Skip to main content

Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

Abstract

To solve the problems of electronic bills being easy to forge, easy to steal, difficult to verify and difficult to locate the position in the process of network transmission, an electronic bill generation method based on format documents is proposed. Combining with traditional electronic seal, digital signature and text watermarking technology, it verifies the integrity of the content of electronic bills and locates the specific tampering location by judging whether the watermark information is complete, thus providing a comprehensive security authentication solution for electronic bill. The experimental results show that the proposed electronic bill generation method is very simple with higher security. It can not only verify the integrity and authenticity of the electronic bill content, but also can support the content authentication in the offline state after being output as a paper-based document, and accurately obtain the specific tampering location information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan, Q., Hu, T.: E-Commerce Security Management. Machine Press, China (2007)

    Google Scholar 

  2. Chen, H.: The impact and influence of electronic bill on China’s bill law. J. Guangdong Inst. Soc. 41(4), 101–107 (2010)

    Google Scholar 

  3. Hung, J.H.: Research on bank electronic document integrity protection based on the watermarking technology. Ph.D. dissertation, Guangdong University of Finance & Economics, China (2010)

    Google Scholar 

  4. Zhang, G.H., Xu, P., Sun, Y.: Automatically generating electronic bill technology and application based on PDF. Comput. Eng. Appl. 9, 3–5 (1999)

    Google Scholar 

  5. Chen, F., Zhang, X., He, H.J.: Watermarking embedding and authentication method of positioning PDF electronic invoice falsification. China patent, 104899822 (2015)

    Google Scholar 

  6. Ding, T.Y.: Design and Implementation of Electronic Bill Management System Based on List manage. M.S. dissertation, East China Normal University, China (2006)

    Google Scholar 

  7. Ma, Z.K.: Construction of the Core Metadata Set of E-invoices. M.S. dissertation, Zhengzhou University of Aeronautics, China (2018)

    Google Scholar 

  8. Fang, H.: Electronic Invoice Trading Platform Design and Implementation Based on the Digital Watermarking Technology. Ph.D. dissertation, Southwest Jiaotong University, China (2016)

    Google Scholar 

  9. Yon, D.C., Jong, W.K., Myyong, H.K.: Efficient preprocessing of XML queries using structured signatures. Inf. Process. Lett. 87(5), 257–264 (2003)

    Google Scholar 

  10. Eric, L.J.L., Chen, R.F.: An XML multi-signature scheme. Appl. Math. Comput. 149(1), 1–14 (2004)

    Google Scholar 

  11. Romaric, T., Stelvio, C., Nadia, B.: Ensuring XML integrity using watermarking techniques. In: Proceedings 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems, pp. 668–674 (2012)

    Google Scholar 

  12. Li, B., Li, W., Chen, Y.Y.: HTML integrity authentication based on fragile digital watermarking. In: Proceedings of ICGC, pp. 322–325 (2009)

    Google Scholar 

  13. Zhang, Z.L., Peng, H., Long, X.Z.: A fragile watermarking scheme based on hash function for web pages. In: Proceedings of 2011 International Conference on Network Computing and Information Security, pp. 417–420 (2011)

    Google Scholar 

  14. Long, X.Z., Peng, H., Zhang, C.L.: A fragile watermarking scheme for tamper-proof of web pages. In: Proceedings of 2009 WASE International Conference on Information Engineering, pp. 155–158 (2009)

    Google Scholar 

  15. Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proceeding of SPIE, Security and Watermarking of Multimedia Contents IV, SanJose, Allfornia, pp. 69l–700 (2002)

    Google Scholar 

  16. Ullah, R., Khan, A., Malik, A.S.: Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput. Electr. Eng. 39(7), 2019–2030 (2013)

    Google Scholar 

  17. Qi, W.F., Guo, W., Zhang, T.: Robust authentication for paper-based text documents based on text watermarking technology. Math. Biosci. Eng. 16(4), 2233–2249 (2019)

    Google Scholar 

  18. Jae, C.Y., Tae, H.H.: Fast normalized cross-correlation. Circ. Syst. Signal Process 28, 819–843 (2008)

    Google Scholar 

Download references

Acknowledgements

This work is supported by National Key R&D Program of China (No. 2017YFB0802700).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, D., Chen, Y., Wang, S., Bai, Y., Zhou, Z. (2021). Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics