ISSN: 04532198 Volume 62, Issue 04, April, 2020 1781 Image Processing Techniques for Identifying Impostor Documents Through Digital Forensic Examination Pawan Shivan Othman 1 , Rasheed Rebar Ihsan 2 , Ridwan B. Marqas 3 , Saman M. Almufti 4* Department of Computer System Ararat Privat Technical Institute Duhok, Kurdistan-Region, Iraq 1 Department of Computer science Duhok Private Technical Institute Duhok, Kurdistan-Region, Iraqia 2,3. Department of Computer science Nawroz University Duhok, Kurdistan-Region, Iraq 4* Corresponding Author: 4* AbstractIn the past few years, the use of digital photography has increased, a development that opens the door to new and innovative ways of creating images. There are now many applications for a day that is used to modify the image so that the image looks like the original. Images are used for any crime as authenticated proof and if this image does not remain real then it will create a problem. Detection of these types of forgeries is now becoming a serious issue. A forgery of copy-move images is done either to hide some image entity, or to add more details that results in forgery. In both cases, reliability for the picture is lost. The digital image processing technique discussed in this paper is MATLAB’s role in detection or in any manipulation of digital images. This study focuses on document analysis such as Passport, Driving License, Certificate, and Employment Card which is widely created for use as proof of identity for various wrongful benefits. The goal of this study entitled is to assist the forensic record expert in the use of digital image processing techniques to implement the manufactured record detection, Segmentation and analysis procedure. KeywordsImage Processing, Otsu Image Segmentation, Canny Edge Detection, Fabricated Documents, Cybercrime. 1. Introduction Cybercrime is increasing at a rate that well exceeds security initiatives, combined with increasingly changing new technology. A digital picture or video is also incontrovertible proof of a crime or evidence of an act of malevolence. Electronic forensics aims to familiarize new methodologies to promote the processing of evidence by looking at a digital material as a visual guide, and to help in making a judgment on the case. Multimedia forensics [1], [2], [3], discusses the manufacture of technical instruments which operate in the absence of watermarks [4], [5] or image signatures. Actually, forensics means, different from digital watermarking, are labeled because "passive," as they can formulate a judgment on a digital document by only resorting to the digital quality itself. Effectively, these techniques allow the consumer to fix if particular content has been tampered with [6], [7], or which method has been used to obtain it [8][9]. The other main subject in multimedia forensics is the manipulation of image recognition [6], which tests the authenticity of a digital image. Information integrity is crucial in a court but the advent of digital images is clear. then the relative simplicity of digital image processing today makes this truth questionable. Furthermore, after it has been determined that somewhat has been altered, it is important to recognize exactly what has happened: whether an object or an entity has been blurred, whether a part of the image has been cloned, whether something has been copied from another image or whether a permutation of those processes has been carried out. Especially when an attacker produces his feigned image by cloning a picture region to another zone (copy- move attack), he is often forced to apply a geometric transformation to achieve his objective satisfactorily. Digital Image Forensics is the multimedia security division that aims, together with Digital Watermarking, to contrast and exposes malicious image manipulation [10]. The fake report is often used in criminal as well as