Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/321285
Title: | Designing Counterfeit Technique For The Enhancement of Data Authenticity |
Researcher: | Upadhyaya, Akanksha |
Guide(s): | Shokeen, Vinod and Srivastava, Garima |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology Technique |
University: | Amity University, Noida |
Completed Date: | 2019 |
Abstract: | Data Authentication is the process of confirming and validating the data with correct classification as genuine and forged entity. Due to rise in counterfeiting, Banknote authentication has become one of the significant areas of data authentication. Counterfeiting is an exact imitation of a valuable entity with an intention to cheat. Forgery in the form of counterfeiting has become a profound issue smacking massively on each sphere of the world. Counterfeiting in terms of forged currency constitutes a significant menace to national wealth, nation s socio-economy, financial Institutions and consumers, globally. Currency counterfeiting is a crime under the Criminal law, Section 489 A, B, C, D,E of IPC, and if counterfeit notes are disseminated for funding incendiary activities within state or extraterritorial then a case shall be registered under Unlawful Activities Prevention Act (UAPA) 2008 revision of UAPA 1967. Therefore, in order to identify and distinguish unlawful entity, an effective predictive-classification model is proposed, which can predict the classification of counterfeit and genuine banknotes. The research is primarily focused on to designing of classification model for differentiating counterfeited banknotes and genuine banknotes. Designing of banknote authentication model leads to other preliminary study so as to realize the exact scenario and need of the current study.Designing of banknote authentication model leads to other preliminary study so as to realize the exact scenario and need of the current study.The entire research has been conducted using IBM SPSS 21, RStudio and IBM AMOS 20. Therefore, the research provides a thorough analysis, causes and an effective predictive-classification model for banknote authentication. |
Pagination: | |
URI: | http://hdl.handle.net/10603/321285 |
Appears in Departments: | Amity Institute of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 40.67 kB | Adobe PDF | View/Open |
02_certificate.pdf | 138.11 kB | Adobe PDF | View/Open | |
03_preliminary page.pdf | 152.13 kB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 120.12 kB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 159.03 kB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 452.34 kB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 284.4 kB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 932.36 kB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 567.65 kB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 121.73 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 129.09 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: