Fake Product Detection
Fake Product Detection
BLOCKCHAIN TECHNOLOGY
A MINI PROJECT REPORT
(1904IT551 – CASE TOOLS)
SUBMITTED BY
AKASH I 8208E21ITR005
DURAIBALAN C 8208E21ITR021
SEDHUMANIMATHAVAN P 8208E20ITR044
VIGNESH S 8208E21ITR058
Of
BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY
(AUTONOMOUS)
NOVEMBER 2023
E.G.S. PILLAY ENGINEERING COLLEGE
(AUTONOMOUS)
BONAFIDE CERTIFICATE
Dr. S. MANIKANDAN, M.E., Ph. D Dr. R. LAVANYA., M.E., Ph. D MS. V.SURYA., M.E
HEAD OF THE DEPARTMENT PROJECT COORDINATOR PROJECT SUPREVISOR
ASSOCIATE PROFESSOR ASSISTANT PROFESSOR ASSISTANT PROFESSOR
Department of information Technology Department of information Technology Department of information technology
E.G.S. Pillay engineering college E. G. S. Pillay engineering college E. G. S. Pillay engineering college
Nagapattinam. Nagapattinam Nagapattinam
The rise of counterfeit products is a growing concern for businesses and consumers alike.
The proliferation of fake products poses a significant threat to the reputation and financial stability
of companies, as well as the health and safety of consumers. Blockchain offers a decentralized
and secure platform for tracking and verifying the authenticity of products, enabling consumers
to easily identify and avoid counterfeit goods. The use of blockchain technology in the
identification of fake products. My team examine the key features of blockchain technology and
how it can be used to create a secure and transparent system for product identification. My team
propose a blockchain-based system for product identification that utilizes smart contracts to
automate the verification process. The system would allow manufacturers to register their
products on the blockchain and generate a unique digital identity for each item. Consumers would
be able to scan the product's QR code to access the product's digital identity and verify its
authenticity. My team also discuss the potential benefits of using blockchain technology for
product identification, including increased transparency, reduced fraud, and improved consumer
trust. Finally, my team examine the challenges and limitations of implementing blockchain-based
product identification systems, such as scalability and interoperability issues. Overall, we
conclude that blockchain technology offers a promising solution for identifying and combatting
fake products. Its decentralized and secure nature provides a transparent and reliable platform for
verifying the authenticity of products, protecting businesses and consumers from the harmful
effects of counterfeit goods.
2 CHAPTER 2 4
LITERATURE SURVEY 4
3 CHAPTER 3 7
SYSTEM ANALYSIS 7
3.1 EXISTING SYSTEM 7
3.2 PROPOSED SYSTEM 7
4 CHAPTER 4 9
SYSTEM SPECIFICATION 9
4.1 HARDWARE REQUIREMENTS 9
4.2 SOFTWARE REQUIREMENTS 9
4.3 SOFTWARE SPECIFICATION
9
4.4 FUNCTIONAL REQUIREMENTS
10
4.5 NON-FUNCTIONAL REQUIREMENTS
11
4.6 PERFORMANCE REQUIREMENT
11
5 CHAPTER 5 12
SYSTEM DESIGN 12
5.1 SYSTEM ARCHITECTURE 12
5.2 SYSTEM FLOW 13
6 CHAPTER 6 15
UML DIAGRAM 15
6.1 USE CASE DIAGRAM 16
6.2 CLASS DIAGRAM 17
6.3 SEQUENCE DIAGRAM
18
6.4 ACTIVITY DIAGRAM
19
7 CHAPTER 7 20
IMPLEMENTATION 20
7.1 MODULES 20
7.2 TESTING AND DEPLOYMENT 21
8 CHAPTER 8 22
BLOCKCHAIN 22
8.1 WORKING OF BLOCKCHAIN 22
8.2 BLOCKCHAIN FEATURES 23
8.3 IMPORATANCE OF BLOCKCHAIN
24
9 CHAPTER 9 25
CONCLUSION 25
REFERENCE 26
CHAPTER 1
INTRODUCTION
Fake product detection in blockchain refers to the process of identifying counterfeit
products by leveraging blockchain technology. Blockchain is a decentralized and immutable
digital ledger that provides transparency and security for transactions. By using blockchain,
businesses can ensure that their products are genuine, and customers can have confidence in
the authenticity of the products they purchase. It works by creating a digital record of the
product's origin and tracking its journey through the supply chain. Each time the product
changes hands, the transaction is recorded on the blockchain, creating an immutable and
transparent record of the product's history. This record used to verify the product's authenticity
and prevent fraud.
2) Company revenue
Blockchain can help streamline the verification process, ensuring that products are
genuine and reducing the risk of counterfeits entering the supply chain. The Paper will also
Discuss the potential benefits of this system, including increased transparency, supply chain
traceability, and consumer protection. for example, the platform creates a digital record for
each cosmetic item, containing details such as its origin, the date of production, and the supply
chain information. When a cosmetic item is scanned at any point in the supply chain, its
information is updated on the blockchain, creating a tamper-proof record of the item's journey
from farm to table. Consumers can also access this information by scanning a QR code on the
packaging or label of the cosmetic item. The blockchain record provides an immutable and
1
transparent record of the cosmetic item's journey, enabling businesses to quickly identify any
discrepancies or anomalies in the supply chain that may indicate the presence of counterfeit or
fake products. For example, if an item's record shows that it has been produced in a different
location than the one mentioned on the packaging, it will indicate that the product is fake or
counterfeit.
Moreover, this paper aims to provide a critical evaluation of the proposed system, including
its limitations and challenges. It will examine how the proposed system compares to existing
anti-counterfeiting technologies and explore potential future developments. Finally, this paper
will conclude with recommendation for future research in this area and its potential impact on
businesses and consumers. Overall, fake product detection in blockchain has the potential to
revolutionize the way businesses authenticate products and prevent fraud, providing benefits
for both businesses and consumers alike.
The idea of this project came into existence because of the increase in the counterfeit
products.
In recent years, the spread of counterfeit goods has become global. There are many fake
products in the current supply chain. According to the report, fake product incidents have risen
in the last few years. It is necessary to have a system for customers or users to check all the
details of the product so that users can decide that the product is real or fake. In India currently,
there is no such system to detect counterfeit products. So, the solution involves a simple QR
code-based identification that can help the end-user or customers to scan and identify the
genuineness of the product by using a smartphone.
2
The limitations of using blockchain for fake product detection are as follows:
1. Data accuracy: The integrity of the blockchain relies on accurate data entry; incorrect
information can compromise its effectiveness and lead to false verification results.
2. High implementation costs: Implementing blockchain can be expensive, especially
for small businesses, potentially limiting its widespread use and effectiveness.
3
CHAPTER 2
LITERATURE SURVEY
This survey paper has covered architecture of cryptocurrencies, smart contracts and
general Blockchain based applications. The paper has provided a perspective to describe the
Blockchain architectures in relation to cryptocurrencies, smart contracts and other applications.
The research advances in consensus are also highlighted with some key development and
application frameworks. A detailed discussion with respect to future and open research avenues
is also performed, which could help to pave the way for researchers to explore the key
challenging areas in the Blockchain field.
Authors: Rishabh Sushil Bhatnagar, Sneha Manoj Jha , Shrey Surendra Singh,
Rajkumar Shende
The conventional SCM systems are widely used in the current market whereas
blockchain is a relatively new system and is yet to be introduced in the industry on a large
scale. The current SCM systems have prevailed so long in the market due to its easy and
cheaper implementation on a large scale. Despite being used on a large-scale platform, these
systems have their flaws which have prevailed since the existence of these systems. The current
system is opaque in nature and is very vulnerable to various frauds and scams due to poor
maintenance of the records of the transactions within the system. Lack of trust between the
participating entities is an issue yet to be resolved. The trust of the customer in the system is
compromised by not providing a quality assured product even though it is a major factor in the
growth of any business. Even with all these flaws, these systems are being used by various
market giants as the prices of the products can be easily exploited with any credibility.
4
2.3 A Blockchain-based Supply Chain Quality Management Framework
Author : Si Chen , Rui Shi , Zhuangyu Ren , Jiaqi Yan , Yani shi , Jinyu Zhang
In this appropriate paper, they proposed a framework for blockchain based SCQI. This
framework will provide a theoretical basis to intelligent quality management of supply chain
based on the blockchain technology. Furthermore, it provides a foundation to develop theories
about information resource management in distributed, virtual organizations, especially
distributed, cross-organizational and decentralized management theory.
2.4 A Block Chain based Management System for Detecting Counterfeit Product
in Supply Chain
In this Paper, they have discussed about counterfeit products are growing exponentially
in online and black-market. The block market is a biggest challenge in supply chain. The
government has introduced several laws and regulations against fake products even though the
government cannot control counterfeit products. Therefore, there is a need of an approach for
detecting counterfeit products and providing security techniques to alert both manufacturer and
consumer in supply chain. Manufacturers may use the block chainmanagement system to store
relevant product sales information within the block chain, which is accessible to all. The total
number of sales the seller can sell and the rest left behind by the seller are transparent. The user
can perform vendor-side verification using an encryption algorithm. Only way to decrypt is to
use a private key of the owner. In this paper, we proposed block chain management system
activates the consumer and enterprise vendor to track and identify the real product using a
Smartphone. It also will detect counterfeit products as well as authenticity of manufacturer for
both end user and enterprise vendor.
5
2.5 A Blockchain-Based Application System for fake product detection
In this particular Paper, Manufacturers can use the system to store relevant information
on product sales in Blockchain which is accessible to everyone. The total amount of sales that
can be sold by the seller and the number of products currently left by the seller are transparent.
The user can use the functions provided by our system to immediately perform vendor-side
verification. The system provides identity verification by using digital signatures. There are no
other means to decrypt the private key of the key owner unless the key owner accidentally leaks
his key. In their system analysis result, the cost of the initial product record contract will only
cost 1.2893394289 US dollars, and the cost of each product sale process will cost
0.17415436749 US dollars.
6
CHAPTER 3
SYSTEM ANALYSIS
A supply chain is a coordinated network. Therefore, any SCM system must also have a
cohesive structure that enables functionality and visibility along the product delivery journey.
As such, an SCM system would typically integrate features such as inventory management,
warehouse management, purchase-order processing, demand forecasting, supplier relationship
management, logistics planning, and so on.
Also, most SCM systems are integrated with bookkeeping functionalities to enable the
business to manage its ledger and optimize finances effectively.
Over the years, there’s been increased adoption of cloud-based SCM systems as
software-as-a-service (SaaS). Cloud management of the supply chain allows businesses to track
the entire lifecycle of a project, offering close monitoring and adequate visibility at each
touchpoint. It emerged to fill the gaps with traditional SCM systems, which lack the 360°
management enabled by cloud technology. Overall, cloud-based SCM systems are more
scalable and efficient.
A blockchain supply chain can help participants record price, date, location, quality,
certification, and other relevant information to more effectively manage the supply chain. The
availability of this information within blockchain can increase traceability of material supply
chain, lower losses from counterfeit and gray market, improve visibility and compliance over
outsourced contract manufacturing, and potentially enhance an organization's position as a
leader in responsible manufacturing.
As blockchain gains publicity, large corporations and startups are exploring uses of the
technology outside of the financial services industry. Many organizations are already
experimenting with blockchain innovations to fulfill a range of needs. Provenance, a supply
chain transparency start-up, recently completed a six-month pilot for tracking responsible
sourcing of tuna in Indonesia via blockchain. Monegraph, a startup launched in 2014, uses
7
blockchain to secure the usage and sharing rights of digital media such as video clips or brand-
sponsored content and enable sharing of revenue across the media creators, publishers, and
distributors. Skuchain builds blockchain-based B2B trade and supply chain finance products
targeted towards the $18 trillion global trade finance market that involves numerous entities
including buyers, sellers, logistics providers, banks, customs, and third parties. Blockchain
driven innovations in the supply chain will have the potential to deliver tremendous business
value by increasing supply chain transparency, reducing risk, and improving efficiency and
overall supply chain management.
8
CHAPTER 4
SYSTEM SPECIFICATION
• Tools : Xampp
• Language : Solidity
• IDE’s : Visual Studio 2019 and Remix Ethereum IDE (online)
• Metamask wallet Ganache (personal blockchain)
Remix Project is a platform for development tools that use a plugin architecture. It
encompasses sub-projects including Remix Plugin Engine, Remix Libraries, and of course
Remix IDE.
Remix IDE is an open source web and desktop application. It fosters a fast development cycle
and has a rich set of plugins with intuitive GUIs. Remix is used for the entire journey of contract
development with Solidity language as well as a playground for learning and teaching Ethereum.
Ganache:
Ganache is a personal blockchain for rapid Ethereum and Corda distributed application
development. You can use Ganache across the entire development cycle; enabling you to
develop, deploy, and test your Apps in a safe and deterministic environment.
9
Ganache comes in two flavors: a UI and CLI. Ganache UI is a desktop application
supporting both Ethereum and Corda technology. The command-line tool, ganache-cli
(formerly known as the TestRPC), is available for Ethereum development.
Ganache is used for setting up a personal Ethereum Blockchain for testing your Solidity
contracts. It provides more features when compared to Remix. You will learn about the features
when you work out with Ganache. Before you begin using Ganache, you must first download
and install the Blockchain on your local machine.
Solidity:
Ethereum (ETH):
10
• System Should show error message if the uploaded image is not QR code.
• Auto update of scanned location of the QR code.
• Storing all these details in blockchain nodes.
Usability:
The system must be easy to learn for manufacturers , retailers , distributors and
mainly for consumers.
Reliability:
The reliability of the device essentially depends on the software tools such as
metamask, remix IDE, Ganache used for the system development.
Performance:
The system shall allow the system administrator to add additional features. The
system needs to be cost-effective to maintain.
Safety:
In case of malfunction, scanning from the manufacturers side should be stopped , and
also it must be notified to others that it is not working.
11
CHAPTER 5
SYSTEM DESIGN
System architecture refers to the design and organization of software and hardware
components of a system to meet certain functional and non-functional requirements. The above
diagram represents the architecture of fake product detection using blockchain technology in
which it contains the fields like product manufacturer, generate record, add product details,
generate QR code, blockchain network, customer, register/login, scan QR code, show product
details. Firstly, product manufacturer will manufacture the product with unique identifier and
product name then generation of QR code is done based on the unique ID. The QR code is
appended to blockchain network through meta mask. Further, customer will scan the QR code
and get the authentication of product.
12
5.2 SYSTEM FLOW:
The main aim of this proposed system is to maintain the Genuity of the product by
helping the customer track the supply chain history of the product. System give customers the
power to track the history of an entire product from manufacturer to customer using blockchain.
This product anti-counterfeiting system based on Blockchain in composed of three roles, the
Manufacturer role, the Seller role, and the Consumer role, as discussed.
13
MANUFACTURER:
Manufacturer logs into the manufacturer account and generates QR Code for Product and adds
other required details of the product and by using his ethereum wallet, the manufacturer adds
a block to Ethereum blockchain. The user id of our local database and the wallet address of the
entity will be mapped together, if both the things are there, that is a manufacturer logs in from
his own account and uses his own wallet then only the block will be added to the digital ledger.
SUPPLIER:
Supplier logs into supplier account and scans the QR code on the product. The seller can access
information
about his products that the manufacturer has entered. It adds its own details of the product like
shop destination
and pushes it into the Blockchain. Those details can be viewed by the buyer.
CUSTOMER:
Customers can check the integrity of the product by scanning QR code which will list
the history of transactions and thus verifying the genuinity of the product. At the time of
customer purchasing the product after the QR scan in supply chain history, if the last location
is not matched with the purchase location, the customer will know that the product is not
genuine. It concludes that the QR code was copied and the customer becomes aware of
counterfeiting.
14
CHAPTER 6
UML DIAGRAM
UML, which stands for Unified Modeling Language, is a way to visually represent the
architecture, design, and implementation of complex software systems.
there are two main category structure diagrams and behavioral diagrams.
UML is used to specify, visualize, construct, and document the artifacts (major
elements) of the software system. It was initially developed by Grady Booch, Ivar Jacobson,
and James Rumbaugh in 1994-95 at Rational software, and its further development was carried
out through 1996.
UML diagrams can help system architects and developers understand, collaborate on,
and develop an application. High-level architects and managers can use UML diagrams to
visualize an entire system or project and separate applications into smaller components for
development.
15
6.1 USE CASE DIAGRAM:
Use-case diagrams describe the high-level functions and scope of a system. These
diagrams also identify the interactions between the system and its actors. The use cases and
actors in use-case diagrams describe what the system does and how the actors use it, but not
how the system operates internally.
The above figure 6.1, describes the functions that a system performs to achieve the
user’s goal. It describes how the actor(user) interacts with the system.
16
6.2 CLASS DIAGRAM:
Class diagrams are the blueprints of your system or subsystem. You can use class
diagrams to model the objects that make up the system, to display the relationships between
the objects, and to describe what those objects do and the services that they provide. Class
diagrams are useful in many stages of system design.
The above diagrams fig. 6.2, describes the class diagram of the system. It shows the
attributes and operations of various classes and it shows the dependency and multiplicity
among different classes.
17
6.3 SEQUENCE DIAGRAM:
The sequence diagram represents the flow of messages in the system and is also
termed as an event diagram. It helps in envisioning several dynamic scenarios. It
portrays the communication between any two lifelines as a time-ordered sequence of
events, such that these lifelines took part at the run time. In UML, the lifeline is
represented by a vertical bar, whereas the message flow is represented by a vertical
dotted line that extends across the bottom of the page. It incorporates the iterations as
well as branching.
The above fig. 6.3 depicts the sequence flow included with the time and it describes how the
system interacts with the user.
18
6.4 ACTIVITY DIAGRAM:
19
CHAPTER 7
IMPLEMENTATION:
The method of implementation deals with how the system being implemented, the
technologies involved in developing the software and executing the software. The
implementation phase comprises of several activities. The required hardware and software
acquisition is carried out. The system may require some software to be developed. For this,
programs are to be written and tested. The user can then change over to his new fully tested
system and the old system is discontinued.
Technologies Used The technologies that are used in the project are:
• Blockchain
• Solidity
• python
• my sql
• Android Studio
7.1 MODULES:
20
7.2 TESTING AND DEPLOYMENT:
• TESTNET DEPLOYMENT:
Deploy your solution on a testnet first to identify and fix any issues before
deploying on the Mainnet.
• USER TRAINING:
Train users on how to interact with the blockchain-based system.
21
CHAPTER 8
BLOCKCHAIN
Blockchain is collection blocks that are linked together which stores information. Each
block has a timestamp, transaction data and hash of its own and hash of previous block, so it is
difficult to tamper with data. Blockchain is a decentralized system. It ensures that every new
block added to the blockchain is the one and only true version that is agreed upon by all nodes
in the Blockchain. It refers to the collective maintenance of a technical solution that maintains
a continuous record file as a reliable database through decentralization.
22
8.2 BLOCKCHAIN FEATURES:
Blockchain can add data records to its database which does not depend on any
centralized authority as a arbitrator, instead it works on its own consensus algorithms.
Blockchain is openly available database and is highly reliable. The features of Blockchain
technology are described in detail below. The features of Blockchain are shown in figure 7.2.
• Security and privacy : Blockchain uses cryptography to secure its data. Private key
is used to sign the data, using public key we can verify whether the data has been
tampered or not and check its genuineness. A user should protect its private key similar
to bank OTP and passwords and prevent it from leaking to ensure the security of its
data on blockchain.
• Decentralized : In a decentralized blockchain network, no one has to know or trust
anyone else. Each member in the network has a copy of the exact same data in the form
of a distributed ledger. If a member’s ledger is altered or corrupted in any way, it will
be rejected by the majority of the members in the network.
23
• Untraceability : Once the block is entered into the blockchain, it cannot be tampered.
Due to this if the block in the Blockchain is altered and is immediately rejected or
deleted.
• Transparency: The data in Blockchain is completely public and can be viewed by
the participants.
• Flexibility: Being open source is one of biggest advantages of blockchain. Various
public and private blockchains are available to the users, which can be used based on
type of application which has to be created.
Blockchain increases trust as we don’t have to depend on any third party. The smart
contracts which are basically programs on blockchain are run only when certain conditions are
met. Since all the blocks stores its data along with hash of previous block it becomes difficult
to modify the blockchain with false information. If attacker changes information of block, it’s
hash also change but the hash of next block remains same. To alter chain would require the
consensus of more than half of the participants which is unlikely, since lots of resources and
financial amount is required. Also other members would come to know of this drastic change.
24
CHAPTER 9
CONCLUSION:
Blockchain is a decentralized system, therefore the local suppliers cannot interfere with
the checking or counterfeiting of the product in the proposed system. Manufacturers and
Suppliers can use the system to store product details in Blockchain which offers certain
properties such as tamper resistance, data consistency and confidentiality that assure the
security and privacy of the data on the network. The customer views the product supply chain
history and verifies if the product is genuine. Customers can be sure about the integrity of goods
they purchase. The proposed system can effectively lower the rate of counterfeiting of branded
goods and provide the companies with an easier approach to provide consumers with the
confidence that they will not purchase counterfeit goods. This system will help to build trust
and good bonding between manufacturer and customer and in deed it will help in improving
economy and reducing corruption. Further system can be extended to avoid frauds done in
banking, healthcare, voting system, online shopping and so on. In this semester we are
completed the design process for this project and next semester we will plan to do the
implementation process.
25
REFERENCES:
[1] Abdul Rawoof Khan, Aditi Sahay, Athmika BV, Lavanya MV ”Fake Product Detection
Using Blockchain ”,Vol.04,July-2022 , e-ISSN: 25825208.
[2] Ishaan” Singhal , Himanshu Singh Bisht , Yogesh Sharma”Anti Counterfeit Product System
Using Blockchain Technology ”, Vol.9, Dec 2021,ISSN: 2321-9653.
[3]. Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, and Hoaxing Wang,
“A Blockchain-Based Application System for Product Anti- Counterfeiting”, IEEE
Access,2020.
[4] Nruthya Ganapathy B ,Keerthan Kumar, Poojary Shreya Jaya, Rajath D Shetty, Dr.
Shreekumar T” Fake Product Detection Using Blockchain Technology ”,Vol.10, July
2022,ISSN: 2320-2882 .
[5] Savitha K R, Dr. Channa Krishna Raju, Dr. M. Siddappa3 ”Implementation of Anti-
Counterfeiting System Using Blockchain”,Vol.8,Aug 2021,eISSN: 2395-0056.
26