The invention relates to currency validators and methods for adapting and operating currency validators. In this specification, the terms currency and currency items are intended to include coins, tokens and the like, banknotes and bills, other value sheets such as cheques, vouchers, bonds, and includes both genuine items and counterfeits, such as slugs and washers.
There are many known methods for determining the denomination of a currency item and distinguishing between genuine and fake currency items. Commonly, a currency item is sensed by one or more sensors, such as electromagnetic or optical sensors, to produce signals representative of certain characteristics of the currency item, such as coin thickness, coin material, or the pattern on a banknote. Those measured signals are then compared with stored reference data representative of known currency items, and, depending on the outcome of the comparison, the measured currency item is classified, for example, as a genuine currency item of a particular denomination, a known fake, or simply as unknown.
For example, it is known to store reference data for known currency items in the form of sets of “windows”, which consist of upper and lower limits. If each of the measured signals for a particular item falls within each of the corresponding windows for a particular denomination, it is classified as belonging to that particular denomination. This approach can be viewed generally as using boundaries in the space having axes corresponding to the measured characteristics, known as acceptance boundaries, which are linear.
Usually, distributions of populations of particular denominations of currency items are non-linear, in which case, linear acceptance boundaries may not be sufficiently accurate to distinguish between different denominations. Another known method stores reference data which describe elliptical boundaries corresponding to specific denominations of currency items. Similarly to the approach mentioned above, measured currency items are classified according to whether or not the measured characteristics fall within or outside those elliptical boundaries. Such a method is described in, for example, GB 2 254 949A.
In many cases, the boundaries between different denominations of currency items are complicated and cannot be reflected sufficiently accurately by linear or elliptical boundaries. Known techniques for finding non-linear acceptance boundaries can result in less than ideal results for currency validators. Clearly, it is particularly important to be able to classify and validate items of currency accurately, for example, in a vending machine, where there is potential loss of revenue.
The invention provides an alternative method of deriving and using a classification function, especially for classifying items of currency.
The invention provides a method of deriving a classifying function using a set of data, the elements of the data set corresponding to points in a first space, selecting a kernel function corresponding to a mapping of the first space to a second space, deriving a subset of the data set such that the image of the subset under the mapping in the second space is representative of the image of the data set under the mapping in the second space, and deriving a classification function in the form of a support vector machine classification function expressed in terms of said subset of feature vectors.
Alternatively, the invention provides a method of deriving a classification function by processing training data, corresponding to points in a first space, the method comprising deriving a support vector machine classification function using said training data, the method further comprising selecting a kernel function corresponding to a mapping from the first space to a second space, the method comprising selecting a subset of the training data set, where the image of the subset in the second space is representative of the image of the training data set in the second space, and expressing the support vector machine classification function in terms of the subset.
For example, the method may involve deriving a plurality of measurements from at least one currency sensor and a plurality of items, and forming a set of data from the measurements, the elements of the data set corresponding to points in said first space.
The invention also provides a corresponding classification function, classifying method, and classifier (classification apparatus).
Preferably, aspects of the invention are used to derive a function for use in manufacturing, adapting or operating a device such as a currency validator.
The invention is especially intended for use in relation to currency items, for deriving a classification function for, and for classifying, denominating or validating, currency items (methods and apparatus). In such cases, for example, the data may be derived from measurements of one or more characteristics of currency items, or from one or more sensors for sensing currency items.
The invention also provides the use of support vector machines for classification of currency items.
Other aspects of the invention are set out in the accompanying claims.
Embodiments of the invention will be described with reference to the accompanying drawings of which:
According to a preferred embodiment, the present invention uses kernel functions to analyse data derived from currency items and currency sensors to derive classification functions, or acceptance boundaries, for validators. More particularly, the data is measured data derived from currency items, such as coins and banknotes, the data being representative of characteristics of currency items, such as coin thickness, material, weight, width or the pattern on a banknote.
We shall begin with a generalised description of the theory underlying the invention, with reference to relatively simple data distributions, for clarity and ease of understanding. The invention will then be described in more detail in relation to embodiments relating to classification and validation of currency items.
An aspect of the invention relates to the use of kernel functions to select a subset from a set of data, the subset beings representative of the data set, in the context of the kernel function approach. More particularly, the subset is representative of the data set in the image space of a mapping 100 corresponding to a kernel function k. This aspect of the invention enables data analysis using kernel functions to be performed using less data, which reduces the complexity of the analysis and thus, for example, reduces computing effort and consequently costs when deriving classification functions for currency validators.
Another aspect of the invention relates to the use of support vector machines, as discussed below.
In the following, underlining is used to indicate vector quantities, except where a vector quantity is implicit from the context, and the term vector is generally intended to include scalar quantities (ie a vector of 1 dimension).
First, we shall describe the selection of a representative subset of a set of vectors.
Let X be a set of vectors, of size M.
X={x1,x2, . . . ,xM}
Suppose that we map any vector from the input space X to a Hilbert space F through a nonlinear mapping function φ:
φ: X→F
x→φ(x)
Kernel functions are scalar valued functions complying with the Mercer's theorem.
A kernel function provides a direct way to compute a dot product in F using only the input space data. To simplify the notation let use φi=φ(xi). Then, it can be shown that for a kernal function k, there exists a corresponding mapping φ such that:
φiTφj=k(xi,xj)=ki,j
Examples of kernel functions are:
A consequence of this property is that if an algorithm can be expressed only with dot products, the image of the data in F can be analysed using only the data from the input space X, without even knowing φ(x).
With some kernels, such as the Gaussian, the dimensionality of F is infinite. The transformation from X to F is non-linear and the dimensionality of F is often far larger than X.
Now, let S be a subset of X of size L.
S={xs,1,xs,2, . . . ,xs,L}
We assume that there is a subset S which can approximate, or reconstruct, the image of the elements of X in F. In other words, S acts like a base expressing X in F space.
({circumflex over (φ)}(xi) is the approximation of φ(xi) using the image of S in F.)
To simplify let us use the following notation:
φi=φ(xi)
φs,j=φ(xs,j)
then equation (1) can be written as:
{circumflex over (φ)}i=Φs·ai∀i (2)
With
ΦS=└φs,1, φs,2, . . . , φs,L┘a matrix formed from the image of S in F.
a
i=[ai,1, ai,2, . . . , aiL]t a vector which expresses φi using the image of S in F.
We wish to find values for ai that minimize the relative differences δi between the image of the ith element of X, φi and its reconstruction using the S set, {circumflex over (φ)}i.
Minimization of the δi leads to:
(ΦStΦS)−1 exists if the elements of the image of S in F are linearly independent. In other words, the rank of ΦS is L.
Using the equations (3) & (4) we can write:
Where βi is the angle between the vectors and φi and {circumflex over (φ)}i, this implies we have minimized |βi| too.
Introducing now the kernel notation:
k(xp,xq)=φpt·φq
then equation 5) can be expressed as
where
which is a L×L square matrix of the dot products of the image of S in F.
Ks,i=[k(xs,j,xi)]j=1, . . . , L which is a vector of the dot products between the images of S and xi in F.
As is known, and expressed above, the kernel function k expresses the dot product in F in terms of X.
Minimizing δi can be performed by maximizing:
Ji can be considered as a local fitness function estimating the quality of the reconstruction for the element xi.
A suitable set S is constructed using a heuristic approach. In one example, this is done using a global fitness function Js which represents how closely the image of S represents all of the image of X in F. An example of a global fitness function is:
In more detail, an example of how S is constructed is as follows.
Firstly, the element of X which gives the best global fitness result is selected. In other words, the element is chosen which has the largest global fitness value Js using equation (8) in this example. Alternatively, a first element can be chosen at random, or by inspection, to form the first element of S, xs,1.
Next, another element of X is chosen and made a temporary member of S, and the value of Js is calculated on that basis for all the other elements of XL Then the temporary member of S is replaced by another member of X and Js is calculated again. Those steps are repeated for all the remaining elements of X. The element of X for which the global fitness function is a maximum is chosen as the permanent second member of S.
The steps set out in the previous paragraph are repeated to find subsequent members of S, each time looking for the highest value of the fitness function. The procedure is stopped when the fitness function exceeds a predetermined value. Alternatively, the procedure stops when S has a predetermined number of elements, or when S is a complete basis for the image of X in F. It is necessary to check the rank of the Ks,s matrix to make sure it is possible to invert it. The procedure could be stopped when Ks,s is no longer invertible.
Other more complex heuristics can also be used. Also, alternative fitness functions can be used. For example, the global fitness function can use the mean, the median or the minimum of the local fitness function, or other strategies. Alternatively, the fitness functions, global and local, can, for example, be based on an “error”, using equation (6), in which case, optimization of S is indicated by a reduction in the global error. In each case, however, a kernel expression, such as in equation (7) is used.
The above technique is a ‘forward’ selection scheme, but other techniques such as involving ‘backward’ selection may also be used. As another example, all subsets of a given size L could be considered, and the best fit selected. In general terms, any suitable fitness based selection algorithm may be used.
In this way, a subset S of X can be found where the image of all elements of X in F under a mapping φ can be expressed approximately as linear combinations of the images of elements of S in F.
The selected set S may not be unique, but it provides a set of a given size L that preserves the structure of the data in F. It can be shown that for some kernels like the polynomial, the optimal value of Js is reached with only a few selected vectors.
All of the samples, or training data, in X, can be projected onto the image of S in F.
The transformation of a sample x; is given by the dot product projection:
zi=ΦStφi (9)
Note that zi are obtained through a linear transformation. Other transformations can be considered, in particular, an orthogonal projection zi=(ΦStΦS)−1ΦStφi, which requires more computation and is not needed for many algorithms applied to the transformed data.
The set S can be used to reduce the computation involved in various kernel function approaches for data analysis, such as kernel PCA and kernel GDA, as described in our co-pending application EP00311253.9, the contents of which are incorporated herein by reference. EP00311253.9 gives examples of data subsets selected in accordance with the above technique for various data distributions and kernel functions.
We shall describe next support-vector machines (SVM in the following) followed by a discussion of how S is used in connection with a support vector machine.
The use of support vector machines is a known technique for classification and separation of data A full explanation of the underlying theory can be found in textbooks and academic papers, such as “A tutorial on support vector machines for pattern recognition” by C. J. C. Burges, from “Data mining and knowledge discovery 1998, pages 121-167. The key features will be summarized below.
Support vector machines (SVM in the following) use training data and implement a known structural risk minimization (SRM) induction-scheme. In general terms, the SVM is a two class linear classifier involving a hyperplane which separates two classes of data by a margin, as illustrated in
Equation (10) provides a discriminant function where w is the vector normal to the hyperplane (HP) and b a bias, while x is a sample vector.
g(x)=wTx+b (10)
Samples belonging to cluster #1 have the label +1, while for cluster #2 the label is −1.
A set of training samples and their labels are defined as {(xi,di)}i=1N. Then for the optimal HP (w0, b0) the following constraints hold, assuming that the data are separable:
w0Txi+b0≧+1 for di=+1
w0Txi+b0≦−1 for di=−1 (11)
The relations (11) can be rewritten in more compact form as follows:
di(wTxi+b)≧+1 for i=1,2,3, . . . , N (12)
The particular samples for which the first or second relation (11) is equality are called support vectors (SVs).
Given a set of training data, with N elements, and the general relation (12), the goal is to find values for w and b which maximize the margin separating the clusters.
This is set out below.
Let xs be a support vector associated with ds its class (+/−1).
g(xs)=w0Txs±b0=±1 for ds=±1 (13)
With (13) we can compute the Euclidean distance ∥r∥ from a SV to the HP:
Therefore the margin becomes:
Maximizing the margin leads to minimizing the length of w, subject to the constraint from the relation (12).
This problem is known as a quadratic optimization (or Quadratic Programming QP). It is a non-linear programming case where the cost function is quadratic on w while the constraints are linear. The problem can been stated as follows:
For a given training set {(xi,di)}i=1N find the weight vector w and the bias b minimizing the cost function:
The factor ½ is here for the sake of the presentation (derivative). The problem is called the primal. It can be associated with a dual problem, this one will provide us a way to express the solution only with dot products of the input samples. We can solve the primal problem using the method of the Lagrange multipliers. Let call J the Lagrangian function:
The αi are the non-negative Lagrange multipliers. We can demonstrate for J that when w and b are minimized αi are maximized (a saddle point). After differentiation and setting results to zero, we get:
The solution vector w0 is defined in terms of an expansion involving the N training samples.
However we still have to find the a; coefficients, this can be done using the Kuhn-Tucker conditions [7]:
αi└di(w0Txi+b)−1┘=0 for i=1,2,3, . . . ,N (20)
Therefore the Lagrange multipliers which only meet the equation 11 can assume non zero values. The duality theorem can be used now to find those coefficients. With (18) and (19) the equation (17) can be rewritten as:
This is a QP problem too:
For a given training set {(xi,di)}i=1N find the Lagrange multipliers {αi}i−1N maximizing the cost function:
Subject to:
The dual problem uses only training samples. The cost function depends only on the dot products of the sample; this is a very important property to be able to generalize SVM to non-linear problems. When the Lagrange coefficients have been found we can then express the optimal weight vector as follow:
The xi associated with non-zero Lagrange multipliers are the SVs. In general there are less SVs than N. Therefore the expansion 13 does not need all the terms. The optimal bias b can be found using any SV and the equation (12):
b0=1−w0Txs for ds=+1 and b0=1+w0Txs for ds=−1 (23)
The discriminant function then becomes:
g(x)=w0xT+b0; or
where SVS is the set of support vectors.
The above describes the case where the data is separable. SVMs can also handle cases where the data overlap. Details of the analysis can be found in the relevant literature, such as the Burges paper described above, and for simplicity and conciseness will not be repeated here.
The above example of a SVM describes a linear classification.
In order to build non-linear SVMs, a kernel function is used, as described above in relation to selecting S.
In order to address non-linear problems the kernel function and the linear SVM are merged. Equation (21) uses only dot products of the samples. Therefore it can be rewritten with kernels and leads to non-linear SVM using an implicit mapping of the data into the feature space F.
The QP method is then applied directly in F looking at an optimal HP (linear separation) there, as follows:
For a given training set {(xi,di)}i−1N find the Lagrange multipliers {αi}i−1N maximizing the cost function:
Subject to:
Even if the weight vector w cannot be expressed explicitly, we can compute its dot product with any sample in F. Therefore we can retrieve the discriminant function as follows (b0, any, is estimated using the equation (23) as usual):
Remember that the expansion (26) is limited to the non-zero Lagrange multipliers. Therefore it is defined over the whole SV set (SVS) only and uses normally fewer terms than the learning set (N):
Even if the cardinality Ns of the SVS is generally speaking lower than N, it can still be quite high, which has consequences in terms of cost, memory and computing power.
A key feature of the present invention, is the use in combination of a SVM with the selected subset S. In the following, the elements of S are described as feature vectors (FVs), and the selection of S is described as feature vector selection (FVS).
Equation (27) can be modified working in F, using S and projection of the training data according to (9), as follows, bearing in mind that the support vectors belong to the training data and therefore can also be expressed in F using the image of S. Working in F, the SVM is a linear SVM.
First, equation (27) is expressed in terms of F, or in other words in terms of the image of the data and the support vectors in F.
where SVSz represents the image of each of the SVS in F.
The Lagrange multipliers, di, and zi define an explicit optimal weight vector wz0. Therefore (28) can be expressed with only the projection z of any sample x onto the FVs, providing:
Using the notation following equation (6) above, this becomes:
It is to be noted that the discriminant equation (30) involves only L terms (that is, the size of S), which is often far less than the number of support vectors. Thus, the computation and processing involving in calculating the discriminant function is considerably reduced and made faster.
The above techniques, combining FVS with SVM, were applied to the data, using slightly different criteria. More specifically, in the case shown in
In both cases, the number of SVs is 52. In other words, using the standard non-linear SVM approach, the discriminate function involves an expansion of 52 terms. Using FVS, the discriminant function can be adequately expressed using only 12 FVs.
The black solid lines are the locus of the discriminate functions (for g(x).=0) in the input space X (image of the HP in F).
Experiments on various data have compared the discrimination performance using standard non-linear SVM with the SVM and FVS technique described above. The experiments have shown that the discrimination using SVM and FVS is as good and in some cases better than when using non-linear SVM.
Table 1 below gives some examples of performance in real life using a Gaussian kernel and data from databases used widely to test learning machines. The data can been retrieved from the following repository http://ida.first.gmd.de/˜raetsch/data/benchmarks.htm.
There are many kernel functions, satisfying Mercer's Theorem (see WO 00/33262), that represent dot products in F and can be used in the invention. Some more examples are given below.
The spline kernel, where x and y are scalars:
A 3rd order polynomial kernel: k (x,y)=(xt·y)d(d=3,C=0),
The previous examples show good performances in generalization, which means they deal well with new vectors that were not in the original data set X.
To achieve this goal it is necessary to choose carefully the kernel, its parameter(s) (like σ), and the error level.
The choice of an appropriate kernel can be done by experimentation and trial and error, testing to see which give the best-results for the data under analysis. Alternatively, the choice can be made using experience and inspection of the distribution of the data.
For example, for data having a polynomial-type distribution, a polynomial kernel can give good results. It is also necessary to choose carefully various parameters, such as σ in the Gaussian kernel, and the predetermined level for the fitness function. Again, experimentation, experience and the shape of the data are guides.
According to the preferred embodiments of the invention, the general principles of the approaches described above are applied to currency items and currency validators. In other words, the approaches are applied to data that is derived from sensors for deriving measurements representative of characteristics of currency items. Referring to
An embodiment of the invention relates to a coin validator, as shown in block diagram form in
In
The measuring system 1 measures features of an inserted coin 3. The measured features are assembled into a feature vector having n elements, where each element corresponds to a measured feature by the processing system 4. In the present example, the sensor system measures values representative of the material, thickness and diameter of an inserted coin, using known techniques (see, for example, GB 2 254 949 A) and those values are the three elements of the corresponding feature vector. Briefly, each sensor comprises one or more coils in a self-oscillating circuit. In the case of the diameter and thickness sensors, a change in the inductance of each coil caused by the proximity of an inserted coin causes the frequency of the oscillator to alter, whereby a digital representation of the respective property of the coin can be derived. In the case of the conductivity sensor, a change in the Q of the coil caused by the proximity of an inserted coin causes the voltage across the coil to alter, whereby a digital output representative of conductivity of the coin may be derived. Although the structure, positioning and orientation of each coil, and the frequency of the voltage applied thereto, are so arranged-that the coil provides an output-predominantly dependent upon a particular one of the properties of conductivity, diameter and thickness, it will be appreciated that each measurement will be affected to some extent by other coin properties.
Of course, many different features representative of items of currency can be measured and used as the elements of the feature vectors, using various sensors such as optical sensors, magnetic sensors and other types of sensors, as are well known in the art. For example, in the case of a bank-note, the measured features can include, for example, the width of the note, the length of the note, and the intensity of reflected or transmitted light for the whole or part of the note. As an example, a measuring system can be arranged to scan a banknote along N lines using optical sensors. Each scan line contains L individual areas, which are scanned in succession. In each area, there are measurements of M different features. More specifically, for each area, measurements are made of the reflectance intensities of red, green and infra-red radiation. The total number of measurements for a banknote is therefore L×M×N. These measurements form the components of a feature vector for the respective specimen, so that the feature vector has L×M×N components. Alternatively, the measurements can be processed in a different way to obtain a feature vector representative of the measured specimen. For example, local feature vectors for each measured area can be formed made up of the M measurements for that area, so that each local feature vector has M components. The local feature vectors can then be summed over the area of the banknote to obtain an M dimensional feature vector representative of the entire specimen.
The feature vector is then input to the classifier 6. The classifier 6 determines whether the sample belongs to any one of predetermined classes, using the feature vector and predetermined classification criteria including a separating function. If the sample is identified as belonging to an acceptable denomination, then it is accepted and the corresponding value is credited. If the sample is identified as belonging to a known counterfeit group, it is rejected.
In this example, the system is for classifying two denominations of coins and one known counterfeit.
The derivation of the separating function will be described below.
The population distribution of the denominations are analysed as discussed below.
Initially, samples of each of the denominations of interest and each of the known counterfeit are measured and corresponding feature vectors are formed. The samples may be formed using the sensor system of the validator of interest, but in this embodiment, the samples are derived from a plurality of corresponding sensor systems, to take account of variations and manufacturing tolerances, in sensors systems in different validators as sold and installed in the field. The feature vectors from the samples, when plotted, for example, on a n-dimensional scatter graph, (where n is the number of measured features) fall roughly into clusters. These measured samples are then analysed and used to derive a separating function. In this example, 50 samples for each denomination and 50-samples of the counterfeit, are used and measured over 10 samples of sensor systems. The resulting cluster data is analysed and used to derive a classifying function, or discriminant function, using the approach as described above. More specifically, the samples, or training data, are processed and used to derive the set S, or FVS, and values for wz0,j and b0, to produce the discriminant function g(x) in equation (30). Here, the threshold is set to zero. The classifying function is then stored in a memory of the processing system 4 of a particular validator.
Classification for coins of an unknown denomination is then performed as follows. A coin is inserted into the validator. The inserted coin is sensed, and measurements representative of the material, thickness and diameter are obtained The processing system then performs the following steps. A feature vector, x, is derived from the measured values. The values of g(x) is calculated using equation (30). In this example, if g(x)>0, the coin is classified as genuine and if g(x)<0, the coin is classified as a fake.
According to this approach, the validator needs to store very little data (eg the data required in equation (30), that is S, k, wz0 and b0 and the threshold) to perform the classification task to a high degree of accuracy. This reduces costs and computing effort and increases the speed of classification.
A SVM is essentially a two class classifier. For a currency validator for validating a plurality of denominations, a combination of a number of SVMs may be required. For example, for each denomination, a SVM may be used for classifying between two clusters of genuine items and fake items of the denomination, or SVMs can be combined in a binary tree structure. The SVM may be combined with other tests. For example, a preliminary test may determine the denomination of a currency item, using one of the various known techniques for denominating items of currency, followed by a suitable validation technique, using a SVM.
In the above example, the discrimination threshold is set to zero, but other thresholds may be used, such as +/−0.5.
The analysis of the sample values for the initial data analysis and the derivation of the separating function can be done, for example, using a microprocessor. Similarly, the classifier 6 may be a microprocessor.
The methods of the embodiment described above are equally applicable to a banknote or other currency item or indeed to classification of other sorts of items that are sensed by an item sensor to produce measured values.
In the described embodiment, samples of the denominations of interest are used to derive the classifying function. Other items can also be used, such as tokens or washers.
The above techniques can also be used for other types of data, and is not limited to classifying data derived from currency items.
The detailed discussion above relates to data which is separable, but the invention is not limited to such arrangements. The invention may be modified using techniques known in the art for “soft” margins, for example, where the training data overlaps.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB03/03128 | 6/18/2003 | WO | 00 | 3/3/2006 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO04/001683 | 12/31/2003 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5649068 | Boser et al. | Jul 1997 | A |
5678677 | Baudat | Oct 1997 | A |
5757001 | Burns | May 1998 | A |
5992600 | Baudat | Nov 1999 | A |
6588571 | Baudat | Jul 2003 | B1 |
6899215 | Baudat et al. | May 2005 | B2 |
7000754 | Baudat et al. | Feb 2006 | B2 |
7073652 | Baudat | Jul 2006 | B2 |
Number | Date | Country |
---|---|---|
0480736 | Apr 1992 | EP |
0887761 | Dec 1998 | EP |
0887761 | Dec 1998 | EP |
2254949 | Oct 1992 | GB |
2254949 | Oct 1992 | GB |
11-073406 | Mar 1999 | JP |
0033262 | Jun 2000 | WO |
Number | Date | Country | |
---|---|---|---|
20060254876 A1 | Nov 2006 | US |