Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(392.56KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Comparative Study of Traditional Image Processing and Deep Learning Methods for Tamper Detection in Nigerian University Student Identity Cards
Opeoluwa Omotayo Ajilore, Adewole A. Philip, Olumoye O. Mosud, Eludire A. Adekunle, Akanni W. Adeniyi, Adegunwa Olajide
Pages - 109 - 126     |    Revised - 30-06-2025     |    Published - 01-08-2025
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 19   Issue - 4    |    Publication Date - August 2025  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Tamper Detection, Deep Learning, Traditional Image Processing, Siamese Network, Identity Verification, Image Analysis.
ABSTRACT
Ensuring the integrity and security of identity cards to prevent fraud also to conservate institutional credibility in educational institutions is crucial. This study presents a comparative analysis of traditional image processing techniques and deep learning methods for tamper detection in Nigerian university system identity cards. Traditional methods evaluated include Canny edge detection, histogram comparison, Sobel edge detection, and Laplacian edge detection, while the deep learning method uses a Siamese Network. The dataset, composed of original and tampered identity cards which were generated from original identity cards through blurring, noise addition, shifting, and text alterations, was evaluated using accuracy, precision, recall, F1-score, and ROC AUC metrics. From the results of this study, it was shown that the Siamese network achieved the highest accuracy (80%) with an F1-score of 0.89, while Canny edge detection followed closely with an accuracy of 79% and F1-score of 0.88. Other traditional methods such as Sobel, Laplacian, and Histogram comparison underperformed, achieving accuracies below 30%. The results show that the Siamese network is more effective in detecting subtle tampering and generalizes better on limited datasets compared to traditional methods. Finally, this study concludes that deep learning, specifically the Siamese Network, provides superior accuracy and reliability, making it a more effective solution for tamper detection in Nigerian university identity systems.
REFERENCES
Arevalo Ancona, R. E., Cedillo Hernandez, M., & Garcia Ugalde, F. J. (2024). Robust image tampering detection and ownership authentication using zero watermarking and Siamese neural networks. International Journal of Advanced Computer Science and Applications, 15(10), 436-446. https://doi.org/10.14569/IJACSA.2024.0151046.
Chakraborty, S., Chatterjee, K., & Dey, P. (2024). Detection of image tampering using deep learning, error levels, and noise residuals. Neural Processing Letters, 56(112). https://doi.org/10.1007/s11063-024-11448-9.
Chen, X. (2022). An Overview of Image Tamper Detection. Journal of Information Hiding & Privacy Protection, 4(2). https://doi.org/10.32604/jihpp.2022.039766.
Chennamma, H.R., & Madhushree, B. (2022). A comprehensive survey on image authentication for tamper detection with localization. Multimedia Tools and Applications, 82, 1873-1904. https://doi.org/10.1007/s11042-022-13312-1.
Clark Gnangby, A. O., & ChoukpinAdoto M., S. Y. (2025). Advancing image retrieval through similarity measures using siamese neural networks. International Journal of Engineering Research & Technology (IJERT), 14(1), January 2025.
Du, J., Fu, W., Zhang, Y., & Wang, Z. (2024). Advancements in image recognition: A siamese network approach. Information Dynamics and Applications, 3(2), 89-103. https://doi.org/10.56578/ida030202.
Dupont, F., Laurent, P., Montfort, F., Pierre, H., & Jeanne, L. (2022). A miniaturized and ultra-low-power tamper detection sensor for portable applications. IEEE Sensors Journal, 22(3), 1234-1242. https://doi.org/10.1109/jsen.2022.3143656.
Ghosh, C., Majumder, S., Ray, S., Datta, S., & Mandal, S. N. (2020). Different edge detection techniques: A review. Electronic Systems and Intelligent Computing: Proceedings of ESIC 2020, 885-898. https://doi.org/10.1007/978-981-15-7031-5_84.
Gnangby, C., & Mignonkoun, S.Y. (2025). Advancing image retrieval through similarity measures using Siamese neural networks. International Journal of Engineering Research & Technology, 14(1). https://doi.org/10.17577/IJERTV14IS010034.
Gonzalez, R. C., & Woods, R. E. (2018). Digital Image Processing(4th ed.). Pearson.
Hafemann, L. G., Sabourin, R., & Oliveira, L. S. (2017). Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition, 70, 163-176. https://doi.org/10.1016/j.patcog.2017.05.012.
Hossain, M. S., & Muhammad, G. (2023). Security and privacy issues in biometric authentication systems. Security and Privacy, 3(1), e123.
Hölscher, D., Reich, C., Gut, F., Knahl, M., & Clarke, N. (2024). Exploring the efficacy and limitations of histogram-based fake image detection. Procedia Computer Science, 246, 2882-2891. https://doi.org/10.1016/j.procs.2024.09.382.
Jesí, P. M., & Dhaya, M. D. A. (2023). Face counterfeit detection in national identity cards using image steganography. International Journal of Research and Analytical Reviews, 10(3), 943-947. https://ijrar.org/download.php?file=IJRAR23C1119.pdf.
Kamble, V. B., & Uke, N. J. (2024). Image tampering detection: A review of multi-technique approach from traditional to deep learning. Journal of Dynamics and Control, 8(11), 252-283. https://doi.org/10.71058/jodac.v8i11024.
Kumar, A., & Singh, R. (2019). International Journal of Innovative Science and Creative Ideas (IJISCS), 8(2), 123-130. https://doi.org/10.30534/ijiscs/2019/36822019.
Livieris, I. E., Pintelas, E., Kiriakidou, N., & Pintelas, P. (2023). Explainable image similarity: Integrating siamese networks and Grad-CAM. Journal of Imaging, 9(10), 224. https://doi.org/10.3390/jimaging9100224.
Livieris, I. E., Pintelas, E., Kiriakidou, N., & Pintelas, P. (2023). Explainable image similarity: Integrating Siamese networks and Grad CAM. Journal of Imaging, 9(10), 224. https://doi.org/10.3390/jimaging9100224.
Markoska, R., & Markoski, A. (2022). Digital student ID, identity management, and the Internet of Everything in education during COVID-19. Contemporary Journal of Economics and Finance, 1(1), 43-51.
Shao, Y., Dai, K., & Wang, L. (2024). Image tampering localization network based on multi-class attention and progressive subtraction. Signal, Image and Video Processing, 19(2), 130-145. https://doi.org/10.1007/s11760-024-03622-2.
Sharma, P., Kumar, M., & Sharma, H. (2022). Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: An evaluation. Multimedia Tools and Applications, 82(12), 18117-18150. https://doi.org/10.1007/s11042-022-13808-w.
Sharma, R., Kumar, N., & Singh, S. (2022). Advancements in tamper detection methods for secure identity verification in educational settings. Computational Intelligence and Neuroscience, 2022, 9876543. https://doi.org/10.1155/2022/9876543.
Tan, K., Li, L., & Huang, Q. (2023). Image manipulation detection using the attention mechanism and Faster R-CNN. International Journal of Computer Applications, 50(4), 13-24.
Tehranipoor, M., Pundir, N., Vashistha, N., & Farahmandi, F. (2022). Tamper Detection. In Hardware Security Primitives (pp. 261-279). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-031-19185-5_15.
Wang, Y., & Liu, W. (2020). A study on the effectiveness of digital identity systems in educational institutions. IEEE Access, 8, 10223-10234.
Wei, X., Wu, Y., Dong, F., Zhang, J., & Sun, S. (2019). Developing an image manipulation detection algorithm based on edge detection and Faster R-CNN. Symmetry, 11(10), 1223. https://doi.org/10.3390/sym11101223.
Yang, K., Song, H., Zhang, K., & Liu, Q. (2020). Hierarchical attentive Siamese network for real-time visual tracking. Neural Computing and Applications, 32(18), 14335-14346. https://doi.org/10.1007/s00521-019-04238-1.
Yuan, S., Zhao, W., Deng, J. D., Xia, S., & Li, X. (2024). Quantum image edge detection based on Laplacian of Gaussian operator. Quantum Information Processing, 23, 178. https://doi.org/10.1007/s11128-024-04392-z.
Zanardelli, M., et al. (2023). Image forgery detection: A survey of recent deep-learning approaches. Journal of Visual Communication and Image Representation, 77, 103127. https://doi.org/10.1007/s11042-022-13797-w.
MANUSCRIPT AUTHORS
Mrs. Opeoluwa Omotayo Ajilore
Computer Science Department, Caleb University, Lagos - Nigeria
opeoluwaomotayo@ymail.com
Professor Adewole A. Philip
Department of Computer Sciences, University of Lagos, Akoka, Yaba, Lagos - Nigeria
Dr. Olumoye O. Mosud
School of Business & Technology, Webster University, St. Louis, MO - United States of America
Professor Eludire A. Adekunle
Computer Science Department, Joseph Ayo Babalola University, Osun - Nigeria
Dr. Akanni W. Adeniyi
Computer Science Department, Caleb University, Lagos - Nigeria
Mr. Adegunwa Olajide
Computer Science Department, Caleb University, Lagos - Nigeria


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions