Submit Search
Upload
Fake Product Identification using Blockchain Technology
•
0 likes
•
17 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i1/IRJET-V10I1143.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
IRJET Journal
IRJET - Food Supply Chain Management using Blockchain in Food Traceability
IRJET - Food Supply Chain Management using Blockchain in Food Traceability
IRJET Journal
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
IRJET Journal
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
Comparative Study on Identifying of Fake Product
Comparative Study on Identifying of Fake Product
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
Recommended
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
IRJET Journal
IRJET - Food Supply Chain Management using Blockchain in Food Traceability
IRJET - Food Supply Chain Management using Blockchain in Food Traceability
IRJET Journal
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
IRJET Journal
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
Comparative Study on Identifying of Fake Product
Comparative Study on Identifying of Fake Product
IRJET Journal
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
QR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
IRJET Journal
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
Digital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
IRJET Journal
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...
IRJET Journal
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET Journal
IRJET - BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
IRJET Journal
Product Serialization using Blockchain
Product Serialization using Blockchain
IRJET Journal
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
Blockchain Based Online Voting System
Blockchain Based Online Voting System
IRJET Journal
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
IRJET Journal
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET Journal
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Fake Product Identification using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET Journal
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
IRJET Journal
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
Digital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
IRJET Journal
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...
IRJET Journal
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET Journal
IRJET - BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
IRJET Journal
Product Serialization using Blockchain
Product Serialization using Blockchain
IRJET Journal
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
IRJET Journal
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
Blockchain Based Online Voting System
Blockchain Based Online Voting System
IRJET Journal
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
IRJET Journal
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET Journal
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
IRJET Journal
Similar to Fake Product Identification using Blockchain Technology
(20)
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
Digital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
A Barcode-Based Prototype Authentication System Using Python Programming and ...
A Barcode-Based Prototype Authentication System Using Python Programming and ...
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET- Blockchain based Fake Product Identification in Supply Chain
IRJET - BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
Product Serialization using Blockchain
Product Serialization using Blockchain
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
Blockchain Based Online Voting System
Blockchain Based Online Voting System
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
Real-life Application of a Decentralized System
Real-life Application of a Decentralized System
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
IRJET - Blockchain Application Used in Enhance Technology from Cryptocurr...
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
result management system report for college project
result management system report for college project
Tonystark477637
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Suman Jyoti
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
ManishPatel169454
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
timesproduction05
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
DerechoLaboralIndivi
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
rknatarajan
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Recently uploaded
(20)
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
result management system report for college project
result management system report for college project
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
NFPA 5000 2024 standard .
NFPA 5000 2024 standard .
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Fake Product Identification using Blockchain Technology
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 848 Fake Product Identification using Blockchain Technology G. Neeraj1, D. Rahul2, P. Anurag3, V. Pranav4 1 Graduate, Dept. of Computer Science Engineering, Matrusri Engineering College, Telangana, India 2Graduate, Dept. of Electronics and Communication Engineering, Sreenidhi Institute of Science and Technology, Telangana, India 3Graduate, Dept. of Computer Science Engineering, Matrusri Engineering College, Telangana, India 4Graduate, Dept. of Computer Science Engineering, Matrusri Engineering College, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Counterfeit products havebeen quicklyexpanding in recent years, as we all know. Counterfeiting is a global problem that affects social and economic growth worldwide, accounting for 3.3% of global commerce, according to OECD figures. These items are sometimes referredtoas"firstcopies," and they can be marketed in place of original products. We have various online purchasing platforms such as Flipkart, Amazon, and others where customers buy things, which are then sent by the manufacturer and delivered to the consumer. However, many third parties are engaged in the process between manufacturing and delivery, such as warehouses. Because these third parties are engaged, unlawful product tampering may occur, resulting in losses for both the corporation and the customer. Theprimarygoalofthisproject is to identify counterfeit items and ensure efficient product delivery processes. Counterfeiting may be dangerous in some businesses, such as the medical industry, thus identifying counterfeit items and stopping themfrombeingsoldiscritical. A blockchain is a decentralized ledger that records allpeer-to- peer transactions. Participants can confirm transactions without the requirement for a centralized authority usingthis technology. Fund transfers, trade settlement, voting, and a variety of other challenges are all possible uses. We are attempting to introduce this immutable technologytoidentify counterfeit products in this project. QR codes are also used to store hash codes and determine their authenticity. Key Words: Blockchain, QR codes, Fake Products, Tamper, Ledger 1. INTRODUCTION Fake products have a significantdetrimental influenceon the market for both consumers and sellers. The sellers fail to provide the goods as per the buyers' expectations, and the consumers begin to suspect the company's quality and standards, resulting in poor marketing of the brand whose counterfeit items are being distributed in the market. The most dangerous aspect of counterfeit items is that they may be extremely detrimental to users. Because fake or counterfeit items are not limited to any single area of the market, we must recognize these products and find a strategy to keep them out of the market. When we examine dominating sectors like pharmaceuticals and food supplies, these items may be quite risky. To address such issues, we must retain data that is freely available to customers, allowing them to check product details and establish a level of trust in the product's legitimacy. Counterfeit items must be identified in the supply chain since, in thepharmaceutical industry, if this is not done, the customermaybeputatgrave risk. To avoid this, we are employing blockchain technology, which is immutable and decentralized and may be very useful in detecting fake products. If a third party is involved in tampering with the data, we can easily identify it using this technology. We also implemented a QR code that the consumer scans to evaluate if the product is genuine or counterfeit. 1.1 Blockchain: A blockchain is a continual record, known as a block, that is cryptographically linked together. A cryptographic hash of the preceding block, a timestamp, and transaction data are all included in each block. The timestamp verifies that the transaction data existed at the moment the block was released, allowing the hash to be calculated. Because each block contains information about the one before it, they create a chain, with each new block strengthening the preceding ones. As a result, blockchains areresistanttodata tamperingsince the data in any one block, once recorded, cannot be changed retrospectively without affecting all subsequent blocks.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 849 2. METHODOLOGY This project is primarily separated into two modules: 1) Manufacturer 2)Consumer/user After logging in, the manufacturer will input product data such as product id, name, and company name. The information entered by the manufacturer is saved in blocks. The SHA-256 algorithm is used to generate the hash code when this information is included. This hash code is used to generate a QR code, which is printed on the merchandise. The user will receive this QR code after purchasing the product, which he may scan with a web camera ora QR-code scanner that was previously imported. If the hash code within the blockchain and the hash code generated after scanning is the same, the product is considered to be original, and the consumer will be presented with product data otherwise, it detects that the product is counterfeit. This way, we'll know where the product was tampered with and who was accountable. Fig.1 System Architecture Diagram We have implemented our project using python, Tkinter as UI, MySQL database and XAMPP local server. We have implemented blockchain using the following steps: The information will be saved in the JSON format, which is characterised by its simplicity both in terms of its implementation and its readability. A block is used to store the data, and inside that block are numerous copies of the data. Every minute, many blocks are added, and to distinguish onefrom the other, we will use fingerprinting to distinguish between them. This process is carried out using hash, and the SHA256 hashing method will be used in particular for this purpose. Every block will have its unique hash, as well as the hash of the function that came before it, making it impossible for the data to be manipulated. Current block hash will be the previoushashfor the next block and so on this way blocks are connected to form a chain Fig.2 Chaining of Blocks in Blockchain Proof of work method is included, making it way more difficult to perform operationstocreatea new block and add it to the chain. This indicates that anybody who edits a prior block will need to repeat the work associated with that block as well as the work associated with all of the blocks that follow it. We can restrict it furthermore by increasing the difficulty associated with creating blocks. List of important libraries imported: Libraries required for UI: from Tkinter import message box from tkinter import * from tkinter import simpledialog import tkinter from tkinter import filedialog from tkinter.filedialog import askopenfilename Importing blockchain and block files: from Block import * from Blockchain import *
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 850 Importing SHA-256 for hashing: from hashlib import sha256 Importing functions related to QR-code: import qrcode import qrtools 3. RESULTS: Fig.3 Output Module This is the main module, where u get two modules included. i.e., Admin module and user module 3.1 Admin Module Fig:3.1.1-Admin Module Fig 3.1.2 Login Page Before getting into the admin module, u need to log in with valid credentials. If you have not registered before then u canregister yourself with valid proofs! Fig 3.1.3 Information Page After login, u get into the admin module w you(the manufacturer) add the productdetailswitha uniqueproduct ID. This information is stored in a single block andthatblock adds up to the existing blockchain.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 851 Fig 3.1.4 After adding the product details by the manufacturer in the admin module, a respected QR code is generated and stored in the local system and also displayed on the module screen. This QR code is nothing but the hash of the product block which is added to the blockchain. Fig 3.1.5 Fig 3.1.6 We can also retrieve the data using ProductID from the blockchain in the Admin module. Fig 3.1.5 - When we retrieve the validProductID, we get the details with the respectedQRcodedisplayed on the screen. Fig 3.1.6 - If we try to retrieve with fake ProductID, then we get an error saying that the given product ID doesn’t exist. 3.2 User Module After the product is added to the blockchain, theusercan use the user module to validate the product with a QR code!! Fig-3.2.1 Fig 3.2.2
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 852 Here we have two ways to Authenticate the product with a QR code! Fig 3.2.1 - Using the system stored QR codes Fig 3.2.2 - Using the webcam/camera to scan the QR codes Fig – 3.2.3 If the Validation was successful, then the details gonna retrieve from the blockchain and displayed in the module. Fig-3.2.4 Fig – 3.2.5 If we try to validate with the fake QR codes Fig 3.2.4 - Validating with a fake QR code which is stored in the system. Fig 3.2.5 - Validating the fake QR code with the Webcam/camera Fig 3.2.6 Fig 3.2.7 Then we get the result that the hash is not present in the blockchain with the data in that QR code respectively. Fig 3.2.6 - Validating with fake QR code we got the respected data present in the QR code (i.e., website called Investopedia) and also anerror,asthehashis not present in the blockchain. Fig 3.2.7-Validating the fake QR code with the Webcam/camera code we got the respected data present in the QR code (i.e., a website called Wikipedia) and also an error as the hash is not present in the blockchain. 4. CONCLUSION: With the use of this technology, the path that a producttakes from the factory to the end user maybedocumented,andthe user would have the peace of mind of knowingthatthescans
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 853 were not falsified. The manufacturer can demonstrate that their product is genuine and is also in a position to trace the course of the product. The configuration is simple to build and uses fewer references to keep running. It is very important to implement this product in health-related markets to prevent fraudsters from producing harmful products that can be harmful. 5. REFERENCES: [1] Satoshi Nakamoto, ―Bitcoin: A Peer-to-Peer Electronic Cash System‖, 2008 [2] Hyperledger, ―Hyperledger Blockchain Performance Metrics‖, V1.01, October 2018 [3] R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980. [4] Armin Ronacher, ―Flask Docs‖, http://flask.pocoo.org/docs/‖ [5] G. Wood, ‗‗Ethereum: A securedecentralisedgeneralized transaction ledger,‘‘ Tech. Rep., 2014. [6] OECD (2016), Illicit Trade: Converging Criminal Networks, OECD Reviews of Risk Management Policies, OECDPublishing,Paris,https://doi.org/10.1787/978926425 1847-en. [7] M. Castro and B. Liskov, ‗‗Practical byzantine fault tolerance and proactive recovery,‘‘ ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398–461, Nov. 2002. [8] Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti, ‗‗Making byzantine fault tolerantsystemstoleratebyzantine faults,‘‘ in Proc. 6th USENIX Symp. Netw. Syst. Design Implement., 2009, pp. 153–168. [9] Cachin, ‗‗Architecture of the hyper ledger blockchain fabric,‘‘ Tech. Rep., Jul. 2016. [10] S. Underwood, ―Blockchain Beyond Bitcoin‖, in Communications of the ACM, vol. 59, no. 11, p. 15-17, 2016. [11] Deloitte, Israel: A Hotspot for Blockchain Innovation, 2016.[Online].Available: https://www2.deloitte.com/content/dam/ Deloitte/il/Documents/financial- services/israel_a_hotspot_for_blockchain_innovation_ feb2016_1.1.pdf. [Accessed: 2.11.2016]. [12] G. Greenspan and M. Zehavi, Will Provenance Be the Blockchain‘s Break Out Use Case in 2016?7.1.2016.[Online]. Available: http://www.coindesk.com/ provenance- blockchain-tech-app/. [Accessed: 12.12.2016]. [13] Counterfeit medicines. QA counterfeit. World Health Organization (WHO) 2009. Available from: http://www.who.int/medicines/ services/counterfeit/faqs/QACounterfeit-october2009.pdf [last cited on 2010 Jun 12]. BIOGRAPHIES G . Neeraj is a Computer Science Graduate student from Matrusri Engineering College. After Graduation, he is working as Machine Learning Engineer at Quantiphi, Bengaluru, India Pittala Anurag Sharma is a Computer Science Graduate student from MatrusriEngineering College. After Graduation, he is working at HSBC as a Software Engineer, in Pune, India. Pranav Vuppala is a Computer Science Graduate student from Matrusri Engineering College. After Graduation, He is working as an Assistant Graduate System engineer trainee at Tata consultancy services, Hyderabad, India. Deevanapalli Rahul is an Electronics and Communication Engineering Graduate Student from Sreenidhi InstituteofScience and Technology, Hyderabad, Telangana.
Download now