F Report
F Report
F Report
on
“Development of Anti-counterfeit System for Product Identification ”
Submitted to the
Savitribai Phule Pune University
In partial fulfillment for the award of the Degree of
Bachelor of Engineering
in
Information Technology
By
Mundkar Praveen (72018302C)
Onkar Gagare (72018056C)
Uday Chitalkar (7207998L)
Rohan Hoval (72018107M)
1
CERTIFICATE
Date:
Place:
This project report has been examined by us as per the Savitribai Phule Pune University,
Pune, requirements at D.Y. PATIL College of Engineering on . . . . . . . . . . . .
2
ACKNOWLEDGEMENT
With immense pleasure, we present the Project report as part of the curriculum of the
B.E. Information Technology Engineering. We wish to thank all the people who gave
us an unending support right from when the idea was conceived.
We express sincere and profound thanks to Mrs. Himani Patel , and Dr. Preeti Patil,
Head Of Department, Information Technology who is ready to help with the most
diverseproblems that they have encountered along the way. We express sincere thanks to
all staff andcolleagues who have helped directly or indirectly in completing this seminar
successful.
3
ABSTRACT
Fake products have been a significant factor in the manufacturing of goods in recent
years. This has an impact on a company’s brand, sales, and bottom line. Blockchain
technology is used to identify genuine goods and identify counterfeit goods. The
distributed, decentralized, and digital ledger that houses transaction data is called
Blockchain technology. Many databases store information in the form of blocks that
are linked together via chains. Blockchain innovation is secure technology, therefore
no block can be altered or compromised. Blockchain technology allows for Customers
or users do not have to rely on other users to vouch for the security of the product.
Quick Response (QR) codes, a developing trend in wireless and mobile technologies,
were used in this project a strong strategy to combat the problem of product
counterfeiting. A QR code scanner is used to identify fake goods because each
product’s QR code is connected to a Blockchain. Therefore, this system may be utilized
to store product information and its produced unique code as database blocks.
It requests the user’s unique code, then checks it against entries in the Blockchain
database. If the code matches, the customer will receive notification; if not, the
consumer will receive notification that the product is a fake.
Annexure
Appendix A
Appendix B
7 References
List of Figures
Sr. No. Name of Figures Page No.
3.1 Waterfall Model
3.2 Timeline Chart
4.1 System Architeture
4.2 Data Flow Diagram
4.3 Data Flow Diagram
4.4 Data Flow Diagram
4.5 Use Case Diagram
4.6 Activity Diagram
4.7 Sequence Diagram
4.8 Class Diagram
CHAPTER 1
INTRODUCTION
1.1MOTIVATION
There The dissemination of counterfeit goods has expanded globally in recent years. The
existingsupply chain contains a large number of counterfeit goods. The survey claims that
occurrences of bogus products have increased recently. It is essential to have a system in
place that allows buyers or users to verify all the product’s specifications so they can
determine whether the item is authentic or not. There is currently no system in place in
India to identify fake goods. Therefore, the solution entails a straightforward QR code-
based identification that can assist theend-user or customers in scanning and verifying the
product’s authenticity using a smartphone.
Risk factors like forging and duplication frequently accompany the global enhancement
of a product or innovation. The reputation of the company and the well-being of the
customer can both be affected by forging. Nowadays, finding fake items is the biggest test.
False goods have aserious negative effect on the organization and the clients’ welfare. As
a result, product makers are facing severe hardship. India and other countries are fighting
against such phoney and counterfeit goods. The suggested framework generates QR
codes by employing Blockchain technology. Blocks are used to hold exchange records in
this innovation. Data stored in these squares cannot easily be accessed or changed. A QR
code can be used to identify bogus goods.
1.2 OBJECTIVES
8
CHAPTER 2
LITERATURE SURVEY
A research paper is a document of a scientific article that contains relevant expertise, including
substantive observations, and also references to a specific subject of philosophy and technique.
Use secondary references are reviewed in literature and no current or initial experimental work
is published.
Abstract :In recent years, blockchain has received increasing attention and numerous
applications have emerged from this technology. A renowned Blockchain application is the
cryptocurrency Bitcoin, thathas not only been effectively solving the double-spending problem
but also it can confirm the legitimacy of transactional records without relying on a centralized
system to do so. Therefore, any application using Blockchain technology as the base
architecture ensures that the contents of its data are tamper-proof. This paper uses the
decentralized Blockchain technology approach to ensure that consumers do not fully rely on
the merchants to determine if products are genuine. We describe a decentralized Blockchain
system with products anti-counterfeiting, in that way manufacturers can use this system to
provide genuine products without having to manage direct-operated stores, which can
significantly reduce the cost of product quality assurance.
9
2. Paper Name:A Block Chain based Management System for Detecting
CounterfeitProduct in Supply Chain
Author: Mrs.M.C.Jayaprasanna, Ms.V.A.Soundharya, Ms.M.Suhana, Dr.S.Sujatha
Abstract :In recent years, Counterfeit goods play a vital role in product manufacturing
industries. This Phenomenon affects the sales and profit of the companies. To ensure the
identification of real products throughout the supply chain, a functional block chain
technology used for preventing product counterfeiting. By using a block chain technology,
consumers do not need to rely on the trusted third parties to know the source of the
purchased product safely. Any application that uses block chain technology as a basic
framework ensures that the data content is ‘tamperresistant’. In view of the fact that a block
chain is the decentralized, distributed and digital ledger that stores transactional records
known as blocks of the public in several databases known as chain across many networks.
Therefore, any involved block cannot be changed in advance, without changing all
subsequent block. In this paper, counterfeit products are detected using barcode reader,
where a barcode of the product linked to a Block Chain Based Management (BCBM) system.
So the proposed system may be used to store product details and unique code of that product
as blocks in database. It collects the unique code from the customer and compares the code
against entries in block chain database. If the code matches, it will give notification to the
customer, otherwise it gets information from the customer about where they bought the
product to detect counterfeit product manufacturer.
10
3. Paper Name: Identifying Counterfeit Products using Blockchain Technology in Supply
Chain System.
Author: Nafisa Anjum,Pramit Dutta
Abstract :With the advent of globalization and the ever growing rate of technology, the
volume of production as well as ease of procuring counterfeit goods has become
unprecedented. Be it food, drug or luxury items, all kinds of industrial manufacturers and
distributors are now seeking greatertransparency in supply chain operations with a view to
deter counterfeiting. This paper introduces a decentralized Blockchain based application
system (DApp) with a view to identifying counterfeit products in the supply chain system.
With the rapid rise of Blockchain technology, it has become known that data recorded
within Blockchain is immutable and secure. Hence, the proposed project here uses this
concept to handle the transfer of ownership of products. A consumer can verify the product
distribution and ownership information scanning a Quick Response (QR) code generated by
the DApp for each product linked to the Blockchain.
11
4. Paper Name: BLOCKCHAIN BASED FAKE PRODUCT IDENTIFICATION SYSTEM
Author Name: Swaroop Jambhulkar, Harsh Bhoyar, Shantanu Dhore, Arpita Bidkar, Prema
DesaiAbstract: There are many fake products in the existing supply chain. It is necessary to
have a systemfor end user to check all details about product that they are buying so that the
customer can check if the product is genuine or not. In recent years, Counterfeit products
play an important role in product manufacturing industries. This affects the company name,
sales, and profit of the companies. Block technology is used to identification of real products
and detects fake products. Blockchain technology is the distributed, decentralized and digital
ledger that stores transactional information in the form of blocks in many database/node-
computers which is connected with the chains. Blockchain technology is secure as the data
stored once in the chain is immutable thereforeany block cannot be changed or hacked. By
using Blockchain technology, customers or users do not need to rely on thirdparty users for
confirmation of product authenticity and safety. Our System provides the emerging
technology of web use cases, Quick Response (QR) codes provide a robust technique to fight
the practice of counterfeiting the products. Counterfeited products can be detectedusing a QR
code scanner, where a QR code of the product is linked to Blockchain. So, this system may
be used to store product details and generated unique code of that product as blocks in
database.It collects the unique code from the user and compares the code against entries in
the Blockchain database. If the code matches, it will give all the information of the product
otherwise no informationwill be outputted to the customer which shows that the product is
fake or counterfeited.
12
5. Paper Name: Fake Product Detection Using Blockchain Technology
Author: Tejaswini Tambe , Sonali Chitalkar , Manali Khurud , Madhavi Varpe , S. Y. Raut
Abstract: In recent years, Counterfeit products play an important role in product
manufacturing industries. This affects the companies name, sales, and profit of the
companies. Blockchaintechnology is used to identification of real products and detects fake
products. Blockchain technology is the distributed, decentralized, and digital ledger that
stores transactional informationin the form of blocks in many databases which is connected
with the chains. Blockchain technology is secure technology therefore any block cannot be
changed or hacked. By using Blockchain technology, customers or users do not need to rely
on third-party users for confirmation of productsafety. In this project, with emerging trends
in mobile and wireless technology, Quick Response (QR) codes provide a robust technique
to fight the practice of counterfeiting the products. counterfeit products are detected using a
QR code scanner, where a QR code of the product is linkedto a Blockchain. So this system
may be used to store product details and generated unique code of that product as blocks in
the database. It collects the unique code from the user and compares the code against entries
in the Blockchain database. If the code matches, it will give a notification to the customer,
otherwise it will give the notification to the customer that the product is fake.
13
CHAPTER 3
SOFTWARE REQUIREMENTSSPECIFICATION
3.1 INTRODUCTION
The global growth of a technology or product is always fraught with risk in the rapidly
evolving world of technology. Forgery and duplication, which can harm a company’s
reputation and financial performance, and client well-being. The main goal of the project is
to confirm that the customer’s purchased item is as described in the fake or genuine We
have the conventional supplychain in comparison to Blockchain. Typical supply chains offer
centralized network where the firmproviding the service or the products holds the data they
control the market and the data, making them vulnerable because they can manipulate it
anyway they like. Blockchain technology aids in addressing the issue of product
counterfeiting. Technology based on Blockchain is more secure. Achain will be constructed
for that product’s transactions once it is stored on the network, making it possible to keep
all transaction records for both the product and its present owner. In the Blockchain, all
transaction histories will be kept as blocks. In the suggested system, each product is given a
generated QR code that the end user can scan. the product’s full details by scanning theQR
code. We can tell whether a product is genuine or phoney by scanning the QR code.
• To track every genuine product that is to be sold. Implement this idea in other fields.
• Virtual transactions. Using tamper-proof tags Dynamic (read & write NFC tags) QR
codes thathave secure graphic
• Implement our own tokens which can be sold to users so that they can purchase
ownership of aproduct using tokens which helps in insurance processional's
14
3.3 USER CLASSES AND CHARACTERISTICS
Fast Accurate prediction: Logos can be identified quickly due to the machine’s ability to
learn from experience with the CNN algorithm. Reduce human errors of identifying whether
the product is original or fake is the right of every purchaser. A Human may err while
selecting the product just by looking at the logo, but Deep Learning (DL) models will
provide accurate results.
Go through these telltale signs that can help you identify an original from a counterfeit, and
makesure you are not taken for a ride.
1. Database: The Personal details of sender and receiver also account details of sender
and receiver are stored in database.
15
3.7 EXTERNAL INTERFACE REQUIREMENT
• RAM : 8 GB
• Hard Disk : 40 GB
16
3.8 NON FUNCTIONAL REQUIREMENT
The performance of the functions and every module must be well. The overall
performance of thesoftware will enable the users to work efficiently.
Performance of encryption of data should be fast.
Performance of the providing virtual environment should be fast Safety Requirement.
The application is designed in modules where errors can be detected
and removed easily.This makes it easier to install and update new
functionality if required.
The application is designed in modules where errors can be detected and fixed
easily.This makes it easier to install and update new functionality if required.
• Our software has many quality attribute that are given below:-
• Availability: This software is freely available to all users. The availability of the
software is easyfor everyone.
• Maintainability: After the deployment of the project if any error occurs then it can
be easilymaintained by the software developer.
17
• Reliability: The performance of the software is better which will increase the
reliability of theSoftware.
• User Friendliness: Since, the software is a GUI application; the output generated is
much userfriendly in its behavior.
• Test ability: The software will be tested considering all the aspects.
Users are authenticated using many security phases so reliable security is provided.
• RAM : 8 GB
• Hard Disk : 40 GB
18
3.9.2 Hardware requirements
19
CHAPTER 4
SYSTEM DESIGN
4.1 SYSTEM ARCHITECTURE
In Data Flow Diagram,we Show that flow of data in our system in DFD0 we
show that base DFD in which rectangle present input as well as output and
circle show our system,In DFD1 we show actual input and actual output of
system input of our system is text or image and output is rumor detected like
wise in DFD 2 we presentoperation of user as well as admin.
20
4.1.1.1 Data Flow Diagram Level 0
21
Fig 4.4 Data flow diagram
22
4.2 UML DIAGRAMS
• Component Diagram.
• Activity Diagram.
• Sequence Diagram.
23
Figure 4.5: Use case Diagram
24
Figure 4.6: Activity Diagram
25
Figure 4.7: Sequence Diagram
26
Figure 4.8: Class Diagram
27
CHAPTER 5
OTHER SPECIFICATION
5.1 ADVANTAGES
• This enables not only customs officials to detect counterfeits, any customer would be
able todo that using the detection app.
• Inexpensive.
• Save time.
• Environmental factors are not an issue.
5.2 LIMITATIONS
• Fake product is a real problem in today’s world, And it has become more extensive and
harderto identify.
• A major challenge in fake news detection is to detect it in the early phase.
• Another challenge in fake product detection is the unavailability or the shortage of
labeled datafor training the detection models.
5.3 APPLICATIONS
• Shops
• Malls
28
CHAPTER 6
CONCLUSION AND FUTUREWORK
6.1 CONCLUSION
With the vast range of products available online, fake items are expanding tremendously.
Therefore, there is a critical need to identify phoney goods, and Blockchain technology is
employed to do so. Additionally, a QR code with the information has been created.
Customers or consumers can identify a phoney product after scanning the QR code. So, in
this article, we talked about a system that helps consumers determine whether a product is
real or not by looking at its entire supply chain history. End users can scan QR codes
assigned to products to access allthe data that has been posted across the supply chain in
the Blockchain, allowing them to determine whether or not a product is genuine or not.
In future,to track every genuine product that is to be sold. Implement this idea in
other fields.Virtual transactions. Using tamper-proof tags Dynamic (read write NFC
tags) QR codes that havesecure graphic Implement our own tokens which can be sold to
users so that they can purchase ownership of a product using tokens which helps in
insurance processing.
29
ANNEXURE
APPENDIX: - A
What is P? • P is set of all decision problems which can be solved in polynomial time by a
deterministic.
• Since it can be solved in polynomial time, it can be verified in polynomial time.
• Therefore P is a subset of NP. P
30
What is NP?
• “NP” means “we can solve it in polynomial time if we can break the normal rules of step-
by-stepcomputing”.
What is NP Hard?
A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-
problem(nondeterministic polynomial time) problem. NP-hard therefore means “at least as hard
as any NP problem,” although it might, in fact, be harder.
Np-Hard:
A CG which is based on word-graph is constructed to organize all information in a sentence
cluster, CG can reduce the size of graph and keep more semantic information than word-graph.
We use beam search and character-level RNNLM to generate readable and informative
summaries from the CG for each sentence cluster, RNNLM is a better model to evaluate
sentence linguistic quality than n-gram language model. the system with CG can generate better
summaries than that with ordinary word-graph.
31
What is NP-Complete? Since this amazing “N” computer can also do anything a normal computer
can,we know that “P” problems are also in “NP”.
• So, the easy problems are in “P” (and “NP”), but the really hard ones are only in “NP”, and
• It is like saying there are things that People can do (“P”), there are things that Super People can do
(“SP”),and there are things only super people can do (“SP complete”).
NP-Complete:
As our system is in developing state so we can’t say that our system is currently in NP complete state
32
APPENDIX B
[1]. G. Vidhya Lakshmi, Subbarao Gogulamudi, Bodapati Nagaeswari, Shaik
Reehana, “Blockchain Based Inventory Management by QR Code Using Open
CV”,
International Conference on Computer Communication and Informatics (ICCCI 2021)
Coimbatore, INDIA,
Jan. 27 – 29, 2021.
[3]. Miguel A. Prada-Delgado, Gero Dittmann, Ilie Circiumaru, Jens Jelitto “A blockchain-
based crypto-anchor platform for interoperable product authentication”, EEE International
Symposium on Circuits and Systems (ISCAS),2021.
[5]. Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, and Huaxiong
Wang, “ABlockchain-Based Application System for Product Anti- Counterfeiting”, IEEE
Access,2020.
33
Chapter 7
References
Publisher: IEEE
Tejaswini Tambe, Sonali Chitalkar 12, Manali Khurud [3], Madhavi Varpe, S. Y. Raut
Sushil Kumar', Vikas Gupta', Yash Pachori', Rishabh Sharma', Anshika Agarwal¹
Ghaziabad, India
Ajay Funde¹, Pranjal Nahar², Ashwini Khilari³, Nikhil Marne, Ms. Nikhita Nerkars
34