Enhancing The Security of E-Invoicing for Distribution Companies Through Image-Based PDF Conversion and QR Verification

Authors

  • Arief Noor Rochmatullah Institut Teknologi Sepuluh Nopember
  • Ignatius Aris Wibowo Institut Teknologi Sepuluh Nopember
  • Sarwosri Sarwosri Institut Teknologi Sepuluh Nopember

DOI:

https://doi.org/10.30871/jaic.v9i5.9974

Keywords:

E-Invoicing, Distribution Companies, Security, Image-based PDF, QR Code

Abstract

Distribution companies face significant challenges in securing electronic invoices, as PDF files are susceptible to unauthorized text extraction and manipulation. Prior solutions include SHA-256 digital signatures, and QR code-based verification. There are often require specialized tools, stable internet, or user intervention posing barriers for general trade customers with limited digital access. To address these limitations, this study proposes a hybrid e-invoicing method by converting invoices into image-based PDFs embedded with QR codes. This approach enhances document security, increases resistance to text manipulation, and ensures file sizes remain under 1 MB for smooth distribution via WhatsApp. A dataset of 1000 invoices was tested using OCR and FuzzyWuzzy string similarity to compare extractability between text-based and image-based formats. A composite score was calculated by combining file size and manipulation resistance metrics. Results show that image-based PDFs achieve a significantly higher score (0.595) compared to text-based PDFs (0.005), confirming their superiority in terms of size efficiency and data security. The findings demonstrate that this method provides a robust, low-cost, and scalable solution for secure invoice distribution in environments with limited infrastructure and technical literacy.

Downloads

Download data is not yet available.

References

[1] A. K. Tiwari, Z. R. Marak, J. Paul, And A. P. Deshpande, “Determinants Of Electronic Invoicing Technology Adoption: Toward Managing Business Information System Transformation,” Journal Of Innovation And Knowledge, Vol. 8, No. 3, Jul. 2023, Doi: 10.1016/J.Jik.2023.100366.

[2] N. Zaatsiyah, “Implementing Digital Signature With Rsa And Md5 In Securing E-Invoice Document,” 2021.

[3] M. Cagal, “Evaluating The Usability Of Qualified Electronic Signatures: Systematized Use Cases And Design Paradigms.”

[4] S. Suhardi, “Use Of Qrcode And Digital Signature Using The Dsa Method To Authenticate Student Academic Documents,” Journal Of Computer Networks, Architecture And High Performance Computing, Vol. 6, No. 4, Pp. 1913–1921, Oct. 2024, Doi: 10.47709/Cnahpc.V6i4.4765.

[5] M. Fajar, R. Azhar, Y. Anshori, And R. Laila, “Optimization Of Inventory Management With Qr Code Integration And Sequential Search Algorithm: A Case Study In A Regional Revenue Office,” 2025. [Online]. Available: Http://Jurnal.Polibatam.Ac.Id/Index.Php/Jaic

[6] H. T. Ha And A. Horák, “Information Extraction From Scanned Invoice Images Using Text Analysis And Layout Features,” Signal Process Image Commun, Vol. 102, Mar. 2022, Doi: 10.1016/J.Image.2021.116601.

[7] C. Irimia, F. Harbuzariu, I. Hazi, And A. Iftene, “Official Document Identification And Data Extraction Using Templates And Ocr,” In Procedia Computer Science, 2022. Doi: 10.1016/J.Procs.2022.09.214.

[8] Z. Zhang, Y. Ding, R. Li, And K. Chen, “Enhancing Ocr With Line Segmentation Mask For Container Text Recognition In Container Terminal,” Eng Appl Artif Intell, Vol. 133, Jul. 2024, Doi: 10.1016/J.Engappai.2024.108667.

[9] K. Somsuk, “The Special Algorithm Based On Rsa Cryptography For Signing And Verifying Digital Signature,” Heliyon, Vol. 11, No. 4, Feb. 2025, Doi: 10.1016/J.Heliyon.2025.E42481.

[10] S. Jaiswal, “Signature Encryption Using Blockchain,” Int J Eng Adv Technol, Vol. 14, No. 2, Pp. 1–5, Dec. 2024, Doi: 10.35940/Ijeat.B4555.14021224.

[11] A. Baihaqi And O. Candra Briliyant, “Implementation Of Rsa 2048-Bit And Aes 128-Bit For Secure E-Learning Web-Based Application,” 2017. Accessed: Jun. 19, 2025. [Online]. Available: Https://Ieeexplore.Ieee.Org/Stamp/Stamp.Jsp?Tp=&Arnumber=8272903

[12] J. Wang, G. Liu, Y. Chen, And S. Wang, “Construction And Analysis Of Sha-256 Compression Function Based On Chaos S-Box,” Ieee Access, Vol. 9, Pp. 61768–61777, 2021, Doi: 10.1109/Access.2021.3071501.

[13] H. T. Ha And A. Horák, “Information Extraction From Scanned Invoice Images Using Text Analysis And Layout Features,” Signal Process Image Commun, Vol. 102, Mar. 2022, Doi: 10.1016/J.Image.2021.116601.

[14] N. Elmobark, “A Comparative Analysis Of Python Text Matching Libraries: A Multilingual Evaluation Of Capabilities, Performance And Resource Utilization,” International Journal Of Environment, Engineering And Education, Vol. 7, No. 1, Pp. 48–60, Apr. 2025, Doi: 10.55151/Ijeedu.V7i1.188.

[15] K. Vukatana, “Ocr And Levenshtein Distance As A Measure Of Image Quality Accuracy For Identification Documents,” In International Conference On Electrical, Computer, And Energy Technologies, Icecet 2022, Institute Of Electrical And Electronics Engineers Inc., 2022. Doi: 10.1109/Icecet55527.2022.9872824.

[16] M. Pikies And J. Ali, “Analysis And Safety Engineering Of Fuzzy String Matching Algorithms,” Isa Trans, Vol. 113, Pp. 1–8, Jul. 2021, Doi: 10.1016/J.Isatra.2020.10.014.

[17] A. Sharif, D. S. Ginting, And A. D. Dias, “Securing The Integrity Of Pdf Files Using Rsa Digital Signature And Sha-3 Hash Function,” In 2021 International Conference On Data Science, Artificial Intelligence, And Business Analytics, Databia 2021 - Proceedings, Institute Of Electrical And Electronics Engineers Inc., 2021, Pp. 154–159. Doi: 10.1109/Databia53375.2021.9650121.

Downloads

Published

2025-10-04

How to Cite

[1]
A. N. Rochmatullah, I. A. Wibowo, and S. Sarwosri, “Enhancing The Security of E-Invoicing for Distribution Companies Through Image-Based PDF Conversion and QR Verification”, JAIC, vol. 9, no. 5, pp. 2068–2075, Oct. 2025.

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.