|
:: | rus | :: | eng |
Analysis and design of computer information processing methods applied to bank-note sorting machines and validatorsDissertation abstractPrefaceThe currency authenticity verification is one of the most labor-intensive banking operations. It's implemented not only by experts in this field but also by regular cassiers. Therefore a well technically equiped working place is one of the chief requirements for the successful realization of counterfeit detection functions.The number of detected counterfeit bank notes and what is more important their quality continues to rise despite the constant anti-counterfeit measures undertaken by all the countries around the world. According to Currency News - the International Currency Association herald [1], the number of detected euro counterfeits has grown from 167118 in 2002 to 594223 in 2004. Together with the number of counterfeits grows the need to improve the equipment as well as the methods of currency authenticity verification. The main tendencies in the development of currency validation equipment include joining up several (magnetic, infra-red, etc.) sensors at the same validation device, elaboration of unit validation device architecture and it's connection to computer. As a consequence of such tendencies there is a need of special software to enable the processing of sensors' information and optimal algorithms that will not only speed up the information analysis, but also allow for new bank note series issuing. 1. Research field overview1.1 Bank note protection methodsThe authenticity verification methods are closely associated with current counterfeit protection technologies, used in bank note, securities, identification and plastic cards manufacturing. As regards currency protection today's protection techniques include [2],[3]:Technology - contains the techniques based on the calculation of certain
object properties , such as
Graphic level - a set of methods based on use of special forms, size characteristics, means of location and combination of graphic image elements:
Physical level - a set of methods based on physical properties of objects and substances:
1.2 Protection degreesThe combination of diverse bank note protection methods insures the reliability of protection and makes for the following classification of currency protection degrees[1]:
1.3 Technical means of authentificationThe great number of protection techniques and a set of requirements as for the depth of authentification make for a wide range of currency counting and validation equipment that can be classified by 3 groups [1]:
1.4 Leading researchers and manufacturersToday the leding manufacturers of the bank note counting, sorting and validation devices include such producers as DeLaRuе (England)[4], SPEED (Japan)[5], PRO (Japan)[6], SCAN COIN (Swiss)[7] . The devices of the first and third group of technical means classification are also produced by such home producers as «Vildis» (Moscow), «Regula» (Minsk), «Systema» (Moscow),«Spectr»(Nikolaev)[8]. 2. Existing methods analysisThe analysis of the great range of counting, sorting and validation devices makes it possible to classify basic authentification methods:
3. Research highlights3.1 Problem actualityThe conducted analysis has shown a poor offer of money counting devices with automatic magnetic code protection control. Although this kind of protection is one of the most trustworthy (there wasn't a single case of magnetic code falsification within 20 years of it's use in English pound currency), it's verification is conducted mostly by the devices of expert class only.Besides, in 2004 the magnetic code currency protection has found it's use in Ukrainian hryvnas. Therefore the problem of development and introduction of automated devices implementing magnetic code verification, that can be used at the cassier level can be refered to as the problem of today. 3.2 Practical value of researchThe development of information processing methods aimed at magnetic code verification will make it possible:- to rise the equipment level of cassier working place; - to improve the trustworthiness of currency authenticity check results as bank note falcification with exact immitation of magnetic code protection requires a high level of technology and is unlikely. 3.3 Research steps3.3.1. Code standards identificationOpen sources do not contain any information about magnetic protection code sequences. That makes it necessary to identify standard code sequences using magnetic fields visualisation means [9],[10]. It is proposed to take 5,10,20,100,200,500 euro bank notes as reasearch samples. Figure 3.1 represents the results of standard identification step.
Fig.3.1 - Standard euro codes Magnetized parts are indicated with use of bold black lines. The length of magnetic code spaces is in mm . 3.3.2. Magnetic code reading and computer information inputMagnetic code is read by means of successive registration of remanent magnetism of protective magnetic thread parts in the parts which represent implanted ferromagnetic material particles. To register magnetized parts of the thread magnetoresistive heads [11],[12],[13] are used in combination with amplifier and analog digital converter . Figure 3.2 represents the instance of signal of 20 hrvn magnetic code.Fig. 3.2 - Digital magnetic code sequence of 20 hrvn. bank note 3.3.3 Data processingThe last, but not the least step of this reasearch consists in magnetic code sygnal processing. Here the problem turns into discrete nonstationary sygnal processing. Data analysis includes the following steps described further. 3.3.3.1 Spectral analysisTo distinguish the information part of magnetic code signal from it's noise part it is proposed to use sygnal spectral anlysis. The information about noise frequency band will be useful at the next filtration step of magnetic code sygnal processing. The following methods allow to conduct the preliminary spectral analysis of a sygnal:
3.3.3.2 FilteringTo clear magnetic code sygnal from noise there is a need of optimal filter calculation. Filter characteristics mostly depend on the results of sygnal spectral analysis. It is proposed to use the following methods to solve a problem of sygnal filtering:
3.3.3.3 Feature detectionThe features of magnetic code sygnals we are interested in, that represent the beginning and the end of magnetized parts of protective thread, include positive and negative piques. The exact localization of particularities mentioned above has a great value for subsequent data analysis. It is proposed to use the following methods to solve the problem of feature detection in magnetic code sygnals:
3.3.3.4 ClassificationThe fact that the magnetic code in question coinsides with one of the standards defined earlier serves an authenticity proof of the bank note in question. In case where the percentage of coinsidence is low (e.g. lower than 80%), a hypothesis of bank note authenticity should be denied, the bank note is either a counterfeit or defected. Therefore at the final stage of researchthe problem of magnetic code classification is to be solved.
4. Assumed scientific noveltyThe analysis conducted on the state of equipment for bank note counting and validation shows that presently there is a low number of cassier level devices designed to read and process bank note protective magnetic codes.The objective of present master's project is the development of an effective mechanism of magnetic code reading results represented by digital sygnals. The creation of effective information processing algorithm in course of bank note validation by means of magnetic code verification is viewed as a result of present research. It must reveal new domains of Fourier and wavelet transforms as well as of digital filter design and computation. 5. ConclusionSo far as a result of information sources analysis we have a definition of currency protection techniques, their classification and the evaluation of a protection degree assured by each of these techniques. There are also the results of analysis conducted on the developments made by leading manufacturers in the field of currency counting and validation equipment. On the basis of this information it is proposed to make a protection by means of partially magntized thread an object of master's project research.The analysis mentioned above has shown a poor offer of money counting devices with automatic magnetic code protection control. Therefore the creation of such devices as well as the development of infomrtion processing methods targeted to serve them represent a new and actual problem. To achieve the goal of the project it is planned to:
List of information sources
Note:presented autoreferat is not a final version of master's thesis autoreferat as the current research is in course and is planned to be completed by 31.12.2006. For the final version of master's thesis please e-mail the author.
|
|
:: | rus | :: | eng | to the top | e-mail: nina_belik@yahoo.com |