0% found this document useful (0 votes)
55 views4 pages

System For Identifying Fake Product Using Blockchain Technology

op

Uploaded by

deshmukhneha833
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views4 pages

System For Identifying Fake Product Using Blockchain Technology

op

Uploaded by

deshmukhneha833
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Proceedings of the Seventh International Conference on Communication and Electronics Systems (ICCES 2022)

IEEE Xplore Part Number: CFP22AWO-ART; ISBN: 978-1-6654-9634-6

System for Identifying Fake Product using


Blockchain Technology
2022 7th International Conference on Communication and Electronics Systems (ICCES) | 978-1-6654-9634-6/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICCES54183.2022.9835866

Roshan Jadhav Altaf Shaikh Dr. M . A.Jawale


Department of Information Technology Department of Information Technology Department of Information Technology
Sanjivani College of Engineering, Sanjivani College of Engineering, Sanjivani College of Engineering,
Savitribai Phule Pune University, Savitribai Phule Pune University, Savitribai Phule Pune University,
Pune, India Pune, India Pune, India
[email protected] [email protected] [email protected]

Dr. A.B. Pawar *P. William


Department of Computer Engineering Department of Information Technology
Sanjivani College of Engineering, Sanjivani College of Engineering,
Savitribai Phule Pune University, Savitribai Phule Pune University,
Pune, India Pune, India
[email protected] [email protected]

Abstract—Counterfeit items have become more prevalent in ledger system that uses an immutable cryptographic
the industrial industry in recent years. This has an effect on the signature known as a hash to record transactions [4-5].
company's name, sales, and profit. Blockchain technology is
used to authenticate and identify counterfeit items. The blockchain will keep all transaction data in the form o f
Using blockchain technology, transactions are recorded in
blocks. A QR code generated for a particular product may
the form of blocks in a distributed, decentralized, and digital be scanned by the end user to get further information about
ledger. A block cannot be changed or hacked since blockchain that product. We can tell if a thing is genuine or not by
technology is secure. Blockchain technology eliminates the scanning its QR code [6].
need for customers or users to rely on third parties to verify
the product's safety. In light of current advancements in A. MOTIVATION
mobile and wireless technologies, quick response (QR) codes There The distribution of counterfeit products has grown
provide a promising technique for addressing the practice of widespread in recent years. There are several counterfeit
counterfeiting in this project. This is done by scanning a QR items in today's supply chain. According to the research,
code, which is linked to a Blockchain, to identify counterfeit occurrences involving bogus products have increased in
goods. As a consequence, this method may be used to record
recent years. It is vital to have a system in place fo r
product information and generate a unique identifier for each
product in a database. It looks up the user's unique code in the consumers or users to verify all product facts in order fo r
Blockchain database and sees if there are any matches. When a users to determine if the product is genuine or not.
code matches, the client will be notified; otherwise, the Currently, India lacks such a mechanism for detecting
consumer will be notified that the product is counterfeit. counterfeit items [7-8].

Keywords: Counterfeit product, QR code, Blockchain, B. OBJECTIVE


consumer, wireless technology The growth in counterfeit goods sparked the idea fo r this
project. Following are the project's goals :
I. INT RODUCT ION 1. An anti-counterfeit system based on blockchain
The company's brand, revenue, and consumer health might technology is being developed.
be at jeopardy if a product or technology is made availab le 2. To use a QR code to encrypt product information.
to a global audience. The supply chain contains an endless 3. Customers' security is ensured by s upplying them
number of things. In order to assess whether or not a product with their own data.
is authentic or a fake. As manufacturers are experiencing a
II. LITERATURE REVIEW
major challenge so we can utilise blockchain technology to
verify the authenticity of a product [1-3]. Prabhu Shankar, R. Jayavadivel, A Survey on Counterfeit
Product Detection. Counterfeit items are exp loding in
Changing, hacking, o r defrauding the system is difficult o r popularity, thanks to the vast internet and black -market
impossible using Blockchain's data recording technique. In a marketplaces. As a result, there is an urgent need to solve
blockchain, t ransactions are duplicated and propagated to all the difficulties associated with identify ing counterfeit items
of the network's PC co mputers in the form of a record o f and to develop suitable technologies to increase detection
transactions. Decentralized databases are known as accuracy. This is an active field of study in the modern
Distributed Ledger Technology (DLT) and are maintained world. This article explores numerous approaches for
by huge groups of people (DLT). Blockchain is a d istributed determining whether or not a product is counterfeit [9-10].

978-1-6654-9634-6/22/$31.00 ©2022 IEEE 851


Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on May 22,2024 at 10:45:49 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Seventh International Conference on Communication and Electronics Systems (ICCES 2022)
IEEE Xplore Part Number: CFP22AWO-ART; ISBN: 978-1-6654-9634-6

B. FIREBASE CLOUD
Si Chen, Rui Shi. A framework for supply chain quality Firebase is Google's platform for building mobile and web
management based on the blockchain. In this work, we applications. When it first started in 2011, it was a
suggest a blockchain-based system. The theoretical basis for standalone company. As of 2014, the platform has beco me
blockchain-based supply chain quality management will be Google's main offering for app development [24-25].
laid forth in this framework [11]. Addit ionally, it serves as a
basis for the development of ideas regarding the
management of information resources in dispersed, virtual
companies [12-15].

III. PROBLEM STATEMENT


Global expansion of a product or invention is always fraught
with danger elements such as forgery and duplication.
Forging things may have a negative impact on the
organization's reputation and the client's well-being.
Nowadays, the biggest test is the detection of a fraud ulent
item. Fake goods have a huge negative influence on both the
business and the client's well-being. As a result, item makers
face immense hardship [16-18].
Fig. 2. Cloud of Firebase
India and other countries are combatting such forgeries and
counterfeit goods. The suggested system generates QR Firebase is a platform for mobile applications that includes a
codes with the use of Blockchain technology. This invention common client library for a variety of mobile programming
utilises blocks to store exchange records [19-20]. languages. The many backend-as-a-service (BaaS) options
available on Firebase enable you to build h igh -quality
IV. REQUIREM ENT SPECIFICATION applications, expand your user base, and generate more
A. ANDROID STUDIO money. Each feature functions separately, and they perform
Based on IntelliJ's IDEA framework, Android Studio has significantly better when combined [26-28]. Figure 2 shows
been made by Google as their official integrated the cloud of firebase.
development environ ment (IDE) [21]. Figure 1 shows the V. SYSTEM ARCHITECTURE
android studio.
There has never been a satisfactory technique for
distinguishing counterfeit fro m genuine items. Blockchain
technology may be beneficial in resolving such issues. The
project's primary objective is to assist individuals in
determining if a product is genuine or counterfeit [29-30].

We presented a solution for detecting counterfeit items


based on blockchain technology as an Android application.
The suggested approach guarantees that counterfeit items
are detected in everyday life. The suggested system is
composed of three major co mponents: an Android
application for the consumer or user, an Android application
for the manufacturer or corporation, and a cloud/database
[31].
Fig. 1. Android Studio
On Windows, macOS, and Linu x, you may download it. Manufacturers and enterprises are the first to apply, and we
Because of this, ADT, the Eclipse-based Android must first register with them. After reg istering and login into
development tools, is now the IDE of choice fo r Android the application, we have a few options. One option is to
app developers [22-23]. The current stable version includes provide a product that can be customised by the
the following features: manufacturer. They can examine the customer's order
 Build system based on Gradle that is quite details and then determine whether or not to accept or reject
customizable. the transaction if they want to show the order. Addit ional
 An emulator with a lot of functionality and good monitoring may be done by the manufacturer to see whether
performance. or not the items are delivered [32-33].
 For the creation of popular Android designs and
components, there are wizards that use predefined
templates as a starting point.
 User interface co mponents may be dragged and
dropped into place with this layout designer.

978-1-6654-9634-6/22/$31.00 ©2022 IEEE 852


Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on May 22,2024 at 10:45:49 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Seventh International Conference on Communication and Electronics Systems (ICCES 2022)
IEEE Xplore Part Number: CFP22AWO-ART; ISBN: 978-1-6654-9634-6

3] A part o f the input will be preserved since there will be


no input that is exactly 512 bits.
Adding a 10-b it padding concatenation to the left input
completes the operation. We may proceed now that our
input has been converted to a perfect multiple.
5] The 768-bit result is obtained by mult iply ing the 512-b it
input by the 256-bit IV. The function 'c' is used to compress
these 768 bits into a 256-bit output.
6] This 256-bit output is blended once again with the 512-b it
input from block B2.
7] Once again, the sum is co mpressed to provide a 256-b it
output. This cycle continues until the last block is filled
Fig. 3. System Architecture (block n).

A second programme is the Customer application, which VI. RESULTS


requires us to first register in-app before logging in with our Real-time technology may be utilised to assess whether the
id and password. This programme has a feature that allows product is authentic or not. The SHA-256 method is used by
users to see product data such as the product's name, total the manufacturer to produce a QR code in blockchain
amount, price, and manufacturer informat ion. In that, we technology. The user scans the QR code to see whether the
may create a product book by entering the product's amount. product is real or a fake. Fig. 4. shows Detection of Fake
In this application, we may see orders using the display my Product with Received Product
order feature. This feature allows us to view product data
such as name, amount, date, time, price, and the status of a
product that has been manufactured, whether it has been
delivered or not. This programme has a QR code scanner
that allows us to scan the QR code of a prod uct and
determine if it is genuine or not. System architecture is
shown in figure 3.

Customer login is required for this project, as well as


application login. After logging in, he enters the necessary
informat ion to order and book the product. The maker might
be displayed the product's order. Whether or whether a
product request is approved is up to the manufacturer. The
product's unique QR code is generated by the manufacturer
when the order has been accepted by the manufacturer. It's
possible to keep track of a product's transaction by creating
a hash code for it once an order has been placed. In the
proposed system, each product is assigned a unique QR Fig. 4. Detection of Fake Product with Received Product
code. Customers may use their smartphone's QR code reader
VII. CONCULSION
app or the QR code scanner in the customer app to read the
QR code on the product or packaging. We can tell whether a With the large volume of counterfeit items available online,
product is genuine or a fake based on the results of the scan. counterfeit products are expanding quickly. There is a
Last but not least, the Blockchain system records these pressing need to detect counterfeit goods, and blockchain
product attributes and a history of t ransactions, making it technology is being used to accomplish this goal.
possible to monitor the product's supply chain. The firebase Additionally, the data is encoded as a QR code. Customers
cloud database stores all of the product's information, or consumers may d iscover counterfeit products by scanning
including the block name and hash value. the QR code. In blockchain technology, digital info rmation
on items may be kept in the form of blocks. Firebase cloud
A. SHA-256 ALGORITHM storage may be used to store the data. Thus, the suggested
National Security Agency created SHA-2 (Secure Hash approach benefits the client by detecting counterfeit items
Algorith m 2) as a successor for SHA-1 in 2001, and SHA - across the supply chain. It is possible to access information
256 is a variation of that algorithm. A method known as about the product's history and present owner by scanning
SHA-256 creates a 256-bit long hash value. the QR codes that have been affixed to it.
1] The Sha-256 method is employed in the blockchain to
generate a consistent 256-bit hash each time. Additionally,
REFERENCES
this technique is a component of encryption technology.
Now, let's have a look at how this algorithm works: [1] Si Chen, Rui Shi, Ren, Jiaqi Yan, Yani Shi, “A Blockchain-based
Supply Chain Quality Management Framework”, 14th, IEEE
2] The graphic depicts the algorithm's prototype. This International Conference on e-Business Engineering, 2017.
contains some data termed IV, which is 256 bits in length. [2] Blockchain Based Fake Product Identification in Supply Chain
Now, the feedback we get will be massive. As a result, www.irjet.net: Ajay Funde, Pranjal Nahar, Ashwini Khilari.
divide it into 512-bit chunks.

978-1-6654-9634-6/22/$31.00 ©2022 IEEE 853


Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on May 22,2024 at 10:45:49 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Seventh International Conference on Communication and Electronics Systems (ICCES 2022)
IEEE Xplore Part Number: CFP22AWO-ART; ISBN: 978-1-6654-9634-6

[3] Fake News Detection In Social Media using Blockchain: - Shovon Sensor Networks Using Machine Learning. In: Suma, V., Fernando,
Paul, Jubair Joy, Shaila Sarkar. X., Du, KL., Wang, H. (eds) Evolutionary Computing and Mobile
[4] A Blockchain-Based Application System for Product Anti- Sustainable Networks. Lecture Notes on Data Engineering and
Counterfeiting (IEEE Access): Jinhua Ma, Xin Chen, hung-Min Sun. Communications Technologies, vol 116. Springer, Singapore.
https://doi.org/10.1007/978-981-16-9605-3_65
[5] P. William and A. Badholia, "Analysis of Personality Traits from
Text Based Answers using HEXACO Model," 2021 International [21] R. Bibave, P. Thokal, R. Hajare, A. Deulkar, P. William and A. T.
Conference on Innovative Computing, Intelligent Communication and Chandan, "A Comparative Analysis of Single Phase to Three Phase
Smart Electrical Systems (ICSES), 2021, pp. 1-10, doi: Power Converter for Input Current THD Reduction," 2022
10.1109/ICSES52305.2021.9633794. International Conference on Electronics and Renewable Systems
(ICEARS), 2022, pp. 325-330, doi:
[6] P William, Dr. Abhishek Badholia 2021. Assessment of Personality 10.1109/ICEARS53579.2022.9752161.
from Interview Answers using Machine Learning
Approach. International Journal of Advanced Science and [22] A. B. Bornare, S. B. Naikwadi, D. B. Pardeshi and P. William,
T echnology. 29, 08 (Jul. 2021), 6301-6312. "Preventive Measures to Secure Arc Fault using Active and Passive
Protection," 2022 International Conference on Electronics and
[7] P William, Dr. Abhishek Badholia (2020) Evaluating Efficacy of
Renewable Systems (ICEARS), 2022, pp. 934-938, doi:
Classification Algorithms on Personality Prediction
10.1109/ICEARS53579.2022.9751968.
Dataset. Elementary Education Online, 19 (4), 3400-
3413. doi:10.17051/ilkonline.2020.04.764728 [23] K. P. Pagare, R. W. Ingale, D. B. Pardeshi and P. William,
"Simulation and Performance Analysis of Arc Guard Systems," 2022
[8] P. William, Dr. Abhishek Badholia."A Review on Prediction of International Conference on Electronics and Renewable Systems
Personality Traits Considering Interview Answers with Personality (ICEARS), 2022, pp. 205-211, doi:
Models", Volume 9, Issue V, International Journal for Research in 10.1109/ICEARS53579.2022.9751924.
Applied Science and Engineering T echnology (IJRASET) Page No:
1611-1616, ISSN : 2321-9653. [24] H. S. Matharu, V. Girase, D. B. Pardeshi and P. William, "Design and
Deployment of Hybrid Electric Vehicle," 2022 International
[9] P. William, P. Kumar, G. S. Chhabra and K. Vengatesan, "Task Conference on Electronics and Renewable Systems (ICEARS), 2022,
Allocation in Distributed Agile Software Development using Machine pp. 331-334, doi: 10.1109/ICEARS53579.2022.9752094.
Learning Approach," 2021 International Conference on Disruptive
Technologies for Multi-Disciplinary Research and Applications [25] P. William, A. Choubey, G. S. Chhabra, R. Bhattacharya, K.
(CENT CON), 2021, pp. 168-172, doi: Vengatesan and S. Choubey, "Assessment of Hybrid Cryptographic
10.1109/CENTCON52345.2021.9688114. Algorithm for Secure Sharing of Textual and Pictorial Content," 2022
International Conference on Electronics and Renewable Systems
[10] P William and Vaishali Sanjay Patil. “Architectural Challenges of
(ICEARS), 2022, pp. 918-922, doi:
Cloud Computing and Its Security Issues with Solutions"
10.1109/ICEARS53579.2022.9751932.
International Journal for Scientific Research and Development 4.8
(2016): 265-268. [26] P. William, S. Choubey, M. Ramkumar, A. Verma, K. Vengatesan
and A. Choubey, "Implementation of 5G Network Architecture with
[11] S. M atthew English and E. Nezhadian, ``Application of Interoperability in Heterogeneous Wireless Environment using Radio
bitcoin data- structures & design principles to supply chain Spectrum," 2022 International Conference on Electronics and
management,'' 2017, arXiv:1703.04206. [Online]. Available: Renewable Systems (ICEARS), 2022, pp. 786-791, doi:
http://arxiv.org/abs/1703.04206 10.1109/ICEARS53579.2022.9752267.
[12] F. Tian, ``An agri-food supply chain traceability system for [27] A. B. Pawar, P. Gawali, M. Gite, M. A. Jawale and P. William,
China based on RFID & blockchain technology,'' in Proc. "Challenges for Hate Speech Recognition System: Approach based on
13th Int. Conf. Service Syst. Service Manage. (ICSSSM), Jun. Solution," 2022 International Conference on Sustainable Computing
2016, pp. 1_6. and Data Communication Systems (ICSCDS), 2022, pp. 699-704,
[13] S. Shepard, RFID: Radio Frequency Identi_cation. New doi: 10.1109/ICSCDS53736.2022.9760739.
York, NY, USA: M cGraw-Hill, 2005. [28] P. William, D. Jadhav, P. Cholke, M. A. Jawale and A. B. Pawar,
[14] P. William and A. Badholia, "Analysis of Personality Traits from "Framework for Product Anti-Counterfeiting using Blockchain
Text Based Answers using HEXACO Model," 2021 International Technology," 2022 International Conference on Sustainable
Conference on Innovative Computing, Intelligent Communication and Computing and Data Communication Systems (ICSCDS), 2022, pp.
Smart Electrical Systems (ICSES), 2021, pp. 1-10, doi: 1254-1258, doi: 10.1109/ICSCDS53736.2022.9760916.
10.1109/ICSES52305.2021.9633794. [29] P. William, R. Gade, R. e. Chaudhari, A. B. Pawar and M. A. Jawale,
[15] P William, Dr. Abhishek Badholia 2021. Assessment of Personality "Machine Learning based Automatic Hate Speech Recognition
from Interview Answers using Machine Learning System," 2022 International Conference on Sustainable Computing
Approach. International Journal of Advanced Science and and Data Communication Systems (ICSCDS), 2022, pp. 315-318,
T echnology. 29, 08 (Jul. 2021), 6301-6312. doi: 10.1109/ICSCDS53736.2022.9760959.
[16] P William, Dr. Abhishek Badholia (2020) Evaluating Efficacy of [30] P. William, A. Badholia, B. Patel and M. Nigam, "Hybrid Machine
Classification Algorithms on Personality Prediction Learning T echnique for Personality Classification from Online Text
Dataset. Elementary Education Online, 19 (4), 3400- using HEXACO Model," 2022 International Conference on
3413. doi:10.17051/ilkonline.2020.04.764728 Sustainable Computing and Data Communication Systems (ICSCDS),
[17] P. William, Dr. Abhishek Badholia."A Review on Prediction of 2022, pp. 253-259, doi: 10.1109/ICSCDS53736.2022.9760970.
Personality Traits Considering Interview Answers with Personality [31] A. B. Pawar, V. Khemnar, R. Londhe, P. William and M. A. Jawale,
Models", Volume 9, Issue V, International Journal for Research in "Discriminant Analysis of Student's Online Learning Satisfaction
Applied Science and Engineering T echnology (IJRASET) Page No: during COVID'19," 2022 International Conference on Sustainable
1611-1616, ISSN : 2321-9653. Computing and Data Communication Systems (ICSCDS), 2022, pp.
[18] P William and Vaishali Sanjay Patil. “Architectural Challenges of 260-263, doi: 10.1109/ICSCDS53736.2022.9760895.
Cloud Computing and Its Security Issues with Solutions" [32] Yuvaraj, S., Badholia, A., William, P., Vengatesan, K., Bibave, R.
International Journal for Scientific Research and Development 4.8 (2022). Speech Recognition Based Robotic Arm Writing. In: Goyal,
(2016): 265-268. V., Gupta, M., Mirjalili, S., Trivedi, A. (eds) Proceedings of
[19] P. William, P. Kumar, G. S. Chhabra and K. Vengatesan, "Task International Conference on Communication and Artificial
Allocation in Distributed Agile Software Development using Machine Intelligence. Lecture Notes in Networks and Systems, vol 435.
Learning Approach," 2021 International Conference on Disruptive Springer, Singapore. https://doi.org/10.1007/978-981-19-0976-4_3
Technologies for Multi-Disciplinary Research and Applications [33] Q. Lu and X. Xu, ``Adaptable blockchain-based systems: A
(CENT CON), 2021, pp. 168-172, doi: case study for product traceability,'' IEEE Softw., vol. 34, no.
10.1109/CENTCON52345.2021.9688114. 6, pp. 21_27, Nov./Dec. 2017.
[20] William, P., Badholia, A., Verma, V., Sharma, A., Verma, A. (2022).
Analysis of Data Aggregation and Clustering Protocol in Wireless

978-1-6654-9634-6/22/$31.00 ©2022 IEEE 854


Authorized licensed use limited to: Visvesvaraya Technological University Belagavi. Downloaded on May 22,2024 at 10:45:49 UTC from IEEE Xplore. Restrictions apply.

You might also like