Skip to main content

Use of Computer Vision to Authenticate Retail Invoices with the Convolution-Neural Networks

  • Conference paper
  • First Online:
Computer Science and Education. Computer Science and Technology (ICCSE 2023)

Abstract

Digital signatures are a new trend when signing electronic documents in shopping cart platforms. The mundane process involves a login application where a user is authenticated using login credentials and then proceeding to a cart application to produce invoices. In this process, a user is required to authenticate invoices created using a digital signature by using a text input. However, intruders could easily impersonate the user by login to the application and creating a digital signature whereby the authorized user is responsible for invoices created. This impersonation process has caused several breaches in the confidentiality of data. Therefore, this research proposes a system that uses the webcam image of a user in the invoice producing process. The image gathered is validated as a human using a convolutional neural network and then a watermark is created using the system’s date and added to the invoice instead of the current digital signature mechanism. Results demonstrated that the performance of invoice creation was high and less CPU and time was required under high brightness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/aditya1962/BuyGrand.

References

  1. Phillips, P.J., Martin, A., Wilson, C.L., Przybocki, M.: An introduction evaluating biometric systems. Computer 33, 56–63 (2000)

    Article  Google Scholar 

  2. Al-Assam, H., Hassan, W., Zeadally, S.: Automated biometric authentication with cloud computing. Biometric-Based Phys. Cybersecurity Syst., 455–475 (2019)

    Google Scholar 

  3. Hacker extracts crypto key from TPM chip - The H Security: News and Features (2010, 2019-10-08). http://www.h-online.com/security/news/item/Hacker-extracts-crypto-key-from-TPM-chip-927077.html

  4. Latze, C., Ultes-Nitsche, U.: Stronger Authentication in E-Commerce - How to protect even na¨ıve Users against Phishing, Pharming, and MITM attacks. In: Presented at the IASTED International Conference on Communication Systems, Networks, and Applications (CSNA 2007) (2007)

    Google Scholar 

  5. Vangala, R., Sasi, S.: Biometric authentication for e-commerce transaction. In: Presented at the IEEE International Workshop on Imaging Systems and Techniques (IST) (2004)

    Google Scholar 

  6. Conti, V., Militello, C., Sorbello, F., Vitabile, S.: A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems. IEEE Trans. Syst. Man, Cybern. Part C (Appl. Rev.) 40, 384–395 (2010)

    Article  Google Scholar 

  7. Priya, S., Mukesh, R.: Multimodal biometric authentication using back propagation artificial neural network. Int. J. Simul.: Syst. Sci. Technol. (IJSSST) 19, 1–8 (2019)

    Google Scholar 

  8. O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 2021–2040 (2003)

    Article  Google Scholar 

  9. Zhou, K., Ren, J.: PassBio: privacy-preserving user-centric biometric authentication. IEEE Trans. Inf. Forensics Secur. 13, 3050–3063 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sena Seneviratne .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abeysinghe, A., Abeysinghe, A., Seneviratne, S. (2024). Use of Computer Vision to Authenticate Retail Invoices with the Convolution-Neural Networks. In: Hong, W., Kanaparan, G. (eds) Computer Science and Education. Computer Science and Technology. ICCSE 2023. Communications in Computer and Information Science, vol 2023. Springer, Singapore. https://doi.org/10.1007/978-981-97-0730-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0730-0_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0729-4

  • Online ISBN: 978-981-97-0730-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics