Ijirt164322 Paper

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

Detection of counterfeit products using Block chain


Technology

Mrs.S.Kavitha, AkshaiKumar.T.N, Chandru.K, Danush.S


Assistant Professor, Students, Department of Computer Science and Engineering
Vel Tech High Tech Dr.RangarajanDr.Sakunthala Engineering College ,Avadi

Abstract- Issues like inadequate departmental transactions that is replicated across the network of PCs
coordination, service redundancy, and a lack of on the blockchain[6].Every block in the chain contains
standardization resulting from a lack of transparency were many transactions, and every time a new transaction
frequently faced by supply chain management. Because
occurs on the blockchain, a record of that Every block in
product counterfeiting is so common these days, it is
the chain contains many transactions, and every time a
practically hard to spot a counterfeit item just by looking
at it. Counterfeiters are a major obstacle for legitimate new transaction occurs on the blockchain, a record of
firms, despite the fact that far too many people are that transaction is added to each participant's record [1].
ignorant of the complete impact that counterfeit items have The decentralized database that is governed by the
on enterprises. Several approaches have been used in the quantity of members is known as distributed ledger
past to address the problem of product counterfeiting. The technology (DLT). In blockchain technology, a type of
most popular methods include using AI, QR code-based distributed ledger technology, transactions are recorded
systems, RFID tags, and other methods. Every one of these using hashes, which are unchangeable cryptographic
has a few limitations, though: artificial intelligence
signatures [5]. The problem of product counterfeiting
necessitates CNN and machine learning, which demand a
can be resolved with the use of blockchain technology.
lot of computing power; a fake product can use a fake QR
code, and so on. The objective is to improve the detection Blockchain technology provides more security. Once a
of fake products by tracking their previous supply chain. product is saved on the network, a chain of transactions
Genuine product identity and supply chain traceability are for that product will form, allowing all transaction
ensured by blockchain technology. A blockchain-based records pertaining to that product and its current owner
system is decentralized since multiple parties can access to be maintained up to date. This hash code is generated
everything at once. One of its main advantages is that the once the product is stored. Every transaction record will
recorded data is difficult to change without the consent of be stored as blocks on the blockchain. The proposed
all persons involved, making it extremely safe and secure
method allows the end user to receive detailed product
from any flaws.
information by simply scanning a generated QR code
linked to a particular product [8].
INTRODUCTION
By scanning a product's QR code, we may ascertain
whether it is authentic or fake. Because it offers a
Risk concerns, like as copying and replication, are
decentralized, transparent, and secure way to record data
invariably present when a technology or product is
and transactions, blockchain technology is
created internationally. These dangers may affect a
revolutionizing a number of sectors [5]. Each block in a
business's revenues, standing with the public, and level
blockchain contains a timestamp, transaction data, and a
of customer happiness. There are an enormous number
cryptographic hash of the block before it. This results in
of products in the supply chain to confirm whether the
a chain of blocks that is unchangeable and impenetrable.
item is real or fake[1]. The primary problem is that
One of the primary characteristics of blockchain is its
producers are suffering large losses as a result of
decentralized nature [18]. Blockchain transactions are
counterfeit goods. The product's validity can be
not dependent on a single central authority, but rather
confirmed using blockchain technology [3]. Blockchain
are peer-to-peer validated by a network of nodes
is a data recording technology that makes it challenging
(computers). This makes blockchain resistant to fraud
to modify, breach, or control the system. A blockchain
and censorship because changing one block would
is essentially a distributed electronic ledger of

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1331


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

require altering every subsequent block on every copy management in virtual, distributed businesses [1]. by
of the ledger throughout the network. Blockchain Marko Steven [21].In the wine industry, smart tags are
technology has much more applications than just virtual used for anti-counterfeiting and brand protection. This
currency like Bitcoin.It can make supply chain article offers a smart tag-based, cloud-enabled solution
management easier by providing a visible and traceable for brand protection and anti-counterfeiting in the wine
record of the items from manufacturer to customer [17]. business. The fundamental idea underlying smart tags is
By safely storing and exchanging medical records, two-way communication between the vineyard and the
blockchain protects data integrity and privacy in the end-user, quick response codes, and functional inks
healthcare sector[16]. made possible by the Cloud system [21]. R. Jayavadivel
Additionally, it can make digital voting safe and and Prabhu Shankar [16].
transparent, which will improve voting processes [0]. The amount of fake items that are sold on the black
Through the use of public and private keys, blockchain market and via the internet is growing rapidly.
has proven to be consistent, which helps with Consequently, in order to improve detection precision,
commitment, integrity, and privacy to some level. it is critical to address the challenges associated with
Because blockchain technology is secure, no block can recognizing counterfeit items and to create appropriate
be changed or manipulated. Blockchain technology is technology. This is one of the current research issues
more than simply virtual currency; it has many being looked into in the modern world. This essay
applications in government, banking and finance, discusses many techniques for identifying counterfeit
accounting, and corporate operations. Consumers or goods[16]. The article by Tejaswini, Tambe, Sonali
users who make use of blockchain technology can Chitalkar, Manali Khurud, Madhavi Varpe, and S.Y.
independently confirm a product's security without Raut describes how products using QR codes can be
depending on a third party. On the blockchain, distinguished from fakes. There are two primary uses for
information collected by WSNs keeping an eye on the it. One is for the manufacturer to check all orders, create
electrical distribution grid is kept. It uses data stored in a QR code, and submit all product details.The system
a blockchain, created by a directed acyclic graph (DAG). makes use of the SHA-256 method to obtain a constant
A merging procedure that took into account non- hash value of 256 bits, Android Studio to construct the
technical losses was created in order to assess fraud. The application, and Firebase cloud database to store all
process of using blockchain technology to identify product details, hash values, and block names [7].
counterfeit goods is called "fake product detection." After obtaining the user's unique code, they compare it
Blockchain is a decentralized, immutable digital record to records in the Blockchain database. Customers will
that provides transparency and security for transactions. receive notification that the goods is authentic if the
Businesses can employ blockchain technology to ensure code matches; if not, they will receive notification that
the authenticity of their products, giving customers the product is counterfeit[5]. With the help of
peace of mind about the items' veracity. It tracks the blockchain technology, customers may independently
product's journey through the supply chain and creates confirm the legitimacy of a product, which benefits both
an electronic history of where it came from. Every the product's owner and them. Blockchain technology is
transaction involving the product is recorded on the a distributed, decentralized ledger that is connected by
blockchain, creating an unalterable and transparent chains and stores all transactional data in the form of
history of the product. immutable, extremely secure blocks [6]. The system will
insert the new block into a chain after the majority of
RELATED WORKS your peers have approved it. Many researchers are
examining the use of suitable technology for tracking
Si Chen and Rui Shi [1]:"A Blockchain-based Supply systems in food supply chains due to the internet of
Chain Quality Management Framework". In this work, things' explosive growth. According to Folinas et al. [9],
we describe a blockchain-based system. This framework a tracking system's effectiveness is dependent on its
will provide a theoretical basis for intelligent, capacity to trace and track every product and
blockchain-powered supply chain quality management. transportation unit in a way that permits ongoing
Additionally, it provides a foundation for the theoretical observation from the point of basic manufacture to the
advancement of theories related to information resource consumer's eventual disposal.

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1332


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

An RFID-based framework for tracking beef from farm


to slaughter was developed by Shanahan et al. [10]. The
concept has been offered as a solution for access to
tracking records and fraudulent actions, utilizing RFID
tagging for individual cattle identification. Abad et al.
[11] attempted to validate an intelligent RFID tag
designed for real-time tracking and monitoring of cold
food chains under the chain study of intercontinental
fresh fish logistics in order to create an automated
system that combines online tracking data and chill
chain status monitoring information. In order to track
wine bottles in a supermarket, Matholi et al. (2010) [12]
designed a Flexible Tag Data-logger (FTD) that is FIGURE1:Blockchain-Powered Anti-Counterfeiting
connected to bottles and collects environmental data, 1)Blockchain Network
such as light, humidity, and temperature. This is the underlying blockchain infrastructure
consisting of multiple nodes (computers) connected in a
METHODOLOGY peer-to-peer network. Nodes can be divided into
different categories such as miners, validators, and
The creation of a blockchain-based program that can be users, each performing specific functions within the
used to identify counterfeit goods is one way to solve network.
this issue [12]. This section gives a quick rundown of the 2) Smart Contracts
system's architecture along with an explanation of its Self-executing contracts with preprogrammed rules and
purpose and user interface [1]. This technology conditions are known as smart contracts. Smart contracts
determines whether a product is real or phony by using control the development, transfer, and verification of
a decentralized application built on a block chain. The digital product IDs in the context of counterfeit product
manufacturer, seller, and customer phases make up the identification.
three stages of the proposed system:[3]. Smart contracts 3) Product Manufacturer
will be used to store all of the product details that are The manufacturer of the product interacts with the
kept by the manufacturer. The self-executing programs blockchain network to register each product's digital
known as smart contracts are launched at the time a identity. Information such as product specifications,
block chain transaction occurs. If and then phrases are batch numbers, production dates, and supply chain
used in the predefined rules that power smart contracts details are recorded on the blockchain through smart
[3]. Without requiring any external commands, the contracts.
software runs automatically as soon as the rules' criteria 4) Supply Chain Integration
are met. Solidity, a programming language related to The blockchain network integrates a number of supply
JavaScript, is used to generate these smart contracts. The chain participants, such as distributors, retailers, and
IDE used to execute these mart contracts is called suppliers. The product's digital identity is enhanced at
Remix[16].To preserve data integrity and traceability, each level of the supply chain, resulting in a clear and
make sure that every event is time stamped, verifiable record of the product's travels.
authenticated, and cryptographically secured[14].The 5) Blockchain Explorer
product is verified as authentic if the data matches and A user-friendly tool or interface that lets users view and
passes validation checks (such as digital signatures and interact with blockchain data is called a blockchain
authenticity proofs). If not, it is marked as possibly explorer. By querying the product's digital identity
being fake [25]. stored on the blockchain, consumers and other
authorized parties can use the blockchain explorer to
confirm the legitimacy of a product.
6) Consumer Application
A dedicated application or interface accessible to
consumers for verifying product authenticity.

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1333


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

Consumers can scan product QR codes or input product (node) joined the blockchain: Information about the
details into the application, which then retrieves and product is added to the blockchain as a new block that is
validates the product's digital identity from the connected to the earlier block chain. This ensures that
blockchain. the product's information is secure and immutable.
7) Verification Process
The verification process involves comparing the ALGORITHM:
information retrieved from the blockchain with the importhashlib
product's physical attributes and accompanying def sha256(message):
documentation. If the information matches and no # Convert the message to bytes
discrepancies are found, the product is deemed ifisinstance(message, str):
authentic. Otherwise, it may be flagged as potentially message = message.encode()
counterfeit.
The manufacturer of the product interacts with the # Initialize hash values (first 32 bits of the fractional
blockchain network to register each product's digital parts of the square roots of the first 8 primes)
identity. h0 = 0x6a09e66
Information such as product specifications, batch h1 = 0xbb67ae85
numbers, production dates, and supply chain details are h2 = 0x3c6ef372
recorded on the blockchain through smart contracts. h3 = 0xa54ff53a
8)Supply Chain Integration h4 = 0x510e527f
The blockchain network integrates a number of supply h5 = 0x9b05688c
chain participants, such as distributors, retailers, and h6 = 0x1f83d9ab
suppliers. The product's digital identity is enhanced at h7 = 0x5be0cd19
each level of the supply chain, resulting in a clear and
verifiable record of the product's travels. # Initialize round constants (first 32 bits of the fractional
9)Consumer Application parts of the cube roots of the first 64 primes)
A dedicated application or interface accessible to k=[
consumers for verifying product authenticity. 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
Consumers can scan product QR codes or input product 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
details into the application, which then retrieves and 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
validates the product's digital identity from the 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
blockchain. 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
10)Verification Process 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
The verification process involves comparing the 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
information retrieved from the blockchain with the 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
product's physical attributes and accompanying 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
documentation. If the information matches and no 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
discrepancies are found, the product is deemed 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
authentic. Otherwise, it may be flagged as potentially 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
counterfeit. 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
This is the initial step in the process of creating a 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
product. Login Page: The manufacturer logs into a 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
system, presumably to register the product. Registration 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
Page: After logging in, the manufacturer registers the ]
product details. Product Details Retained in a database:
All of the product's data is stored in a centralized # Pre-processing (padding)
database. Blockchain-Based QR Code Generation: A original_length = len(message) * 8
QR code linked to the blockchain is connected to the message += b'\x80'
goods. This QR code serves as the product's unique while (len(message) * 8) % 512 != 448:
identifier. In order to get another block (node), a block message += b'\x00'

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1334


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

message += original_length.to_bytes(8, 'big') h6 = (h6 + g) % (2**32)


h7 = (h7 + h) % (2**32)
# Process the message in 512-bit blocks
forchunk_start in range(0, len(message), 64): # Concatenate hash values to get the final hash
chunk = message[chunk_start:chunk_start+64] hash_result = (h0 << 224) | (h1 << 192) | (h2 << 160)
w = [0] * 64 Introduction to SHA-256: A particular kind of
cryptographic hash function called SHA-256 takes any
# Break chunk into 16 32-bit words size of input data and outputs a fixed-size hash (256
for i in range(16): bits). It is extensively employed in many different
w[i] = int.from_bytes(chunk[i*4:i*4+4], 'big') cryptography applications, such as blockchain
technology.
# Extend the first 16 words into the remaining 48 Initialization Vector (IV): The process starts with an
words Initialization Vector (IV), which is a 256-bit constant
for i in range(16, 64): value. This IV is used as part of the initial setup for the
s0 = (w[i-15] >> 7 | w[i-15] << 25) ^ (w[i-15] >> algorithm.
18 | w[i-15] << 14) ^ (w[i-15] >> 3) Data Processing: It's possible that input data won't
s1 = (w[i-2] >> 17 | w[i-2] << 15) ^ (w[i-2] >> always be a perfect multiple of 512 bits, which is the
19 | w[i-2] << 13) ^ (w[i-2] >> 10) SHA-256 block size. Thus, the data is divided into 512-
w[i] = (w[i-16] + s0 + w[i-7] + s1) % (2**32) bit blocks.
Padding: The final block of input data is padded with
# Initialize hash value for this chunk extra bits to make it a complete block if it is not precisely
a, b, c, d, e, f, g, h = h0, h1, h2, h3, h4, h5, h6, h7 512 bits. This padding usually consists of adding one '1'
bit and then as many '0' bits as required.
# Main loop Compression Function: Each 512-bit block of data,
for i in range(64): along with the IV, is processed through a compression
s1 = (e >> 6 | e << 26) ^ (e >> 11 | e << 21) ^ function. This function combines the input data with the
(e >> 25 | e << 7) IV to produce a 256-bit output.
ch = (e & f) ^ (~e & g) Chaining: The output of the compression function is
temp1 = (h + s1 + ch + k[i] + w[i]) % (2**32) then merged with the next 512 bits of input data. This
s0 = (a >> 2 | a << 30) ^ (a >> 13 | a << 19) ^ process continues until all input blocks have been
(a >> 22 | a << processed.
maj = (a & b) ^ (a & c) ^ (b & c) Final Compression: Once all input blocks have been
temp2 = (s0 + maj) % (2**32) processed, a final compression function is applied to the
last block, producing the final 256-bit hash value
h=g
g=f EVALUATION AND RESULT
f=e
e = (d + temp1) % (2**32) Reduced Counterfeiting: The use of blockchain-based
d=c false product identification reduces counterfeit instances
c=b significantly because stakeholders and customers can
b=a quickly confirm the authenticity of the product.
a = (temp1 + temp2) % (2**32) Enhanced Trust: Consumers gain confidence in the
# Update hash values for this chunk authenticity of products, leading to increased trust in the
h0 = (h0 + a) % (2**32) brand and higher customer satisfaction.
h1 = (h1 + b) % (2**32) Enhanced Supply Chain Transparency: Real-time access
h2 = (h2 + c) % (2**32) to product information and supply chain events is
h3 = (h3 + d) % (2**32) provided to stakeholders by the transparent and
h4 = (h4 + e) % (2**32) immutable nature of blockchain technology.
h5 = (h5 + f) % (2**32)

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1335


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

Cost Savings: Over time, the reduction in counterfeit Business case studies and ROI analyses demonstrating
products and improved supply chain efficiency can the benefits of blockchain technology for enterprises.
result in cost savings for businesses, such as reduced
losses from counterfeit-related legal actions and Future Trends and Innovations: Emerging technologies
improved inventory management. and trends in blockchain-based product identification
Technical Aspects of Implementing Blockchain (e.g., Internet of Things integration, machine learning
Technology: Nodes, consensus methods (such as proof for fraud detection).
of work and proof of stake), and smart contracts are the
technical elements of a blockchain-based product Using blockchain technology to implement false
identification system. Product identification-related product identification provides a strong defense against
blockchain transaction data structure and format. counterfeit goods in a variety of businesses. Businesses
Blockchain systems use security mechanisms (such may establish a transparent and secure ecosystem where
encryption and cryptographic hashing) to safeguard product authenticity can be confidently verified by
product data. utilizing blockchain's decentralized and immutable
ledger. The foundation for a successful deployment is
Consumer Trust and Confidence: The importance of the previously described approach, which includes
consumer trust in product authenticity and brand supply chain integration, consumer applications, smart
reputation. How blockchain-based product contracts, and a verification mechanism. But it's
identification systems enhance consumer confidence important to remember that long-term success requires
through transparency and verification mechanisms. constant observation, constant development, and
Case studies or examples showcasing increased trust and adjustment to changing regulatory and technical
positive consumer experiences with blockchain-verified environments. In summary, blockchain-based fake
products. product identification not only shields customers from
fraudulent goods but also improves brand recognition,
Supply Chain Transparency: The contribution of builds confidence, and stimulates supply chain
blockchain technology to increased supply chain management innovation. It is a critical step toward
visibility and transparency. advantages of product creating a more safe and reliable marketplace for
traceability and real-time tracking across the supply companies and customers alike.
chain. Applications of blockchain in supply chain
management include inventory control, product REFERNCE
verification, and anti-counterfeiting measures.
1] Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun,
Regulatory Compliance and Standards: Regulatory Yeh-Cheng Chen, and Hoaxing Wang, “A Blockchain-
requirements and standards related to product Based Application System for Product Anti-
authentication and anti-counterfeiting (e.g., FDA Counterfeiting”, IEEE Access,2020.
regulations, ISO standards). How blockchain-based [2] Gunashree, M., Ahmed, S. T., Sindhuja, M.,
product identification systems can help businesses meet Bhumika, P., Anusha, B., &Ishwarya, B. (2020). A New
regulatory compliance and certification requirements. Approach of Multilevel Unsupervised Clustering for
Collaboration with regulatory bodies and industry Detecting Replication Level in Large Image
organizations to establish best practices for blockchain Set.Procedia Computer Science, 171, 1624-1633.
implementation in product identification. [3] S. Chen, R. Shi, Z. Ren, J. Yan, Y. Shi, J. Zhang, A
blockchain-based supply chain quality management
Cost Savings and Business Impact: Financial framework, in 2019 IEEE 14th International Conference
advantages of putting in place blockchain-based systems on e-Business Engineering (ICEBE) (IEEE, 2019), pp.
for identifying counterfeit goods, such as lower losses 172–176.
from counterfeiting and lower supply chain expenses. [4] Jesus Maximo Montes, Cecilia E. Ramirez, Manuel
Adoption of blockchain leads to increased customer Coronado Gutierrez, Victor M. Larios, “Smart Contracts
happiness, inventory control, and operational efficiency. for supply chain applicable to Smart Cities daily

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1336


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

operations”5th IEEE International Smart Cities [15] Singh, Shivam & Choudhary, Gaurav& Kumar,
Conference (ISC2 2019), 2019. Shishir & Sihag, Vikas & Choudhary, Arjun. (2021).
[5] Shivam Singh, GauravChoudhary, Shishir Kumar Counterfeited Product Identification in a Supply Chain
Shandilya, VikasSihag, ArjunChoudhary, using Blockchain Technology. 10.22667/
“Counterfeited Product Identification in a Supply Chain ReBiCTE.2021.07.15.003.
using Blockchain Technology”, Research Briefs on [16] Funde, A., Nahar, P., Khilari, A., Marne, N.,
International & Communication Technolog Evolution, &Nerkar, N. (2019). Blockchain Based Fake Product
(July 15,2021). Identification in Supply Chain. International Research
[6]Ms. Renukadevi B, Bharathy R, Journal of Engineering and Technology (IRJET),
AbineshK,”Detection of Fake Product using Blockchain 6(5), 5367-5369.
Technology ”,© 2022 IJNRD | Volume 7, Issue 8 August [17] V. Paliwal, S. Chandra, and S. Sharma.Blockchain
2022 | ISSN: 2456-4184 | IJNRD.ORG technology for sustainable supply chain management: A
[7]TejaswiniTambe , SonaliChitalkar , ManaliKhurud, systematic literature review and a classification
MadhaviVarpe, S. Y. Raut ”Fake Product Detection framework. Sustainability, 12(18):7638, 2020.
Using Blockchain Technology”Vol-7 Issue-4 2021 [18] Ahmed, S. T., Sreedhar Kumar, S., Anusha, B.,
IJARIIE-ISSN(O)-2395-4396. Bhumika, P., Gunashree, M., &Ishwarya, B. (2020). A
[8]KunalWasnik, IshaSondawle, RushikeshWani, generalized study on data mining and clustering
NamitaPulgam, “Detection of Counterfeit Products algorithms. New Trends in Computational Vision and
using Blockchain”, ITM Web of Conferences, (ICACC- Bio-inspired Computing: Selected works presented at
2022) the ICCVBIC 2018, Coimbatore, India, 1121-1129.
[9]SrikrishnaShastri , Vishal K , Sushmitha S , Lahari , [19] Prof. RanjanaKedar, ShaikhJunaid, ShingadeTejas,
Ashwal R ,“Fake Product Detection Using Blockchain ShelkeAtharva,MohammadParvez “FAKE PRODUCT
Technology”, International Journal of Advanced DETECTION & TRACKING USING
Research in Computer and Communication BLOCKCHAIN” YMER || ISSN : 0044-0477
Engineering, May 2022. VOLUME 22 : ISSUE 04 (April) - 2023
[10] RishabhBhatnagar, SnehaJha, Shrey Singh, [20] Jadhav, Roshan, et al. "System for Identifying Fake
RajkumarShende,“ Product Traceability Using Product using Blockchain Technology." 2022 7 th
Blockchain ”, 2020 2nd International Conference On International Conference on Communication and
Advances In Computing , Communication Control And Electronics Systems (ICCES). IEEE, 2022 Vol 3, no 11,
Networking . pp 505-509, November 2022.
[11] Dr. Lokesh , Suhail Ahmed , Saifulla Khan , “ [21] ShivindraPratap Singh, “Counterfeiters-The New
BlockChain based supply chain management for Age Disaster-preneurs”, April 2020.
counterfeit drug in pharmaceutical industry ” , [22] Kumar Bhosale, KadayaAkbarabbas, Jadhav
International Journal Of Scientific Research In Deepak, AwaniSankhe, ”Blockchain based Secure Data
Computer Science ,Engineering And Information Storage”, March 2019.
Technology 2021 [23] AnilPawar, S.A.Quadri, MeenazKolyal. "FAKE
[12] K. B. Adsul and S. Kosbatwar. A novel approach PRODUCT IDENTIFICATION SYSTEM USING
for traceability & detection of counterfeit medicines BLOCKCHAIN", International Journal of Emerging
through blockchain. Technical Report 2539, Technologies and Innovative Research (www.jetir.org),
EasyChair, February 2020. ISSN:2349-5162, Vol.9, Issue 7, page no. g492-
[13] Ma, J., Lin, S. Y., Chen, X., Sun, H. M., Chen, Y. g500, July-2022.
C., & Wang, H. (2020). A blockchain-based application [24] International Research Journal of Engineering and
system for product anti-counterfeiting. IEEE Access, 8, Technology (IRJET) e-ISSN: 2395-0056 Volume: 10
77642-77652. Issue: 03 | March 2023 www.irjet.net p-ISSN: 2395-
[14] Shreekumar, T., Mittal, P., Sharma, S., Kamath, R. 0072 Fake Product Detection Using Blockchain
N., Rajesh, S., &Ganapathy, B. N. (2022). Fake Product Technology Kishan Tiwari1, Nikita Patil2, Akshay
Detection Using Blockchain Technology. JOURNAL Gupta3, Akash Sabale4, Vina Lomte5 1,2,3,4 (Students,
OF ALGEBRAIC STATISTICS, 13(3), 2815-2821. Department of Computer Engineering), R.M.D Sinhgad
School of Engineering, Pune,India 5 (HOD, Dept. of

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1337


© May 2024| IJIRT | Volume 10 Issue 12 | ISSN: 2349-6002

Computer Engineering), R.M.D Sinhgad School of


Engineering, Pune, India.
[25] Xie, Shundao, et al. "Two-stage textured-patterns
embedded QR codes for printed matter
authentication.",Research Square (2021).
[26]Identification of Fake Products Using Blockchain
Antony RoshanDsouza .Shantala Devi Patil
.Amuthabala K School of Computer Science and
Engineering REVA University, Bangalore, Karnataka,
India(23 April 2023).
[27]Y. Raut, “Fake Product Detection Using Blockchain
Technology”, 2021.
[28]M.A. Benatia, D. Baudry, A. Louis, Journal of
Ambi-ent Intelligence and Humanized Computing
pp. 1–10(2020).
[29]G. Khalil, R. Doss, M. Chowdhury, IEEE Access
8,47952 (2020).

IJIRT 164322 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY1338

You might also like