Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/321285
Title: Designing Counterfeit Technique For The Enhancement of Data Authenticity
Researcher: Upadhyaya, Akanksha
Guide(s): Shokeen, Vinod and Srivastava, Garima
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
Technique
University: Amity University, Noida
Completed Date: 2019
Abstract: Data Authentication is the process of confirming and validating the data with correct classification as genuine and forged entity. Due to rise in counterfeiting, Banknote authentication has become one of the significant areas of data authentication. Counterfeiting is an exact imitation of a valuable entity with an intention to cheat. Forgery in the form of counterfeiting has become a profound issue smacking massively on each sphere of the world. Counterfeiting in terms of forged currency constitutes a significant menace to national wealth, nation s socio-economy, financial Institutions and consumers, globally. Currency counterfeiting is a crime under the Criminal law, Section 489 A, B, C, D,E of IPC, and if counterfeit notes are disseminated for funding incendiary activities within state or extraterritorial then a case shall be registered under Unlawful Activities Prevention Act (UAPA) 2008 revision of UAPA 1967. Therefore, in order to identify and distinguish unlawful entity, an effective predictive-classification model is proposed, which can predict the classification of counterfeit and genuine banknotes. The research is primarily focused on to designing of classification model for differentiating counterfeited banknotes and genuine banknotes. Designing of banknote authentication model leads to other preliminary study so as to realize the exact scenario and need of the current study.Designing of banknote authentication model leads to other preliminary study so as to realize the exact scenario and need of the current study.The entire research has been conducted using IBM SPSS 21, RStudio and IBM AMOS 20. Therefore, the research provides a thorough analysis, causes and an effective predictive-classification model for banknote authentication.
Pagination: 
URI: http://hdl.handle.net/10603/321285
Appears in Departments:Amity Institute of Information Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File40.67 kBAdobe PDFView/Open
02_certificate.pdf138.11 kBAdobe PDFView/Open
03_preliminary page.pdf152.13 kBAdobe PDFView/Open
04_chapter 1.pdf120.12 kBAdobe PDFView/Open
05_chapter 2.pdf159.03 kBAdobe PDFView/Open
06_chapter 3.pdf452.34 kBAdobe PDFView/Open
07_chapter 4.pdf284.4 kBAdobe PDFView/Open
08_chapter 5.pdf932.36 kBAdobe PDFView/Open
09_chapter 6.pdf567.65 kBAdobe PDFView/Open
10_chapter 7.pdf121.73 kBAdobe PDFView/Open
80_recommendation.pdf129.09 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: