A Review of Anti-Forgery Technologies for Official Identification Documents: Trends, Challenges, and Future Directions

Authors

  • Ibrahim Fawzi Al-Iraqia University Author

DOI:

https://doi.org/10.65204/djes.v3i1.525

Keywords:

Identification Document Security , Multi-Layer Authentication , QR code Security , Elliptic Curve Cryptography (ECC) , Physical-Digital Security Integration

Abstract

Recent advancements in securing official identity documents against forgery, from 2021 to the present, can be categorized into three key research areas: deep learning for forgery detection, cryptographic verification systems, and QR code security enhancements. While significant progress has been made in each area, these developments often occur in isolation, leading to vulnerabilities against complex hybrid attacks that exploit the disconnect between physical security features and digital verification methods. The literature reveals a notable gap in creating a cohesive framework that integrates tamper-evident physical features, like Guilloche patterns, with robust digital authentication mechanisms such as elliptic curve cryptography and secure data carriers like QR codes. The authors advocate for future research to focus on developing unified, multilayered security frameworks that prioritize scalability, interoperability, and usability. Such holistic approaches are essential to combat the rising sophistication and frequency of forgeries, ultimately restoring trust in both digital and physical identification forms.

References

Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for

Video Technology, 14(1), 4-20.

J. Muñoz-Haro, R. Tolosana, J. Fierrez, R. Vera-Rodriguez, and A. Morales, “Privacy-aware detection of fake identity documents:

methodology, benchmark, and improved algorithms (FakeIDet2),” Information Fusion, vol. 128, p. 103969, Apr. 2026, doi:

1016/j.inffus.2025.103969.

Ferrara, M., Franco, A., & Maltoni, D. (2016). The magic passport. In IEEE International Joint Conference on Biometrics (IJCB) (pp.

-7).

Picard, J. (2021). Counterfeit detection of variable data using serialized QR codes with copy detection patterns. In Proceedings of the

ACM Workshop on Information Hiding and Multimedia Security (pp. 1-12).

Zhao, L. (2021). Deep Learning-based Forgery Attack on Document Images. In IEEE/CVF Conference on Computer Vision and Pattern

Recognition (CVPR) Workshops.

Van Renesse, R. L. (2005). Optical document security. In Optical Security and Counterfeit Deterrence Techniques V (Vol. 5310, pp. 1

. SPIE.

Dijlah Journal of Engineering Science (DJES)

Vol. ????, No. ?????, Month, 2025, pp. ???-???

ISSN: Printed: 3078-9656, Online: 3078-9664, paper ID: ????

Boonkrong, S. (2024). The Use of Cryptographic Hash Function for the Detection of Modification in Digital Academic

Documents. Journal of Information Security and Applications, 103784.

Johnson, D., Menezes, A., & Vanstone, S. (2001). The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of

Information Security, 1(1), 36-63.

Wang, T., & Chen, Y. (2023). Texture-hidden QR code for anti-counterfeiting. Springer Multimedia Tools and Applications, 82(5),

-6802.

Al-Ghadi, M., et al. (2023). FMIDV: A Dataset for Identity Document Forgery Detection and Localization. In IEEE International

Conference on Image Processing (ICIP).

Cybersecurity Ventures. (2025). Official Cybercrime Report. [Online]. Available: https://cybersecurityventures.com/official

cybercrime-report-2025/

Lam, L. (2019). Man forged documents including NUS degree to get work, snagging 38 jobs in 4 years. Channel News Asia “https://

www. chann elnew sasia. com/ singa pore/ man- forge- docum ents- nus- degree- get- jobs- 38- compa nies- 890881”.

R. A. Khan and S. A. Lone, “A comprehensive study of document security system, open issues and challenges,” Multimedia Tools and

Applications, vol. 80, no. 5, pp. 7039–7061, Feb. 2021, doi: 10.1007/s11042-020-10061-x.

J. Jenis, J. Ondriga, S. Hrcek, and E. Sádovský, “Mechanical Design of a Device for Automatic Implementation of Security Features on

Passports,” in Transportation Research Procedia, Elsevier B.V., 2023, pp. 538–546. doi: 10.1016/j.trpro.2023.11.179.

I. Marin-Aguilar, L. A. Chavarria-Zamora, and L. Araya-Martinez, “A practical approach to validate the authenticity of identity

documents,” in 2022 IEEE Latin America Electron Devices Conference, LAEDC 2022, Institute of Electrical and Electronics Engineers

Inc., 2022. doi: 10.1109/LAEDC54796.2022.9908240.

N. Challa, A. Shende, and M. Mullapudi, “Enhancing Document Verification Systems: A Review of Techniques, Challenges, and

Practical Implementations,” International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 1, pp. 16–25, 2024,

doi: 10.17605/OSF.IO/HVQ8E.

A. Abu-Jassar, V. Manakov, and M. Al-Abdallat, “Features of the Formation of Guilloche Rosettes.” Journal of Universal Science

Research, ISSN: 2181-4570 2023, 1(12), 129–138

M. Al-Ghadi, Z. Ming, P. Gomez-Krämer, and J.-C. Burie, “Identity Documents Authentication based on Forgery Detection of Guilloche

Pattern,” Jun. 2022, [Online]. Available: http://arxiv.org/abs/2206.10989

Denso Wave, "QR Code essentials," 2022. [Online]. Available: https://www.denso-wave.com/en/technology/vol1.html

M. A. U. Naser, E. T. Jasim, and H. M. Al-Mashhadi, “QR code based two-factor authentication to verify paper-based documents,”

Telkomnika (Telecommunication Computing Electronics and Control), vol. 18, no. 4, pp. 1834–1842, 2020, doi:

12928/TELKOMNIKA.V18I4.14339.

H. E. Michail, G. S. Athanasiou, G. Theodoridis, A. Gregoriades, and C. E. Goutis, “Design and implementation of totally-self checking

SHA-1 and SHA-256 hash functions’ architectures,” Microprocessors and Microsystems, vol. 45, pp. 227–240, Sep. 2016, doi:

1016/j.micpro.2016.05.011.

R. Roshdy, M. Fouad, and M. Aboul-Dahab, “DESIGN AND IMPLEMENTATION A NEW SECURITY HASH ALGORITHM

BASED ON MD5 AND SHA-256,” 2013.

B. P. Kavin and S. Ganapathy, “A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves,”

International Arab Journal of Information Technology, vol. 18, no. 2, pp. 180–190, 2021, doi: 10.34028/IAJIT/18/2/6.

W. Cao, H. Shi, H. Chen, and Y. Wang, “A new weak curve fault attack on ECIES: embedded point validation is not enough during

decryption.”, Chinese Academy of Sciences, Beijing 100190, China, 2021.

K. B. Bulatov, P. v. Bezmaternykh, D. P. Nikolaev, and V. v. Arlazarov, “Towards a unified framework for identity documents analysis

and recognition,” Computer Optics, vol. 46, no. 3, pp. 436–454, May 2022, doi: 10.18287/2412-6179-CO-1024.

A. F. Mae Muelan, K. G. Marie Decomotan, and J. N. Lebuna, “Student ID Validation Monitoring System.”

P. Sharma and N. Bhatnagar, “Passenger Authentication and Ticket Verification at Airport using QR Code Scanner,” SKIT Research

Journal, vol. 13, p. 2023, doi: 10.47904/IJSKIT.13.2.2023.10-13.

C. Irimia, F. Harbuzariu, I. Hazi, and A. Iftene, “Official Document Identification and Data Extraction using Templates and OCR,” in

Procedia Computer Science, Elsevier B.V., 2022, pp. 1571–1580. doi: 10.1016/j.procs.2022.09.214.

R. Sukhija, M. Kumar, and M. K. Jindal, “Document forgery detection: a comprehensive review,” International Journal of Data Science

and Analytics, vol. 20, no. 5, pp. 4385–4407, Oct. 2025, doi: 10.1007/s41060-025-00723-0.

Q. Wang, A. Ge, X. Chen, J. Wu, S. Liu, and D. Zhu, “Text information security protection method based on computer-generated

holograms,” Applied Optics, vol. 63, no. 15, p. 4165, May 2024, doi: 10.1364/ao.523616.

Dijlah Journal of Engineering Science (DJES)

Vol. ????, No. ?????, Month, 2025, pp. ???-???

ISSN: Printed: 3078-9656, Online: 3078-9664, paper ID: ????

M. Al-Ghadi, Z. Ming, P. Gomez-Kramer, J. C. Burie, M. Coustaty, and N. Sidere, “Guilloche Detection for ID Authentication: A

Dataset and Baselines,” in 2023 IEEE 25th International Workshop on Multimedia Signal Processing, MMSP 2023, Institute of

Electrical and Electronics Engineers Inc., 2023. doi: 10.1109/MMSP59012.2023.10337681.

A. K. Jain, K. Nandakumar, and A. Ross, “50 years of biometric research: Accomplishments, challenges, and opportunities,” Pattern

Recognition Letters, vol. 79, pp. 80–105, Aug. 2016, doi: 10.1016/j.patrec.2015.12.013.

J. Nasereddin and A. A. Salem, “Enhancing Printed Document Security with QR Code-Based Digital Signatures,” in 2024 25th

International Arab Conference on Information Technology, ACIT 2024, Institute of Electrical and Electronics Engineers Inc., 2024. doi:

1109/ACIT62805.2024.10877207.

W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Pearson, 2017.

M. Stevens, P. Karpman, and T. Peyrin, "The first collision for full SHA-1," in Adv. Cryptol. – CRYPTO, 2016, pp. 570–596.

Y. Yan, “The Overview of Elliptic Curve Cryptography (ECC),” in Journal of Physics: Conference Series, Institute of Physics, 2022.

doi: 10.1088/1742-6596/2386/1/012019.

S. Gonzalez and J. E. Tapia, “Forged presentation attack detection for ID cards on remote verification systems,” Pattern Recognition,

vol. 162, Jun. 2025, doi: 10.1016/j.patcog.2025.111352.

T. Necsoiu, G. Bostan, P. Sterian, and M. Berteanu, “MATERIALS FOR SECURITY ELEMENTS USED IN PROTECTED

DOCUMENTS, OPTICAL EXAMINATION METHODS. A REVIEW,” 2017.

D. M. Elmahal, A. S. Ahmad, A. T. Alomaier, R. F. Abdlfatah, and D. M. Hussein, “Comparative study between hologram technology

and augmented reality,” Journal of Information Technology Management, vol. 12, no. 2, pp. 90–106, 2020, doi:

22059/JITM.2020.75794.

A. Mukundan, Y. M. Tsao, F. C. Lin, and H. C. Wang, “Portable and low-cost hologram verification module using a snapshot-based

hyperspectral imaging algorithm,” Scientific Reports, vol. 12, no. 1, Dec. 2022, doi: 10.1038/s41598-022-22424-5.

Z. Dong and P. A. Levkin, “3D Microprinting of Super-Repellent Microstructures: Recent Developments, Challenges, and

Opportunities,” Advanced Functional Materials, vol. 33, no. 39. John Wiley and Sons Inc, Sep. 26, 2023. doi: 10.1002/adfm.202213916.

J. Patadiya, M. Naebe, X. Wang, G. Joshi, and B. Kandasubramanian, “Emerging 4D printing strategies for on-demand local actuation

& micro printing of soft materials,” European Polymer Journal, vol. 184. Elsevier Ltd, Feb. 07, 2023. doi:

1016/j.eurpolymj.2022.111778.

F. Mayer, S. Richter, J. Westhauser, E. Blasco, C. Barner-Kowollik, and M. Wegener, “A P P L I E D P H Y S I C S Multimaterial 3D

laser microprinting using an integrated microfluidic system,” 2019. [Online]. Available: https://www.science.org

P. Kadian, S. M. Arora, and N. Arora, “Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey,”

Wireless Personal Communications, vol. 118, no. 4. Springer, pp. 3225–3249, Jun. 01, 2021. doi: 10.1007/s11277-021-08177-w.

H. M. Al-Dabbas, R. A. Azeez, and A. E. Ali, “Digital Watermarking, Methodology, Techniques, and Attacks: A Review,” Iraqi Journal

of Science, vol. 64, no. 8, pp. 4169–4186, 2023, doi: 10.24996/ijs.2023.64.8.37.

Z. Wang et al., “Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography,” Apr. 2023, [Online].

Available: http://arxiv.org/abs/2107.09287

P. Wyatt, “Work in progress: Demystifying PDF through a machine-readable definition,” 2021. [Online]. Available:

https://www.pdfa.org/iso-32000-normative-references/

G. Casella, B. Bigliardi, and E. Bottani, “The evolution of RFID technology in the logistics field: A review,” in Procedia Computer

Science, Elsevier B.V., 2022, pp. 1582–1592. doi: 10.1016/j.procs.2022.01.359.

A. Haibi, K. Oufaska, K. el Yassini, M. Boulmalf, and M. Bouya, “Systematic Mapping Study on RFID Technology,” IEEE Access,

vol. 10, pp. 6363–6380, 2022, doi: 10.1109/ACCESS.2022.3140475.

M. M. Mijwil, Kamal Kant Hiran, Ruchi Doshi, and Omega John Unogwu, “Advancing Construction with IoT and RFID Technology

in Civil Engineering: A Technology Review,” Al-Salam Journal for Engineering and Technology, vol. 2, no. 2, pp. 54–62, Mar. 2023,

doi: 10.55145/ajest.2023.02.02.007.

Anita Sondhi and Dr. Ravindra Kumar, “QR Codes in Education : A Review,” International Journal of Scientific Research in Science

and Technology, pp. 193–205, Feb. 2022, doi: 10.32628/ijsrst229118.

K. Rotsios, A. Konstantoglou, D. Folinas, T. Fotiadis, L. Hatzithomas, and C. Boutsouki, “Evaluating the Use of QR Codes on Food

Products,” Sustainability (Switzerland), vol. 14, no. 8, Apr. 2022, doi: 10.3390/su14084437.

M. Imanullah and Y. Reswan, “Randomized QR-code scanning for a low-cost secured attendance system,” International Journal of

Electrical and Computer Engineering, vol. 12, no. 4, pp. 3762–3769, Aug. 2022, doi: 10.11591/ijece.v12i4.pp3762-3769.

D. Diemert, K. Gellert, T. Jager, and L. Lyu, “More Efficient Digital Signatures with Tight Multi-User Security.”

Dijlah Journal of Engineering Science (DJES)

Vol. ????, No. ?????, Month, 2025, pp. ???-???

ISSN: Printed: 3078-9656, Online: 3078-9664, paper ID: ????

Y. Peng, Q. Feng, D. B. He, and M. Luo, “A survey on threshold digital signature schemes,” Frontiers of Computer Science, vol. 20,

no. 4. Higher Education Press Limited Company, Apr. 01, 2026. doi: 10.1007/s11704-025-41297-1.

J. Chia, J. J. Chin, and S. C. Yip, “Digital signature schemes with strong existential unforgeability,” F1000Research, vol. 10. F1000

Research Ltd, 2021. doi: 10.12688/f1000research.72910.1.

R. A. Khan, S. U. Khan, H. U. Khan, and M. Ilyas, “Systematic Literature Review on Security Risks and its Practices in Secure Software

Development,” IEEE Access, vol. 10. Institute of Electrical and Electronics Engineers Inc., pp. 5456–5481, 2022. doi:

1109/ACCESS.2022.3140181.

L. Dong, W. Liang, and R. Wang, “Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale

Attention,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 3495–3507, Feb. 2024, doi: 10.1109/TCE.2024.3367947.

M. Sirajudeen and R. Anitha, “Forgery document detection in information management system using cognitive techniques,” Journal of

Intelligent and Fuzzy Systems, vol. 39, no. 6, pp. 8057–8068, 2020, doi: 10.3233/JIFS-189128.

Y. Y. Bae, D. J. Cho, and K. H. Jung, “A New Log-Transform Histogram Equalization Technique for Deep Learning-Based Document

Forgery Detection,” Symmetry, vol. 17, no. 3, Mar. 2025, doi: 10.3390/sym17030395.

M. N. Chapel, M. Al-Ghadi, and J. C. Burie, “Authentication of Holograms with Mixed Patterns by Direct LBP Comparison,” in 2023

IEEE 25th International Workshop on Multimedia Signal Processing, MMSP 2023, Institute of Electrical and Electronics Engineers

Inc., 2023. doi: 10.1109/MMSP59012.2023.10337669.

N. Wang, L. Zhang, T. Jiang, and T. Shen, “Anti-tampering method of QR code hidden information based on deep learning,” Signal,

Image and Video Processing, vol. 19, no. 4, Apr. 2025, doi: 10.1007/s11760-025-03867-5.

N. J. Hamad, A. A. Abdulhameed, and M. H. Ali, “Enhancing Security and Efficiency through QR Integration with Hybrid AES-ECC

Algorithm in Mobile Apps for Cardless Data Transactions,” Al-Iraqia Journal for Scientific Engineering Research, vol. 2, no. 4, pp.

–114, Dec. 2023, doi: 10.58564/ijser.2.4.2023.124.

Kunekar, pankaj and Chandawar, Rachit and others, Optimizing Cryptographic and Image hashing for document verification (January

, 2025). Proceedings of the International Conference on Innovative Computing & Communication (ICICC 2024), Available at SSRN:

https://ssrn.com/abstract=5112131 or http://dx.doi.org/10.2139/ssrn.5112131.

A. Diarra, T. F. Bissyande, and P. Poda, “Doc-Patch: An Unsupervised Approach for Documents Forgery Detection,” in ACAI 2024 -

7th International Conference on Algorithms, Computing and Artificial Intelligence, Institute of Electrical and Electronics

Engineers Inc., 2024. doi: 10.1109/ACAI63924.2024.10899704.

Downloads

Published

2026-03-22