep web interfaces, mechanism. Int J Innov Res Comput Commun Eng. 2016;4(1):234\u2013237."},{"issue":"6","key":"1812_CR6","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/TSMCC.2011.2178120","volume":"42","author":"FM Hasanuzzaman","year":"2012","unstructured":"Hasanuzzaman FM, Yang X, Tian YL. Robust and effective component-based banknote recognition for the blind. IEEE Trans Syst Man Cybern C Appl Rev. 2012;42(6):1021\u201330.","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"},{"issue":"11","key":"1812_CR7","doi-asserted-by":"publisher","first-page":"225","DOI":"10.14257\/ijmue.2015.10.11.22","volume":"10","author":"MH Alshayeji","year":"2015","unstructured":"Alshayeji MH, Al-Rousan M, Hassoun DT. Detection method for counterfeit currency based on bit-plane slicing technique. Int J Multimed Ubiquitous Eng. 2015;10(11):225\u201342.","journal-title":"Int J Multimed Ubiquitous Eng"},{"issue":"4","key":"1812_CR8","first-page":"445","volume":"2","author":"NS Jose","year":"2015","unstructured":"Jose NS, Siby S, Mathew J, Das M. Android based currency recognition system for blind. Int J Eng Res Comput Sci Eng. 2015;2(4):445.","journal-title":"Int J Eng Res Comput Sci Eng"},{"key":"1812_CR9","doi-asserted-by":"publisher","unstructured":"Bhatia A, Kedia V, Shroff A, Kumar M, Shah BK and Aryan. Fake currency detection with machine learning algorithm and image processing. In: 2021 5th international conference on intelligent computing and control systems (ICICCS). 2021. p. 755\u201360. https:\/\/doi.org\/10.1109\/ICICCS51141.2021.9432274.","DOI":"10.1109\/ICICCS51141.2021.9432274"},{"key":"1812_CR10","unstructured":"Ruheena, Bibi Fathima, Harshitha B M, Navyashree K, Shantharam Nayak. Fake currency detection using deep learning technique. Int J Eng Res Technol. 2022;10(12):85\u201387."},{"key":"1812_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7106-0_17","volume-title":"Machine learning for predictive analysis. Lecture notes in networks and systems","author":"RK Yadav","year":"2021","unstructured":"Yadav RK, Valecha P, Paliwal S. Counterfeit currency detection using supervised machine learning algorithms. In: Joshi A, Khosravy M, Gupta N, editors. Machine learning for predictive analysis. Lecture notes in networks and systems, vol. 141. Singapore: Springer; 2021. https:\/\/doi.org\/10.1007\/978-981-15-7106-0_17."},{"issue":"1","key":"1812_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.5815\/ijigsp.2022.01.03","volume":"14","author":"S Chandrappa","year":"2022","unstructured":"Chandrappa S, Dharmanna L, Basavaraj A. A novel approach for early detection of neovascular glaucoma using fractal geometry. Int J Image Graph Signal Process. 2022;14(1):26\u201339. https:\/\/doi.org\/10.5815\/ijigsp.2022.01.03.","journal-title":"Int J Image Graph Signal Process"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01812-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01812-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01812-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T15:18:27Z","timestamp":1687015107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01812-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,29]]},"references-count":12,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["1812"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01812-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,29]]},"assertion":[{"value":"1 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Humans are not involved in this study. Informed consent is not involved in this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"368"}}