CN107195070A - A kind of secret note authentication method and device - Google Patents

A kind of secret note authentication method and device Download PDF

Info

Publication number
CN107195070A
CN107195070A CN201710354004.3A CN201710354004A CN107195070A CN 107195070 A CN107195070 A CN 107195070A CN 201710354004 A CN201710354004 A CN 201710354004A CN 107195070 A CN107195070 A CN 107195070A
Authority
CN
China
Prior art keywords
row
secret note
maximum
threshold
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710354004.3A
Other languages
Chinese (zh)
Other versions
CN107195070B (en
Inventor
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Original Assignee
Shenzhen Yihua Computer Co Ltd
Shenzhen Yihua Time Technology Co Ltd
Shenzhen Yihua Financial Intelligent Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yihua Computer Co Ltd, Shenzhen Yihua Time Technology Co Ltd, Shenzhen Yihua Financial Intelligent Research Institute filed Critical Shenzhen Yihua Computer Co Ltd
Priority to CN201710354004.3A priority Critical patent/CN107195070B/en
Publication of CN107195070A publication Critical patent/CN107195070A/en
Application granted granted Critical
Publication of CN107195070B publication Critical patent/CN107195070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/128Viewing devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2016Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2041Matching statistical distributions, e.g. of particle sizes orientations

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a kind of secret note authentication method and device, this method includes:Determine secret note row and;Secret note is divided into by left half and right half based on border;Obtain the secondary series for being more than in left half and being more than the first threshold in the first row of first threshold and right half;Row to first row and the row with secondary series and summed and be worth;It is determined that and value and maximum column and difference be less than the set that each first row of the first preset value is formed;Choose the first row in a set successively, it is determined that in set with the row of selected first row and difference be less than the second preset value first row quantity;Maximum in quantification;Judge whether maximum is more than the 3rd preset value;If the determination result is YES, it is determined that secret note has fracture.Therefore a kind of secret note authentication method and device of the present invention, can identify whether the secret note that safety line is formed under infrared transmitting is broken, so as to improve the accuracy of the true and false of identification bank note.

Description

A kind of secret note authentication method and device
Technical field
The present invention relates to paper money recognition with examining field, in particular to a kind of secret note authentication method and device.
Background technology
The safety line for identifying the true and false is generally included in bank note, under infrared transmission figure, safety line shows secret note Feature, this is characterized in an important false distinguishing mark of numerous bank note.
The safety line of genuine notes does not allow easy fracture typically, so the bank note that some safety lines have been broken is possible for counterfeit money, Prior art can not be detected to the safety line of fracture, therefore, be unfavorable for the true and false of identification note.
The content of the invention
In view of this, the present invention is provided a kind of secret note authentication method and device, its object is to identify safety line red Whether the lower secret note formed of outside line transmission is broken, so as to lift the accuracy of paper money discrimination.
A kind of secret note authentication method, it comprises the following steps:
Determine secret note row and;
Based on the border for arranging and determining the secret note;
The secret note is divided into by left half and right half based on the border;
The first row for being more than first threshold in the left half is obtained, and is more than the first threshold in the right half Secondary series;
Row to the first row and the row with the secondary series and sum, obtain and be worth;
It is determined that and value and maximum column and difference be less than the set that each first row of the first preset value is formed;
Choose the first row in a set successively, determine in the set with the row of selected first row and Difference is less than the quantity of the first row of the second preset value;
Determine the maximum in the quantity;
Judge whether the maximum is more than the 3rd preset value;
If the determination result is YES, it is determined that the secret note has fracture;
If judged result is no, it is determined that the secret note is normal.
Further, in the present invention, it is described determine secret note row and be specially:
Determine the row included by the secret note;
Determine that each row include number a little;
By the number less than Second Threshold be set to row and.
Further, in the present invention, the left part is divided into row maximum in the range of the secret note and corresponding position extremely The scope of the left margin of the secret note;
The right part is divided into the model of row and right margin of the corresponding position to the secret note maximum in the secret note region Enclose.
Further, in the present invention, in addition to:
Arrange and back up to described.
Further, in the present invention, the first threshold is the secret note to be carried out set by after binaryzation.
A kind of secret note identification apparatus, it includes:
First determining module:For determine secret note row and;
Second determining module:For based on the border for arranging and determining the secret note;
Division module:For the secret note to be divided into left half and right half based on the border;
Acquisition module:It is more than the first row of first threshold in the left half for obtaining, and in the right half greatly In the secondary series of the first threshold;
Summation module:For the row to the first row and the row with the secondary series and sum, obtain and be worth;
3rd determining module:For determine and be worth with maximum column and difference be less than the first preset value each first row The set formed;
4th determining module:For choosing the first row in a set successively, determine in the set with it is selected The difference of the row sum of the first row taken is less than the quantity of the first row of the second preset value;
5th determining module:For determining the maximum in the quantity;
Judge module:For judging whether the maximum is more than the 3rd preset value;
Identify module:During for being when judged result, determine that the secret note has fracture, and, when judged result is When no, determine that the secret note is normal.
Further, in the present invention, the row of secret note " determine and " is specially:
Determine the row included by the secret note;
Determine that each row include number a little;
By the number less than Second Threshold be set to row and.
Further, in the present invention, the left part is divided into row maximum in the range of the secret note and corresponding position extremely The scope of the left margin of the secret note;
The right margin is the model of row and right margin of the corresponding position to the secret note maximum in the secret note region Enclose.
Further, in the present invention, in addition to:
Backup module:For arranging and backing up to described.
Further, in the present invention, the first threshold is the secret note to be carried out set by after binaryzation.
A kind of secret note authentication method and device of the present invention, wherein, a kind of secret note authentication method, it comprises the following steps: Determine secret note row and;Based on the border for arranging and determining the secret note;The secret note is divided into by left part based on the border Divide and right half;The first row for being more than first threshold in the left half is obtained, and is more than described first in the right half The secondary series of threshold value;Row to the first row and the row with the secondary series and sum, obtain and be worth;It is determined that and value with The difference of maximum column sum is less than the set that each first row of the first preset value is formed;Choose successively in a set First row, determine in the set with the row of selected first row and difference be less than the second preset value first row number Amount;Determine the maximum in the quantity;Judge whether the maximum is more than the 3rd preset value;If the determination result is YES, then Determine that the secret note has fracture;If judged result is no, it is determined that the secret note is normal.Therefore, a kind of secret note of the invention Authentication method and device, can identify whether the secret note that safety line is formed under infrared transmitting is broken, so as to improve identification paper The accuracy of the true and false of coin.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore is not construed as pair The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for secret note authentication method that a preferred embodiment of the present invention is provided;
Fig. 2 is a kind of schematic flow sheet for secret note authentication method that a preferred embodiment of the present invention is provided;
Fig. 3 is a kind of structural representation for secret note identification apparatus that a preferred embodiment of the present invention is provided;
Main Reference component description:
The determining modules of 1- first;The determining modules of 2- second;3- division modules;4- acquisition modules;5- summation modules;6- the 3rd Determining module;The determining modules of 7- the 4th;8- the 5th confirms module;9- judge modules;10- identifies module;11- backup modules.
Embodiment
Hereinafter, the various embodiments of the disclosure will be described more fully.The disclosure can have various embodiments, and It can adjust and change wherein.It should be understood, however, that:It is limited to spy disclosed herein in the absence of by the various embodiments of the disclosure Determine the intention of embodiment, but the disclosure should be interpreted as covering in the spirit and scope for the various embodiments for falling into the disclosure All adjustment, equivalent and/or alternative.
Hereinafter, the term " comprising " that can be used in the various embodiments of the disclosure or " may include " indicate disclosed Function, operation or the presence of element, and do not limit the increase of one or more functions, operation or element.In addition, such as existing Used in the various embodiments of the disclosure, term " comprising ", " having " and its cognate are meant only to represent special characteristic, number Word, step, operation, element, the combination of component or foregoing item, and be understood not to exclude first one or more other Feature, numeral, step, operation, element, the presence of the combination of component or foregoing item or increase one or more features, numeral, Step, operation, element, the possibility of the combination of component or foregoing item.
In the various embodiments of the disclosure, statement "or" or " in A or/and B at least one " include what is listed file names with Any combinations of word or all combinations." A or B " or " in A or/and B at least one " may include A, may include for example, statement B may include A and B both.
The statement (" first ", " second " etc.) used in the various embodiments of the disclosure can be modified to be implemented various Various element in example, but corresponding element can not be limited.For example, presented above be not intended to limit the suitable of the element Sequence and/or importance.The purpose presented above for being only used for differentiating an element and other elements.For example, the first user fills Put and indicate different user device with second user device, although the two is all user's set.For example, not departing from each of the disclosure In the case of the scope for planting embodiment, the first element is referred to alternatively as the second element, similarly, and the second element is also referred to as first Element.
It should be noted that:, can be by the first composition member if an element ' attach ' to another element by description Part is directly connected to the second element, and " connection " the 3rd can be constituted between the first element and the second element Element.On the contrary, when an element " being directly connected to " is arrived into another element, it will be appreciated that be in the first element And second the 3rd element is not present between element.
The term used in the various embodiments of the disclosure is only used for describing the purpose of specific embodiment and not anticipated In the various embodiments of the limitation disclosure.As used herein, singulative is intended to also include plural form, unless context is clear Chu it is indicated otherwise.Unless otherwise defined, all terms (including the technical term and scientific terminology) tool being otherwise used herein There is the implication identical implication that the various embodiment one skilled in the art with the disclosure are generally understood that.The term (term such as limited in the dictionary typically used) is to be interpreted as having and the situational meaning in correlative technology field Identical implication and it will be not construed as with Utopian implication or excessively formal implication, unless in the various of the disclosure By clear it will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene in embodiment, the mould in accompanying drawing Block or flow are not necessarily implemented necessary to the present invention.
Embodiment 1
In one embodiment, refer to:Fig. 1, Fig. 2.
A kind of secret note authentication method, it comprises the following steps:
Step S1, the row for determining secret note and;
Obtain maximum column and and its corresponding position in the secret note;
Step S2, based on the row and determine the border of the secret note;
Method that is above-mentioned, determining the border of secret note, specifically can be as follows:It is determined that maximum row and the position at place;It is past to be somebody's turn to do Maximum row and the left side and the right carry out position movement of the position at place, if the stain number of the row is less than certain predetermined value or company The stain number of continuous one section of row is respectively less than certain preset value, it is determined that the row or the region are borders.
Step S3, based on the border and the maximum column and in secret note, the secret note is divided into left part by corresponding position Divide and right half;
It is above-mentioned, specifically it is left half to refer to maximum column and corresponding position to the left-hand component of secret note;Maximum column and right The part on the position answered to the right of secret note is divided into right half.
It is more than the first row of first threshold in step S4, the acquisition left half, and is more than in the right half described The secondary series of first threshold;
Step S5, the row to the first row and the row with the secondary series and sum, obtain and be worth;
Step S6, determine and value and the maximum column and difference formed less than each first row of the first preset value Set;
It is above-mentioned, it is necessary to explanation, when the row of first row and the row with secondary series and and be worth and maximum column When the difference of sum is less than the first preset value, then obtain the first row, and by the row of the secondary series and be changed to 0, with avoid this The former of two row arranges and computed repeatedly.
Can be as an example:If row of a first row of left half and for X, row of a secondary series of right half and be Y, When meeting following condition:
Condition one, X and Y are all higher than first threshold, such as 40;
Condition two, X and Y's and value with maximum column and numerical value approach, such as no more than the first preset value 20.
Now, obtain the first row to be put into set, and by the row of the secondary series and be changed to 0.
Continue to obtain another first row, when the first row and a secondary series meet above-mentioned two condition again, general again The first row is put into set, and by the row of the secondary series and is changed to 0.It is understood that when the first row with this Two row change another secondary series when being unsatisfactory for above-mentioned two condition, when the first row and all secondary series be all unsatisfactory for it is above-mentioned During two conditions, the first row is abandoned.Until all first rows complete the computing of above-mentioned condition, and by it is all get the One row are put into a set.
Step S7, the first row chosen successively in a set, determine first row in the set and selected Row sum difference be less than the second preset value first row quantity;
It is above-mentioned, it is necessary to explanation, a first row being selected in the set, quilt in the set with doing difference with it Another first row chosen can be same first row.
Second preset value can be 20, in another embodiment, or 10 or 15.
Specifically, it can be exemplified as:First first row being selected in the set and be selected in the set second Individual first row makees difference, when the difference is less than 20, then count number one.Unceasingly, first first row successively with except second Other first rows (including itself) outside individual first row make poor, when the difference is less than 20 each time, then accelerate once.When First first row is made with other all first rows after the completion of difference, choose another first row in addition to first first row with Other first rows (including itself) in addition to first first row make poor, when the difference is less than 20 each time, then increase number Amount is once.Finally, after (including itself) finishs difference to each first row each other, final quantity is designated as the quantity Maximum.
Step S8, the maximum determined in the quantity;
Step S9, judge the maximum whether be more than the 3rd preset value;
Above-mentioned, in the present embodiment, the 3rd preset value can be 1, can also be 2,3 etc..
Step S10, if the determination result is YES, it is determined that the secret note has fracture;
If step S11, judged result are no, it is determined that the secret note is normal.
Therefore, a kind of secret note authentication method of the present embodiment, can more accurately judge the fracture of secret note, can also be by The inclined situation of secret note excludes the situation of secret note fracture, improves the accuracy of paper money discrimination.
In the present embodiment, the row of secret note " determine and " is specially:
Determine the row included by the secret note;
Determine that each row include number a little;
Above-mentioned, secret note refers to the black lines that safety line is formed under infrared transmitting;The point, constitutes the black lines Stain.
By the number less than Second Threshold be set to row and.
It is above-mentioned, refer to by the number less than the stain of Second Threshold be set to the row row and.
In the present embodiment, the left part is divided into row maximum in the range of the secret note and corresponding position to the secret note Left margin scope;
The right part is divided into the model of row and right margin of the corresponding position to the secret note maximum in the secret note region Enclose.
In the present embodiment, in addition to:
Step S101, to it is described row and back up.(referring to Fig. 2)
It is above-mentioned, refer to the row of each row in secret note and back up.
In the present embodiment, the first threshold is the secret note to be carried out set by after binaryzation.
Embodiment 2
In another embodiment, refer to:Fig. 3.
A kind of secret note identification apparatus, it includes:
First determining module 1:For determine secret note row and;
Second determining module 2:For based on the border for arranging and determining the secret note;
Division module 3:For the secret note to be divided into left half and right half based on the border;
Acquisition module 4:It is more than the first row of first threshold in the left half for obtaining, and in the right half greatly In the secondary series of the first threshold;
Summation module 5:For the row to the first row and the row with the secondary series and sum, obtain and be worth;
3rd determining module 6:For determine and be worth with maximum column and difference be less than the first preset value each described first The formed set of row;
4th determining module 7:For choosing the first row in a set successively, determine in the set with it is selected The difference of the row sum of the first row taken is less than the quantity of the first row of the second preset value;
5th determining module 8:For determining the maximum in the quantity;
Judge module 9:For judging whether the maximum is more than the 3rd preset value;
Identify module 10:During for being when judged result, determine that the secret note has fracture, and, work as judged result For it is no when, determine that the secret note is normal.
Further, in the present invention, the row of secret note " determine and " is specially:
Determine the row included by the secret note;
Determine that each row include number a little;
By the number less than Second Threshold be set to row and.
Further, in the present invention, the left part is divided into row maximum in the range of the secret note and corresponding position extremely The scope of the left margin of the secret note;
The right margin is the model of row and right margin of the corresponding position to the secret note maximum in the secret note region Enclose.
Further, in the present invention, in addition to:
Backup module 11:For arranging and backing up to described.
Further, in the present invention, the first threshold is the secret note to be carried out set by after binaryzation.
It will be appreciated by those skilled in the art that the module in device in implement scene can be described according to implement scene into Row is distributed in the device of implement scene, can also carry out one or more dresses that respective change is disposed other than this implement scene In putting.The module of above-mentioned implement scene can be merged into a module, can also be further split into multiple submodule.
The invention described above sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the present invention, and still, the present invention is not limited to this, Ren Heben What the technical staff in field can think change should all fall into protection scope of the present invention.

Claims (10)

1. a kind of secret note authentication method, it is characterised in that comprise the following steps:
Determine secret note row and;
Based on the border for arranging and determining the secret note;
The secret note is divided into by left half and right half based on the border;
The first row for being more than first threshold in the left half is obtained, and more than the of the first threshold in the right half Two row;
Row to the first row and the row with the secondary series and sum, obtain and be worth;
It is determined that and value and maximum column and difference be less than the set that each first row of the first preset value is formed;
Choose the first row in a set successively, determine in the set with the row of selected first row and difference Less than the quantity of the first row of the second preset value;
Determine the maximum in the quantity;
Judge whether the maximum is more than the 3rd preset value;
If the determination result is YES, it is determined that the secret note has fracture;
If judged result is no, it is determined that the secret note is normal.
2. a kind of secret note authentication method according to claim 1, it is characterised in that the row of the determination secret note and be specially:
Determine the row included by the secret note;
Determine that each row include number a little;
By the number less than Second Threshold be set to row and.
3. the method for a kind of secret note identification according to claim 1, it is characterised in that the left part is divided into the secret note model Enclose the scope of interior maximum row and left margin of the corresponding position to the secret note;
The right part is divided into the scope of row and right margin of the corresponding position to the secret note maximum in the secret note region.
4. the method for a kind of secret note identification according to claim 1, it is characterised in that also include:
Arrange and back up to described.
5. the method for a kind of secret note identification according to claim 1, it is characterised in that the first threshold is to described black Bar is carried out set by after binaryzation.
6. a kind of secret note identification apparatus, it is characterised in that including:
First determining module:For determine secret note row and;
Second determining module:For based on the border for arranging and determining the secret note;
Division module:For the secret note to be divided into left half and right half based on the border;
Acquisition module:It is more than the first row of first threshold in the left half for obtaining, and is more than institute in the right half State the secondary series of first threshold;
Summation module:For the row to the first row and the row with the secondary series and sum, obtain and be worth;
3rd determining module:For determine and be worth with maximum column and difference be less than the first preset value each first row institute shape Into set;
4th determining module:For choosing the first row in a set successively, determine in the set with it is selected The difference of the row sum of first row is less than the quantity of the first row of the second preset value;
5th determining module:For determining the maximum in the quantity;
Judge module:For judging whether the maximum is more than the 3rd preset value;
Identify module:During for being when judged result, determine that the secret note has fracture, and, when judged result is no, Determine that the secret note is normal.
7. a kind of secret note identification apparatus according to claim 6, it is characterised in that row of the determination secret note and specific For:
Determine the row included by the secret note;
Determine that each row include number a little;
By the number less than Second Threshold be set to row and.
8. the device of a kind of secret note identification according to claim 6, it is characterised in that the left part is divided into the secret note model Enclose the scope of interior maximum row and left margin of the corresponding position to the secret note;
The right margin is the scope of row and right margin of the corresponding position to the secret note maximum in the secret note region.
9. the device of a kind of secret note identification according to claim 6, it is characterised in that also include:
Backup module:For arranging and backing up to described.
10. the device of a kind of secret note identification according to claim 6, it is characterised in that the first threshold is to described Secret note is carried out set by after binaryzation.
CN201710354004.3A 2017-05-18 2017-05-18 A kind of secret note identification method and device Active CN107195070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710354004.3A CN107195070B (en) 2017-05-18 2017-05-18 A kind of secret note identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710354004.3A CN107195070B (en) 2017-05-18 2017-05-18 A kind of secret note identification method and device

Publications (2)

Publication Number Publication Date
CN107195070A true CN107195070A (en) 2017-09-22
CN107195070B CN107195070B (en) 2019-09-20

Family

ID=59874639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710354004.3A Active CN107195070B (en) 2017-05-18 2017-05-18 A kind of secret note identification method and device

Country Status (1)

Country Link
CN (1) CN107195070B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0485051A2 (en) * 1990-10-17 1992-05-13 International Computers Limited Detecting skew in digitised images
CN104851184A (en) * 2015-05-27 2015-08-19 深圳怡化电脑股份有限公司 Recognition method of transversely spliced banknote and device thereof
CN105184955A (en) * 2015-08-18 2015-12-23 深圳怡化电脑股份有限公司 Method and device for identifying paper money
CN106127930A (en) * 2016-06-17 2016-11-16 深圳怡化电脑股份有限公司 A kind of method and system detecting banknote security line integrity
CN106408747A (en) * 2016-09-06 2017-02-15 深圳怡化电脑股份有限公司 Image recognition method and apparatus
CN106558143A (en) * 2015-09-18 2017-04-05 深圳怡化电脑股份有限公司 A kind of recognition methodss of 100 yuans of splicings bank note and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0485051A2 (en) * 1990-10-17 1992-05-13 International Computers Limited Detecting skew in digitised images
CN104851184A (en) * 2015-05-27 2015-08-19 深圳怡化电脑股份有限公司 Recognition method of transversely spliced banknote and device thereof
CN105184955A (en) * 2015-08-18 2015-12-23 深圳怡化电脑股份有限公司 Method and device for identifying paper money
CN106558143A (en) * 2015-09-18 2017-04-05 深圳怡化电脑股份有限公司 A kind of recognition methodss of 100 yuans of splicings bank note and device
CN106127930A (en) * 2016-06-17 2016-11-16 深圳怡化电脑股份有限公司 A kind of method and system detecting banknote security line integrity
CN106408747A (en) * 2016-09-06 2017-02-15 深圳怡化电脑股份有限公司 Image recognition method and apparatus

Also Published As

Publication number Publication date
CN107195070B (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN104851184B (en) A kind of recognition methods of horizontally-spliced bank note and device
EP3104343B1 (en) Bill processing device
CN101606183B (en) Paper money processor
WO2009044826A1 (en) Article judgment system and article judgment method
CN106558143B (en) It is a kind of 100 yuans splicing bank note recognition methods and device
DE3606235A1 (en) BANKNOTE SORTING AND COUNTING DEVICE
CN106934915A (en) Bank note treatment device
CN104063937A (en) Sheet Processing Method, Sheet Processing Apparatus, And Sheet Processing System
CN105184952B (en) A kind of bank note treatment device
CN106845469B (en) Paper money identification method and device
CN106710062A (en) Banknote security line detecting method and device
CN107067533A (en) The method and device that a kind of bank note differentiates
CN108230536A (en) One kind is to light variable security index identification method and device
CN107195070A (en) A kind of secret note authentication method and device
CN108062820A (en) A kind of paper currency detecting method, note detection device and electronic equipment
CN107170109A (en) A kind of bank note watermark false distinguishing method and apparatus
CN105096446A (en) Method and system for identifying and authenticating optically variable ink on banknotes with folding corners
CN103366166A (en) Paper number reading device, method and system, and paper processing device and method
CN105989663B (en) Self-service device, automated trading system and its method of counting
CN104428820A (en) Banknote processing apparatus
CN106558139A (en) Special certificate recognition methodss, special certificate identifying device and self-service equipment
CN108665604B (en) Method and device for detecting new and old grades of paper money
CN206711194U (en) Note bucket is connect with anti-theft feature
CN108389309A (en) A kind of method and system of identification forge or true or paper money
CN109272677A (en) Wholesale cash note output method, apparatus, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant