当前位置:主页 > 经济论文 > 电子商务论文 >

结合QR码的电子发票图像认证水印算法研究

发布时间:2018-12-30 21:52
【摘要】:发票是企业会计记账和纳税申报的原始凭证,随着电子商务的发展,纸质发票与电子商务交易的即时、快速已不相适应。电子发票的推行有助于节能环保、规范税费管理、降低运行成本、提高运营效率,但是电子发票造假行为也日益猖獗,为实现电子发票图像真的实性认证,本文以数字水印技术为基础,设计了一种结合QR码的电子发票图像认证水印算法。论文首先对研究意义与背景进行了介绍,指出根据票面构成特点,将电子发票图像的真实性认证分为QR码区域和非QR码区域两部分,在实现双重认证的同时,提高了认证效率。主要研究内容为以下两个方面:(1)基于QR图像的隐写,改进算法基于两个特点提出:黑白模块比例接近1:1、解码时允许每个模块有一定范围内的偏差。为便于网络传输及存储,选择以二值图像为研究对象;为了保证载密图像能被正确解码,在允许范围内调整模块的边界;为了图像的增大隐写容量,在模块交界处嵌入秘密信息;为了增强算法的安全性,以密钥控制秘密信息的嵌入位置。也即本文算法是通过调整黑白模块的边界的方法,将秘密信息嵌入模块交界处,并以密钥控制嵌入位置。实验结果表明,本文算法在隐写容量、抗缩放攻击方面的性能表现要优于现有算法,但是对打印扫描攻击不具有抵抗性。(2)根据电子发票图像特点,选取GIF格式的发票图像为研究对象。第一重认证:将电子发票信息作为水印嵌入QR图像实现篡改检测。第二重认证:结合发票图像颜色信息有限的特征,将调色板进行重写扩充,通过改变索引矩阵的方式嵌入水印,达到了较好的人眼“不可见”。首先对图像分块分类,对每一图像块生成认证水印并嵌入自身块;仅对每一个重要类图像块以“二值化”的方式生成恢复水印,并基于密钥将其嵌入在两个非重要类图像块内。对于只需要认证发票真实性的场合,可以仅进行第一重认证,如果需要进行定位与恢复,再继续进行第二重认证,可以大大提高认证效率。论文的最后,针对本文的研究成果设计了一个可视化人机互动仿真系统。
[Abstract]:Invoice is the original proof of accounting and tax declaration. With the development of electronic commerce, the paper invoice is not suitable for the transaction of electronic commerce. The implementation of electronic invoice is helpful to save energy and environmental protection, standardize tax and fee management, reduce operation cost and improve operation efficiency. However, electronic invoice fraud is becoming increasingly rampant, in order to realize real authentication of electronic invoice image. Based on digital watermarking technology, a digital invoice image authentication watermarking algorithm combined with QR code is designed in this paper. This paper first introduces the significance and background of the research, and points out that the authenticity authentication of electronic invoice image is divided into two parts: QR code area and non-QR code area according to the characteristics of face structure. The authentication efficiency is improved while double authentication is realized. The main research contents are as follows: (1) based on the steganography of QR images, the improved algorithm is proposed based on two characteristics: black and white module ratio is close to 1: 1, and each module is allowed to have a certain range of deviations when decoding. In order to facilitate network transmission and storage, the binary image is chosen as the research object, and the boundary of the module is adjusted within the allowable range in order to ensure that the carrier image can be decoded correctly. In order to increase the steganography capacity of the image, the secret information is embedded at the junction of the module, and in order to enhance the security of the algorithm, the embedding position of the secret information is controlled by the key. In other words, by adjusting the boundary of the black and white module, the secret information is embedded in the interface of the module, and the embedding position is controlled by the key. Experimental results show that the performance of this algorithm in steganography capacity and resistive scaling attack is better than that of existing algorithms, but it is not resistant to print scan attack. (2) according to the characteristics of electronic invoice image, The invoice image in GIF format is selected as the research object. First authentication: the electronic invoice information is embedded into QR image as watermark to implement tampering detection. Second authentication: combining with the limited color information of invoice image, the palette is rewritten and expanded, and the watermark is embedded by changing the index matrix to achieve a better "invisible" human eye. Firstly, the authentication watermark is generated for each image block and embedded into its own block. Only the watermark is generated "binary" for each important class image block, and embedded in two non-important class image blocks based on the key. For the situation that only needs to authenticate the authenticity of invoice, we can only carry out the first authentication. If we need to locate and restore, and then continue to carry on the second authentication, the efficiency of authentication can be greatly improved. At the end of this paper, a visual man-machine interactive simulation system is designed according to the research results of this paper.
【学位授予单位】:西南交通大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP309.7

【相似文献】

相关期刊论文 前10条

1 郑海红;王义峰;孔月萍;曾平;;基于变阈值量化误差分散的半调水印算法[J];华中科技大学学报(自然科学版);2007年02期

2 郗艳华;张敏瑞;;一种基于图像平滑性的脆弱性文档水印算法[J];西北师范大学学报(自然科学版);2011年04期

3 高珍;张伟;张志浩;;一种新的基于图块分类的水印算法[J];计算机工程;2005年24期

4 钱书胜;杨红梅;;基于人类视觉系统的水印容量分析[J];计算机应用与软件;2008年05期

5 张立忠;张颜;;水印容量对数据库水印可靠性的影响[J];科学技术与工程;2012年33期

6 姚俊,郭雷,马松辉;一种提高数字水印容量的方法[J];计算机工程;2003年08期

7 肖俊;王颖;李象霖;;带失真补偿的抖动调制水印算法中的补偿因子研究[J];电子学报;2007年04期

8 孙劲光;苗锡奎;张语涵;;双重变换域和水印划分策略的鲁棒盲水印方案[J];计算机工程与应用;2011年07期

9 李国波;陈钢;裴颂文;曹文君;吴百锋;;基于图像特征聚类的自嵌入水印算法[J];小型微型计算机系统;2011年03期

10 吴清乐;彭代渊;;基于离散傅里叶变换的数字全息水印[J];计算机应用;2013年03期

相关会议论文 前2条

1 陈明刚;孙星明;肖湘蓉;;基于小波变换的关系数据库水印算法[A];第七届全国信息隐藏暨多媒体信息安全学术大会论文集[C];2007年

2 汤礼;袁开国;伍淳华;;一种基于重排的ELF文件水印方案[A];2012年全国网络与数字内容安全学术年会论文集[C];2012年

相关博士学位论文 前1条

1 安玲玲;数字图像无损信息隐藏方法研究[D];西安电子科技大学;2011年

相关硕士学位论文 前4条

1 曹媛;结合QR码的电子发票图像认证水印算法研究[D];西南交通大学;2016年

2 徐富治;小波域水印算法及水印容量的研究[D];燕山大学;2010年

3 钱书胜;数字图像水印容量研究[D];山东科技大学;2008年

4 支策;PDF水印版权保护系统设计与实现[D];北京邮电大学;2013年



本文编号:2396208

资料下载
论文发表

本文链接:https://www.wllwen.com/jingjilunwen/dianzishangwulunwen/2396208.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户727e1***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com