Skip to main content
Log in

Currency security and forensics: a survey

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

By its definition, the word ‘currency’ refers to an agreed medium for exchange, a nation’s currency is the formal medium enforced by the elected governing entity. Throughout history, issuers have faced one common threat: counterfeiting. Despite technological advancements, overcoming counterfeit production remains a distant future. Scientific determination of authenticity requires a deep understanding of the raw materials and manufacturing processes involved. This survey serves as a synthesis of the current literature to understand the technology and the mechanics involved in currency manufacture and security, whilst identifying gaps in the current literature. Ultimately, a robust currency is desired.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Adams G, Pollard S, Simske S (2011) A study of the interaction of paper substrates on printed forensic imaging. In: Proceedings of the 11th ACM symposium on Document engineering (DocEng ’11), New York, USA, pp 263–266

  2. Ahmed DH, Sung HJ, Kim DS (2011) Simulation of non-Newtonian ink transfer between two separating plates for gravure-offset printing. In: International Journal of Heat and Fluid Flow, vol. 32, no. 1, pp 298–307

  3. Arabo A (2008) Secure cash withdrawal through mobile phone/device. In: International Conference on Computer and Communication Engineering (ICCCE 2008), vol. 1, pp 818–822

  4. Beekhof FP, Voloshynovskiy S, Koval O, Villan R, Topak E (2008) Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. In: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop (e-Forensics’08), pp 1–5

  5. Bender KW (2006) Moneymakers: the secret world of banknote printing. Wiley-VCH, Weinheim

    Google Scholar 

  6. Berthier S, Boulenguez J, Bálint Z (2007) Multiscaled polarization effects in Suneve coronata (Lepidoptera) and other insects: application to anti-counterfeiting of banknotes. Appl Phys A Mater Sci Process 86(1):123–130

    Article  Google Scholar 

  7. Bruna A, Guarnera GC, Battiato S (2013) Forgery detection and value identification of Euro banknotes. Sensors 2:2515–2529

    Article  Google Scholar 

  8. Bulan O, Mao J, Sharma G (2009) Geometric distortion signatures for printer identification. In: Proceedings of the 2009 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP’09), Washington D. C. USA, pp 1401–1404

  9. Burger A (2009) The devil’s workshop: a memoir of the Nazi counterfeiting operation. Frontline Books, Barnsley

    Google Scholar 

  10. Camenisch J, Lysyanskaya A, Meyerovich M (2007) Endorsed e-Cash. In: IEEE Symposium on Security and Privacy (SP’07), pp 101–115

  11. Cao B, Liu J (2010) Currency recognition modelling research based on BP neural network improved by gene algorithm. In: Proceedings of the Second International Conference on Computer Modelling and Simulation (ICCMS’10), Washington, DC, USA, pp 246–250

  12. Chae S-H, Kim JK, Pan SB (2009) A study on the Korean banknote recognition using RGB and UV information. In: Slezak D, Kim T-H, Chang AC-C, Vasilakos T, Li M, Sakurai K (eds) Communication and networking, ser. communications in computer and information science, vol 56. Springer, Berlin, pp 477–484

    Google Scholar 

  13. Chang CC, Yu TX, Yen HY (2007) Paper currency verification with support vector machines. In: Third International IEEE Conference on Signal-Image Technologies and Internet-Based System (SITIS’07), Washington, DC, USA, pp 860–865

  14. Chia TH, Levene MJ (2009) Detection of counterfeit U.S. paper money using intrinsic fluorescence lifetime. Opt Express 17(24):22 054–22 061

    Article  Google Scholar 

  15. Chiang P-J, Khanna N, Mikkilineni A, Segovia MVO, Suh S, Allebach J, Chiu G, Delp E (2009) Printer and scanner forensics. Signal Proc Mag 26(2):72–83

    Article  Google Scholar 

  16. Clarkson W, Weyrich T, Finkelstein A, Heninger N, Halderman JA, Felten EW (2009) Fingerprinting blank paper using commodity scanners. In: 30th IEEE Symposium on Security and Privacy, pp 301–314

  17. Daraee F, Mozaffari S (2010) Eroded money notes recognition using wavelet transform. In: 6th Iranian Machine Vision and Image Processing (MVIP’10), pp 1–5

  18. Das V (2009) Protocol for anonymous e-cash for secure electronic commerce - initiation. In: Second International Conference on Future Information Technology and Management Engineering (FITME’09), pp 119–123

  19. Dasari H, Bhagvati C (2007) Identification of non-black inks using HSV colour space. In: Ninth International Conference on Document Analysis and Recognition (ICDAR’07), vol. 1. IEEE, pp 486–490

  20. Dass R, Muttukrishnan R (2011) Security framework for addressing the issues of trust on mobile financial services. In: 7th International Conference on Next Generation Web Services Practices (NWeSP), pp 99–104

  21. Dayakshini, Sathisha K (2011) Bank automation system for Indian currency- a novel approach. In: Recent Advances in Intelligent Computational Systems (RAICS’11), pp 299–302

  22. Debnath KK, Ahdikary JK, Shahjahan M (2009) A currency recognition system using negatively correlated neural network ensemble. In: 12th International Conference on Computers and Information Technology (ICCIT ’09), pp 367–372

  23. Debnath KK, Ahmed SU, Shahjahan M (2010) A paper currency recognition system using negatively correlated neural network ensemble. In: 12th International Conference on Computers and Information Technology (ICCIT’09), vol. 5, no. 6, pp 367–372

  24. Gaubatz MD, Simske SJ (2009) Printer-scanner identification via analysis of structured security deterrents. In: First IEEE International Workshop on Information Forensics and Security (WIFS’09), pp 151–155

  25. Gaubatz MD, Simske SJ, Gibson S (2009) Distortion metrics for predicting authentication functionality of printed security deterrents. In: 16th IEEE International Conference on Image Processing (ICIP’09), Washington, DC, USA, pp 1489–1492

  26. Geusebroek J-M, Markus P, Balke P (2011) Learning banknote fitness for sorting. In: International Conference on Pattern Analysis and Intelligent Robotics (ICPAIR’11), vol. 1, pp 41–46

  27. Glock S, Gillich E, Schaede J, Lohweg V (2009) Feature extraction algorithm for banknote textures based on incomplete shift invariant wavelet packet transform. In: Proceedings of the 31st DAGM Symposium on Pattern Recognition. Berlin, Heidelberg: Springer-Verlag, pp 422–431

  28. Gou H, Li X, Li X, Yi J (2011) A reliable classification method for paper currency based on LVQ neural network. In: Advances in Computer Science and Education Applications. Springer Berlin Heidelberg, vol. 202, pp 243–247

  29. Grijalva F, Rodriguez JC, Larco J, Orozco L (2010) Smartphone recognition of the U.S. banknotes’ denomination, for visually impaired people. In: IEEE ANDESCON 2010, pp 1–6

  30. Guedes A, Algarra M, Prieto AC, Valentim B, Hortelano V, Neto S, Algarra R, Noronha F (2013) Raman microspectroscopy of genuine and fake euro banknotes. Spectrosc Lett Int J Rapid Commun, 569–576

  31. Guo J, Chow A (2008) Virtual money systems: a phenomenal analysis. In: 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and EServices, pp 267–272

  32. Guo J, Zhao Y, Cai A (2010) A reliable method for paper currency recognition based on LBP. In: 2nd IEEE International Conference on Network Infrastructure and Digital Content, Washington, DC, USA, pp 359–363

  33. Halder B, Garain U (2010) Color feature based approach for determining ink age in printed documents. In: 20th International Conference on Pattern Recognition (ICPR’10), pp 3212–3215

  34. Hasanuzzaman FM, Yang X, Tian Y (2011) Robust and effective component-based banknote recognition by SURF features. In: 20th Annual Wireless and Optical Communications Conference (WOCC’11), pp. 1–6

  35. Hasanuzzaman FM, Yang X, Tian Y (2012) Robust and effective component-based banknote recognition for the blind. IEEE Trans Syst Man Cybern C Appl Rev (99):1–10

  36. Hassanpour H, Farahabadi PM (2009) Using Hidden Markov models for paper currency recognition. Expert Syst Appl 36(6):105–111

    Article  Google Scholar 

  37. He K, Peng S, Li S (2008) A classification method for the dirty factor of banknotes based on neural network with sine basis functions. In: International Conference on Intelligent Computation Technology and Automation (ICICTA’08), vol. 1, pp 159–162

  38. Heudt L, Debois D, Zimmerman TA, Köhler L, Bano F, Partouche F, Duwez A-S, Gilbert B, Pauw ED (2012) Raman spectroscopy and laser desorption mass spectrometry for minimal destructive forensic analysis of black and color inkjet printed documents. Forensic Sci Int 64–75

  39. Hong Z (2009) The impact of e-money on the economy. In: WRI World Congress on Computer Science and Information Engineering, vol. 3, pp 126–130

  40. Hrishikesh C, Shefali S (2009) Printed document watermarking using phase modulation. In: 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET’09), pp 222–227

  41. Huang S, Wu JK (2007) Optical watermarking for printed document authentication. IEEE Trans Inf Forensic Secur 2(2):164–173

    Article  Google Scholar 

  42. Huber-Mörk R, Heiss-Czedik D, Mayer K, Penz H, Vrabl A (2007) Print process separation using interest regions. In: Proceedings of the 12th international conference on Computer analysis of images and patterns (CAIP’07). Berlin, Heidelberg: Springer-Verlag, pp 514–521

  43. Ishigaki T, Higuchi T (2008) Dynamic spectrum classification by divergence-based kernel machines and its application to the detection of worn-out banknotes. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’08). Washington, DC, USA: IEEE Computer Society, pp 1873–1876

  44. Jahangir N, Chowdhury AR (2007) Bangladeshi banknote recognition by neural network with axis symmetrical masks. In: 10th international conference on Computer and information technology (ICCIT’07). IEEE, pp 1–5

  45. Jin Y, Song L, Tang X, Du M (2008) A hierarchical approach for banknote image processing using homogeneity and FFD model. IEEE Signal Process Lett 15:425–428

    Article  Google Scholar 

  46. Jing L, Shuang L, Jin MS, Wei W (2010) About RMB number identification with genetic evolution neural network. In: International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE’10), vol. 1, Washington D.C. USA, pp 286–288

  47. Kee E, Farid H (2008) Printer profiling for forensics and ballistics. In: Proceedings of the 10th ACM Workshop on Multimedia and Security (Sec’08), New York, NY, USA, pp 3–10

  48. Kersten J (2010) The art of making money: the story of a master counterfeiter. Penguin Group, USA

    Google Scholar 

  49. Kim T, Kim U, Jung G, Choi J (2009) Design of an UHF RFID tag antenna for paper money management system. In: Asia Pacific Microwave Conference (APMC’ 09), pp 1056–1059

  50. Kim HY, Mayer J (2007) Data hiding for binary documents robust to print-scan, photocopy and geometric distortions. In: XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI’07), pp 105–112

  51. Kulčar R, Friškovec M, Hauptman N, Vesel A, Gunde MK (2010) Colorimetric properties of reversible thermochromic printing inks. Dyes Pigments 86(3):271–277

    Article  Google Scholar 

  52. Kumar D, Gonsalves T, Jhunjhunwala A, Raina G (2010) Mobile payment architectures for india. In: National Conference on Communications (NCC’10), pp 1–5

  53. Kumpulainen P, Mettänen M, Lauri M, Ihalainen H (2009) Relating halftone dot quality to paper surface topography. In: Palmer-Brown D, Draganova C, Pimenidis E, Mouratidis H (eds) Engineering applications of neural networks, ser. communications in computer and information science, vol 43. Springer, Berlin, pp 178–189

    Chapter  Google Scholar 

  54. Kumpulainen P, Mettänen M, Lauri M, Ihalainen H (2011) Relating halftone dot quality to paper surface topography. Neural Comput Appl 20(6):803–813

    Article  Google Scholar 

  55. Lee KH, Park TH (2010) Image segmentation of UV pattern for automatic paper-money inspection. In: 11th International Conference on Control Automation Robotics Vision (ICARCV’10), pp 1175–1180

  56. Li L, Yu-tang Y, Yu X, Liang P (2010) Serial number extracting and recognizing applied in paper currency sorting system based on RBF Network. In: International Conference on Computational Intelligence and Software Engineering (CiSE’10), pp 1–4

  57. Li Z, Zhou X, Chen Y (2009) Research for the intelligent RMB sorter based on ANN. In: 9th International Conference on Electronic Measurement and Instruments (ICEMI’09), pp 1–103

  58. Ling Y, Xiang Y, Wang X (2007) RSA-based secure electronic cash payment system. In: IEEE International Conference on Industrial Engineering and Engineering Management, pp 1898–1902

  59. Mirembe D, Kizito J, Tuheirwe D, Muyingi H (2008) A model for electronic money transfer for low resourced environments: M-cash. In: Third International Conference on Broadband Communications, Information Technology Biomedical Applications, pp 389–393

  60. Morshidi MA, Marhaban MH, Jantan A (2008) Color segmentation using multi layer neural network and the HSV colour space. In: International Conference on Computer and Communication Engineering. ICCCE 2008. Washington, DC, USA: IEEE Computer Society, pp 1335–1339

  61. Nah J, Kim J, Kim J (2009) A new image watermarking using peak position modulation for ID photos. In: 11th IEEE International Symposium on Multimedia (ISM ’09), pp 595–599

  62. Neumann C, Ramotowski R, Genessay T (2011) Forensic examination of ink by high-performance thin layer chromatography - the United States Secret Service Digital Ink Library. J Chromatogr A 1218(19):2793–2811

    Article  Google Scholar 

  63. Nieves J, Ruiz-Agundez I, Bringas PG (2010) Recognizing banknote patterns for protecting economic transactions. In: IEEE Workshop on Database and Expert Systems Applications (DEXA’10), pp 247–249

  64. Nishimura K (2009) Banknote recognition based on continuous change in strictness of examination. In: ICCAS-SICE. IEEE, pp 5347–5350

  65. Ojala T, Pietikäinen M, Harwood D (1996) A comparative study of texture measures with classification based on feature distributions. Pattern Recogn 29(1):51–59

    Article  Google Scholar 

  66. Omatu S, Yoshioka M, Kosaka Y (2009) Reliable banknote classification using neural networks. In: 3rd International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP’09), pp 35–40

  67. Peng H, Niu L (2009) Two-way exchange of virtual currency: future tendency and inherent risks. In: International Conference on Future Networks, pp 220–224

  68. Penrose J (2011) Designing the nation. banknotes, banal nationalism and alternative conceptions of the state. Polit Geogr 30(8):429–440

    Article  Google Scholar 

  69. Pollard SB, Simske SJ, Adams GB (2010) Model based print signature profile extraction for forensic analysis of individual text glyphs. In: Workshop on Information Forensics and Security (WIFS’10)

  70. Pramoun T, Amornraksa T (2009) Improved image watermarking using pixel averaging and unbiased retrieval In: 9th International Symposium on Communications and Information Technology (ISCIT’09), Washington D. C. USA, pp 247–249

  71. Preradovic S, Karmakar N (2009) Design of fully printable chipless RFID tag on flexible substrate for secure banknote applications. In: 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (ASID’09), pp 206–210

  72. Qi W, Li X, Yang B (2009) Bilinear coons patch and its application in security pattern design. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’09), pp 881–884

  73. Qian S, Zuo X, He Y, Tian G, Zhang H (2011) Detection technology to identify money based on pulsed eddy current technique. In: 17th International Conference on Automation and Computing (ICAC’11), pp 230–233

  74. Roy A, Halder B, Garain U (2010) Authentication of currency notes through printing technique verification. In: Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP’10), New York, NY, USA, pp 383–390

  75. Rusanov V, Chakarova K, Winkler H, Trautwein AX (2009) Mössbauer and X-ray fluorescence measurements of authentic and counterfeited banknote pigments. Dyes Pigments 81(2):254–258

    Article  Google Scholar 

  76. Russ JC (2007) The image processing handbook, 5th edn. CRC Press, Raleigh

    MATH  Google Scholar 

  77. Ryu S-J, Lee H-Y, Cho I-W, Lee H-K (2008) Document forgery detection with SVM classifier and image quality measures. In: Huang Y-MR, Xu C, Cheng K-S, Yang J-FK, Swamy MN, Li S, Ding J-W (eds) Proceedings of the 9th Pacific Rim Conference on Multimedia (PCM’08), pp 486–495

  78. Sajal RF, Kamruzzaman M, Jewel FA (2008) A machine vision based automatic system for real time recognition and sorting of Bangladeshi bank notes. In: 11th International Conference on Computer and Information Technology (ICCIT’08), pp 533–535

  79. Schulze C, Schreyer M, Stahl A, Breuel TM (2008) Evaluation of gray level-features for printing technique classification in high-throughput document management systems. In: Proceedings of the 2nd international workshop on Computational Forensics(IWCF ’08). Berlin, Heidelberg: Springer-Verlag, pp 35–46

  80. Shan G, Peng L, Jiafeng L, Xianglong T (2009) The design of HMM based banknote recognition system. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS’09), vol. 4, pp 106–110

  81. Shankar NG, Ravi N, Zhong ZW (2009) A real-time print-defect detection system for web offset printing. Measurement 42(5):645–652

    Article  Google Scholar 

  82. Simske S, Adams G, Aronoff J, Sturgill M (2009) New findings in security printing and imaging. In: 25th International Conference on Digital Printing Technologies and Digital Fabrication 2009 (NIP25), vol. 25, pp 158–160

  83. Simske S, Aronoff S, Sturgill M, Collins F, Golodetz G, Israel R (2007) Security printing deterrents: a comparison of TIJ, DEP and LEP printing. In: International Conference on Digital Printing Technologies and Digital Fabrication, vol. 23, pp 543–548

  84. Simske SJ, Aronoff JS, Sturgill MM, Golodetz G (2008) Security printing deterrents: a comparison of thermal ink jet, dry electrophotographic, and liquid electrophotographic printing. J Imaging Sci Technol 52(5):050 201–050 207

    Article  Google Scholar 

  85. Singh B, Badoni P, Verma K (2011) Computer vision based currency classification system. Int J Comput Appl 16(4):34–38

    Google Scholar 

  86. Solymar Z, Stubendek A, Radvanyi M, Karacs K (2011) Banknote recognition for visually impaired. In: 20th European Conference on Circuit Theory and Design (ECCTD’11), pp 841–844

  87. Sun B, Li J (2008) Recognition for the banknotes grade based on CPN. In: International Conference on Computer Science and Software Engineering, vol. 1, pp 90–93

  88. Sun B, Li J (2008) The recognition of new and old banknotes based on SVM. In: Second International Symposium on Intelligent Information Technology Application (IITA’08), vol. 2, pp 95–98

  89. Tarnoff B (2011) Moneymakers: the wicked lives and surprising adventures of three notorious counterfeiters. The Penguin Press HC, USA

    Google Scholar 

  90. Tobbin P (2011) Understanding mobile money ecosystem: ROLES, structure and strategies. In: Tenth International Conference on Mobile Business (ICMB’11), pp 185–194

  91. Trémeau A, Muselet D (2009) Recent trends in colour image watermarking. J Imaging Sci Technol 53(1):10 201–10 215

    Article  Google Scholar 

  92. van Beusekom J, Schreyer M, Breuel T (2010) Automatic counterfeit protection system code classification. In: Proceedings of SPIE Media Forensics and Security XII. SPIE, pp 1–8

  93. van Beusekom J, Shafait F (2011) Distortion measurement for automatic document verification. In: International Conference on Document Analysis and Recognition (ICDAR’11), pp 289–293

  94. Verikas A, Lundstram J, Bacauskiene M, Gelzinis A (2011) Advances in computational intelligence-based print quality assessment and control in offset colour printing. Expert Syst Appl 38(10):13 441–13 447

    Article  Google Scholar 

  95. Vila A, Ferrer N, Garcia JF (2007) Chemical composition of contemporary black printing inks based on infrared spectroscopy: Basic information for the characterization and discrimination of artistic prints. In: Analytica Chimica Acta, vol. 591, no. 1. Elsevier, pp 97–105

  96. Wang L (2009) A new multi-bank e-cash protocol with anonymity control. In: Fifth International Conference on Information Assurance and Security (IAS’09), vol. 1, pp 536–539

  97. Wang D-X, Teng J-K (2010) Research and analysis of electronic cash payment system. In: International Conference on Educational and Information Technology (ICEIT’10), vol. 3, pp V3–335 –V3–339

  98. Wenhong L, Wenjuan T, Xiyan C, Zhen G (2010) Application of support vector machine (SVM) on serial number identification of RMB. In: 8th World Congress on Intelligent Control and Automation (WCICA). Washington, DC, USA: IEEE Computer Society, pp 6262–6266

  99. Wu Y, Kong X, You X, Guo Y(2009) Printer forensics based on page document’s geometric distortion. In: IEEE International Conference on Image Processing (ICIP’09), Washington D.C. USA, pp 2909–2912

  100. Wu Q, Zhang Y, Ma Z, Wang Z, Jin B (2009) A banknote orientation recognition method with BP network. In: Proceedings of the 2009 WRI Global Congress on Intelligent Systems (GCIS’09), Washington, DC, USA, pp 3–9

  101. Xie J, Qin C, Liu T, He Y, Xu M (2009) A new method to identify the authenticity of banknotes based On the texture roughness. In: IEEE International Conference on Robotics and Biomimetics (ROBIO’09), pp 1268–1271

  102. Yang CN, Chen JR, Chiu CY, Wu GC, Wu CC (2009) Enhancing privacy and security in RFID-enabled banknotes. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, pp 439–444

  103. Yeh CY, Su WP, Lee SJ (2011) Employing multiple-kernel support vector machines for counterfeit banknote recognition. In: IEEE Applied Soft Computing, vol. 11, no. 1, pp 1439–1447

  104. Yoshida K, Kamruzzaman M, Jewel FA, Sajal RF (2007) Design and implementation of a machine vision based but low cost stand alone system for real time counterfeit Bangladeshi bank notes detection. In: 10th international conference on Computer and information technology (ICCIT’07), pp 1–5

  105. Zhang J, Ma L, Wang Y (2007) Fair e-cash system without trustees for multiple banks. In: International Conference on Computational Intelligence and Security Workshops (CISW’07), pp 585–587

  106. Zhao L-L, Gu Z-C, Fang Z-L (2008) A morphology screen coding anticounterfeiting method based on visual characteristics. Optoelectron Lett 4:371–374

    Article  Google Scholar 

  107. Zhou W, Xie G, Liu B (2008) The application of mixed GA-BP algorithm on remote sensing image classification. In: Liu L, Li X, Liu K, Zhang X (eds) Geoinformatics 2008 and Joint Conference on GIS and Built Environment: Classification of Remote Sensing Images, vol. 7147, no. 1. SPIE. doi:10.1117/12.813210

  108. Zhu Y, Rice J (2009) A lightweight architecture for secure two-party mobile payment. In: International Conference on Computational Science and Engineering (CSE’09), vol. 2, pp 326–333

  109. Žiljak V, Pap K, Žiljak I (2009) CMYKIR security graphics separation in the infrared area. Infrared Phys Technol 52(2–3):62–69

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Yan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chambers, J., Yan, W., Garhwal, A. et al. Currency security and forensics: a survey. Multimed Tools Appl 74, 4013–4043 (2015). https://doi.org/10.1007/s11042-013-1809-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1809-x

Keywords

Navigation