Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
![]() |
EUROPE |
![]() |
MIDDLE EAST |
![]() |
ASIA |
![]() |
AFRICA |
............................. | |
![]() |
United States of America |
![]() |
United Kingdom |
![]() |
Canada |
![]() |
Australia |
![]() |
Italy |
![]() |
France |
![]() |
Brazil |
![]() |
Germany |
![]() |
Malaysia |
![]() |
Turkey |
![]() |
China |
![]() |
Taiwan |
![]() |
Japan |
![]() |
Saudi Arabia |
![]() |
Jordan |
![]() |
Egypt |
![]() |
United Arab Emirates |
![]() |
India |
![]() |
Nigeria |
Comparative Study of Traditional Image Processing and Deep Learning Methods for Tamper Detection in Nigerian University Student Identity Cards
Opeoluwa Omotayo Ajilore, Adewole A. Philip, Olumoye O. Mosud, Eludire A. Adekunle, Akanni W. Adeniyi, Adegunwa Olajide
Pages - 109 - 126 | Revised - 30-06-2025 | Published - 01-08-2025
MORE INFORMATION
KEYWORDS
Tamper Detection, Deep Learning, Traditional Image Processing, Siamese Network, Identity Verification, Image Analysis.
ABSTRACT
Ensuring the integrity and security of identity cards to prevent fraud also to conservate
institutional credibility in educational institutions is crucial. This study presents a comparative
analysis of traditional image processing techniques and deep learning methods for tamper
detection in Nigerian university system identity cards. Traditional methods evaluated include
Canny edge detection, histogram comparison, Sobel edge detection, and Laplacian edge
detection, while the deep learning method uses a Siamese Network. The dataset, composed of
original and tampered identity cards which were generated from original identity cards through
blurring, noise addition, shifting, and text alterations, was evaluated using accuracy, precision,
recall, F1-score, and ROC AUC metrics. From the results of this study, it was shown that the
Siamese network achieved the highest accuracy (80%) with an F1-score of 0.89, while Canny
edge detection followed closely with an accuracy of 79% and F1-score of 0.88. Other traditional
methods such as Sobel, Laplacian, and Histogram comparison underperformed, achieving
accuracies below 30%. The results show that the Siamese network is more effective in detecting
subtle tampering and generalizes better on limited datasets compared to traditional methods.
Finally, this study concludes that deep learning, specifically the Siamese Network, provides
superior accuracy and reliability, making it a more effective solution for tamper detection in
Nigerian university identity systems.
Arevalo Ancona, R. E., Cedillo Hernandez, M., & Garcia Ugalde, F. J. (2024). Robust image tampering detection and ownership authentication using zero watermarking and Siamese neural networks. International Journal of Advanced Computer Science and Applications, 15(10), 436-446. https://doi.org/10.14569/IJACSA.2024.0151046. | |
Chakraborty, S., Chatterjee, K., & Dey, P. (2024). Detection of image tampering using deep learning, error levels, and noise residuals. Neural Processing Letters, 56(112). https://doi.org/10.1007/s11063-024-11448-9. | |
Chen, X. (2022). An Overview of Image Tamper Detection. Journal of Information Hiding & Privacy Protection, 4(2). https://doi.org/10.32604/jihpp.2022.039766. | |
Chennamma, H.R., & Madhushree, B. (2022). A comprehensive survey on image authentication for tamper detection with localization. Multimedia Tools and Applications, 82, 1873-1904. https://doi.org/10.1007/s11042-022-13312-1. | |
Clark Gnangby, A. O., & ChoukpinAdoto M., S. Y. (2025). Advancing image retrieval through similarity measures using siamese neural networks. International Journal of Engineering Research & Technology (IJERT), 14(1), January 2025. | |
Du, J., Fu, W., Zhang, Y., & Wang, Z. (2024). Advancements in image recognition: A siamese network approach. Information Dynamics and Applications, 3(2), 89-103. https://doi.org/10.56578/ida030202. | |
Dupont, F., Laurent, P., Montfort, F., Pierre, H., & Jeanne, L. (2022). A miniaturized and ultra-low-power tamper detection sensor for portable applications. IEEE Sensors Journal, 22(3), 1234-1242. https://doi.org/10.1109/jsen.2022.3143656. | |
Ghosh, C., Majumder, S., Ray, S., Datta, S., & Mandal, S. N. (2020). Different edge detection techniques: A review. Electronic Systems and Intelligent Computing: Proceedings of ESIC 2020, 885-898. https://doi.org/10.1007/978-981-15-7031-5_84. | |
Gnangby, C., & Mignonkoun, S.Y. (2025). Advancing image retrieval through similarity measures using Siamese neural networks. International Journal of Engineering Research & Technology, 14(1). https://doi.org/10.17577/IJERTV14IS010034. | |
Gonzalez, R. C., & Woods, R. E. (2018). Digital Image Processing(4th ed.). Pearson. | |
Hafemann, L. G., Sabourin, R., & Oliveira, L. S. (2017). Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition, 70, 163-176. https://doi.org/10.1016/j.patcog.2017.05.012. | |
Hossain, M. S., & Muhammad, G. (2023). Security and privacy issues in biometric authentication systems. Security and Privacy, 3(1), e123. | |
Hölscher, D., Reich, C., Gut, F., Knahl, M., & Clarke, N. (2024). Exploring the efficacy and limitations of histogram-based fake image detection. Procedia Computer Science, 246, 2882-2891. https://doi.org/10.1016/j.procs.2024.09.382. | |
Jesí, P. M., & Dhaya, M. D. A. (2023). Face counterfeit detection in national identity cards using image steganography. International Journal of Research and Analytical Reviews, 10(3), 943-947. https://ijrar.org/download.php?file=IJRAR23C1119.pdf. | |
Kamble, V. B., & Uke, N. J. (2024). Image tampering detection: A review of multi-technique approach from traditional to deep learning. Journal of Dynamics and Control, 8(11), 252-283. https://doi.org/10.71058/jodac.v8i11024. | |
Kumar, A., & Singh, R. (2019). International Journal of Innovative Science and Creative Ideas (IJISCS), 8(2), 123-130. https://doi.org/10.30534/ijiscs/2019/36822019. | |
Livieris, I. E., Pintelas, E., Kiriakidou, N., & Pintelas, P. (2023). Explainable image similarity: Integrating siamese networks and Grad-CAM. Journal of Imaging, 9(10), 224. https://doi.org/10.3390/jimaging9100224. | |
Livieris, I. E., Pintelas, E., Kiriakidou, N., & Pintelas, P. (2023). Explainable image similarity: Integrating Siamese networks and Grad CAM. Journal of Imaging, 9(10), 224. https://doi.org/10.3390/jimaging9100224. | |
Markoska, R., & Markoski, A. (2022). Digital student ID, identity management, and the Internet of Everything in education during COVID-19. Contemporary Journal of Economics and Finance, 1(1), 43-51. | |
Shao, Y., Dai, K., & Wang, L. (2024). Image tampering localization network based on multi-class attention and progressive subtraction. Signal, Image and Video Processing, 19(2), 130-145. https://doi.org/10.1007/s11760-024-03622-2. | |
Sharma, P., Kumar, M., & Sharma, H. (2022). Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: An evaluation. Multimedia Tools and Applications, 82(12), 18117-18150. https://doi.org/10.1007/s11042-022-13808-w. | |
Sharma, R., Kumar, N., & Singh, S. (2022). Advancements in tamper detection methods for secure identity verification in educational settings. Computational Intelligence and Neuroscience, 2022, 9876543. https://doi.org/10.1155/2022/9876543. | |
Tan, K., Li, L., & Huang, Q. (2023). Image manipulation detection using the attention mechanism and Faster R-CNN. International Journal of Computer Applications, 50(4), 13-24. | |
Tehranipoor, M., Pundir, N., Vashistha, N., & Farahmandi, F. (2022). Tamper Detection. In Hardware Security Primitives (pp. 261-279). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-031-19185-5_15. | |
Wang, Y., & Liu, W. (2020). A study on the effectiveness of digital identity systems in educational institutions. IEEE Access, 8, 10223-10234. | |
Wei, X., Wu, Y., Dong, F., Zhang, J., & Sun, S. (2019). Developing an image manipulation detection algorithm based on edge detection and Faster R-CNN. Symmetry, 11(10), 1223. https://doi.org/10.3390/sym11101223. | |
Yang, K., Song, H., Zhang, K., & Liu, Q. (2020). Hierarchical attentive Siamese network for real-time visual tracking. Neural Computing and Applications, 32(18), 14335-14346. https://doi.org/10.1007/s00521-019-04238-1. | |
Yuan, S., Zhao, W., Deng, J. D., Xia, S., & Li, X. (2024). Quantum image edge detection based on Laplacian of Gaussian operator. Quantum Information Processing, 23, 178. https://doi.org/10.1007/s11128-024-04392-z. | |
Zanardelli, M., et al. (2023). Image forgery detection: A survey of recent deep-learning approaches. Journal of Visual Communication and Image Representation, 77, 103127. https://doi.org/10.1007/s11042-022-13797-w. | |
Mrs. Opeoluwa Omotayo Ajilore
Computer Science Department, Caleb University, Lagos - Nigeria
opeoluwaomotayo@ymail.com
Professor Adewole A. Philip
Department of Computer Sciences, University of Lagos, Akoka, Yaba, Lagos - Nigeria
Dr. Olumoye O. Mosud
School of Business & Technology, Webster University, St. Louis, MO - United States of America
Professor Eludire A. Adekunle
Computer Science Department, Joseph Ayo Babalola University, Osun - Nigeria
Dr. Akanni W. Adeniyi
Computer Science Department, Caleb University, Lagos - Nigeria
Mr. Adegunwa Olajide
Computer Science Department, Caleb University, Lagos - Nigeria
|
|
|
|
View all special issues >> | |
|
|