Enhancing The Security of E-Invoicing for Distribution Companies Through Image-Based PDF Conversion and QR Verification
DOI:
https://doi.org/10.30871/jaic.v9i5.9974Keywords:
E-Invoicing, Distribution Companies, Security, Image-based PDF, QR CodeAbstract
Distribution companies face significant challenges in securing electronic invoices, as PDF files are susceptible to unauthorized text extraction and manipulation. Prior solutions include SHA-256 digital signatures, and QR code-based verification. There are often require specialized tools, stable internet, or user intervention posing barriers for general trade customers with limited digital access. To address these limitations, this study proposes a hybrid e-invoicing method by converting invoices into image-based PDFs embedded with QR codes. This approach enhances document security, increases resistance to text manipulation, and ensures file sizes remain under 1 MB for smooth distribution via WhatsApp. A dataset of 1000 invoices was tested using OCR and FuzzyWuzzy string similarity to compare extractability between text-based and image-based formats. A composite score was calculated by combining file size and manipulation resistance metrics. Results show that image-based PDFs achieve a significantly higher score (0.595) compared to text-based PDFs (0.005), confirming their superiority in terms of size efficiency and data security. The findings demonstrate that this method provides a robust, low-cost, and scalable solution for secure invoice distribution in environments with limited infrastructure and technical literacy.
Downloads
References
[1] A. K. Tiwari, Z. R. Marak, J. Paul, And A. P. Deshpande, “Determinants Of Electronic Invoicing Technology Adoption: Toward Managing Business Information System Transformation,” Journal Of Innovation And Knowledge, Vol. 8, No. 3, Jul. 2023, Doi: 10.1016/J.Jik.2023.100366.
[2] N. Zaatsiyah, “Implementing Digital Signature With Rsa And Md5 In Securing E-Invoice Document,” 2021.
[3] M. Cagal, “Evaluating The Usability Of Qualified Electronic Signatures: Systematized Use Cases And Design Paradigms.”
[4] S. Suhardi, “Use Of Qrcode And Digital Signature Using The Dsa Method To Authenticate Student Academic Documents,” Journal Of Computer Networks, Architecture And High Performance Computing, Vol. 6, No. 4, Pp. 1913–1921, Oct. 2024, Doi: 10.47709/Cnahpc.V6i4.4765.
[5] M. Fajar, R. Azhar, Y. Anshori, And R. Laila, “Optimization Of Inventory Management With Qr Code Integration And Sequential Search Algorithm: A Case Study In A Regional Revenue Office,” 2025. [Online]. Available: Http://Jurnal.Polibatam.Ac.Id/Index.Php/Jaic
[6] H. T. Ha And A. Horák, “Information Extraction From Scanned Invoice Images Using Text Analysis And Layout Features,” Signal Process Image Commun, Vol. 102, Mar. 2022, Doi: 10.1016/J.Image.2021.116601.
[7] C. Irimia, F. Harbuzariu, I. Hazi, And A. Iftene, “Official Document Identification And Data Extraction Using Templates And Ocr,” In Procedia Computer Science, 2022. Doi: 10.1016/J.Procs.2022.09.214.
[8] Z. Zhang, Y. Ding, R. Li, And K. Chen, “Enhancing Ocr With Line Segmentation Mask For Container Text Recognition In Container Terminal,” Eng Appl Artif Intell, Vol. 133, Jul. 2024, Doi: 10.1016/J.Engappai.2024.108667.
[9] K. Somsuk, “The Special Algorithm Based On Rsa Cryptography For Signing And Verifying Digital Signature,” Heliyon, Vol. 11, No. 4, Feb. 2025, Doi: 10.1016/J.Heliyon.2025.E42481.
[10] S. Jaiswal, “Signature Encryption Using Blockchain,” Int J Eng Adv Technol, Vol. 14, No. 2, Pp. 1–5, Dec. 2024, Doi: 10.35940/Ijeat.B4555.14021224.
[11] A. Baihaqi And O. Candra Briliyant, “Implementation Of Rsa 2048-Bit And Aes 128-Bit For Secure E-Learning Web-Based Application,” 2017. Accessed: Jun. 19, 2025. [Online]. Available: Https://Ieeexplore.Ieee.Org/Stamp/Stamp.Jsp?Tp=&Arnumber=8272903
[12] J. Wang, G. Liu, Y. Chen, And S. Wang, “Construction And Analysis Of Sha-256 Compression Function Based On Chaos S-Box,” Ieee Access, Vol. 9, Pp. 61768–61777, 2021, Doi: 10.1109/Access.2021.3071501.
[13] H. T. Ha And A. Horák, “Information Extraction From Scanned Invoice Images Using Text Analysis And Layout Features,” Signal Process Image Commun, Vol. 102, Mar. 2022, Doi: 10.1016/J.Image.2021.116601.
[14] N. Elmobark, “A Comparative Analysis Of Python Text Matching Libraries: A Multilingual Evaluation Of Capabilities, Performance And Resource Utilization,” International Journal Of Environment, Engineering And Education, Vol. 7, No. 1, Pp. 48–60, Apr. 2025, Doi: 10.55151/Ijeedu.V7i1.188.
[15] K. Vukatana, “Ocr And Levenshtein Distance As A Measure Of Image Quality Accuracy For Identification Documents,” In International Conference On Electrical, Computer, And Energy Technologies, Icecet 2022, Institute Of Electrical And Electronics Engineers Inc., 2022. Doi: 10.1109/Icecet55527.2022.9872824.
[16] M. Pikies And J. Ali, “Analysis And Safety Engineering Of Fuzzy String Matching Algorithms,” Isa Trans, Vol. 113, Pp. 1–8, Jul. 2021, Doi: 10.1016/J.Isatra.2020.10.014.
[17] A. Sharif, D. S. Ginting, And A. D. Dias, “Securing The Integrity Of Pdf Files Using Rsa Digital Signature And Sha-3 Hash Function,” In 2021 International Conference On Data Science, Artificial Intelligence, And Business Analytics, Databia 2021 - Proceedings, Institute Of Electrical And Electronics Engineers Inc., 2021, Pp. 154–159. Doi: 10.1109/Databia53375.2021.9650121.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Arief Noor Rochmatullah, Ignatius Aris Wibowo, Sarwosri Sarwosri

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).








