You are on page 1of 34

A Project Report

on
“Development of Anti-counterfeit System for Product Identification ”
Submitted to the
Savitribai Phule Pune University
In partial fulfillment for the award of the Degree of
Bachelor of Engineering
in
Information Technology
By
Mundkar Praveen (72018302C)
Onkar Gagare (72018056C)
Uday Chitalkar (7207998L)
Rohan Hoval (72018107M)

Under the guidance of

Mrs. Himani Patel

Department Of Information Technology


D. Y. Patil College of Engineering
Akurdi, Pune-44, Maharashtra, India
2022-2023

1
CERTIFICATE

This is to certify that the project report entitled “Development of Anti-counterfeit

System for Product Identification” being submitted by Group number: 28 is a record


of bonafide work carried out by him/her under the supervision and guidance of Mrs.
Himani Patel in partial fulfillment of the requirement for BE (Information Technology
Engineering) – 2019 courseof Savitribai Phule Pune University, Pune in the academic year
2022-2023.

Praveen Mundkar (72018302C)


Uday Chitalkar (72017998L)
Onkar Gagare (72018056C)
Rohan Hoval (72018107M)

Date:

Place:

Mrs. Himani Patel Dr. Preeti Patil


Guide Head of the Department

This project report has been examined by us as per the Savitribai Phule Pune University,
Pune, requirements at D.Y. PATIL College of Engineering on . . . . . . . . . . . .

(Name & Signature) (Name & Signature)


Internal Examiner External Examiner

2
ACKNOWLEDGEMENT

With immense pleasure, we present the Project report as part of the curriculum of the
B.E. Information Technology Engineering. We wish to thank all the people who gave
us an unending support right from when the idea was conceived.

We express sincere and profound thanks to Mrs. Himani Patel , and Dr. Preeti Patil,
Head Of Department, Information Technology who is ready to help with the most
diverseproblems that they have encountered along the way. We express sincere thanks to
all staff andcolleagues who have helped directly or indirectly in completing this seminar
successful.

STUDENT NAME SIGNATURE

Praveen Mundkar (72018302C)


Uday Chitalkar (72017998L)
Onkar Gagare (72018056C)
Rohan Hoval (72018107M)

3
ABSTRACT

Fake products have been a significant factor in the manufacturing of goods in recent
years. This has an impact on a company’s brand, sales, and bottom line. Blockchain
technology is used to identify genuine goods and identify counterfeit goods. The
distributed, decentralized, and digital ledger that houses transaction data is called
Blockchain technology. Many databases store information in the form of blocks that
are linked together via chains. Blockchain innovation is secure technology, therefore
no block can be altered or compromised. Blockchain technology allows for Customers
or users do not have to rely on other users to vouch for the security of the product.
Quick Response (QR) codes, a developing trend in wireless and mobile technologies,
were used in this project a strong strategy to combat the problem of product
counterfeiting. A QR code scanner is used to identify fake goods because each
product’s QR code is connected to a Blockchain. Therefore, this system may be utilized
to store product information and its produced unique code as database blocks.
It requests the user’s unique code, then checks it against entries in the Blockchain
database. If the code matches, the customer will receive notification; if not, the
consumer will receive notification that the product is a fake.

Keywords : Blockchain, Fake Product detection, QR Code etc


Contents
Certificate 2
Acknowledgement 3
Abstract 4
List of Figures 7

C. No. Chapter Page No


1. Introduction
1.1 Motivation
1.2 Problem definition
2. Literature survey
2.1 Study of research paper
3. Software Requirements Specification
3.1 Introduction
3.2 Project Scope
3.3 User classes and characteristics
3.4 Assumptions and Dependencies
3.5 Mathematical Modeling
3.6 Functional Requirements
3.6.1 System Feature
3.7 External Interface Requirement
3.7.1 User Interface
3.7.2 Hardware Interface
3.7.3 Software Interface
3.8 Non Functional Requirement
3.8.1 Performance Requirements
3.8.2 Saftey Requirement
3.8.3 Software Quality Attribute
3.8.4 Security Requirements
3.9 System Requirements
3.9.1 Software Requirements
3.9.2 Hardware Requirements
3.10 Analysis Model (SDLC Model)
4. System Design
4.1 System Architecture
4.1.1 Data Flow Diagram
4.2 UML Diagrams
5. Other Specification
5.1 Advantages
5.2 Limitations
5.3 Applications
6. Conclusions and Future Work

Annexure
Appendix A
Appendix B
7 References
List of Figures
Sr. No. Name of Figures Page No.
3.1 Waterfall Model
3.2 Timeline Chart
4.1 System Architeture
4.2 Data Flow Diagram
4.3 Data Flow Diagram
4.4 Data Flow Diagram
4.5 Use Case Diagram
4.6 Activity Diagram
4.7 Sequence Diagram
4.8 Class Diagram
CHAPTER 1
INTRODUCTION
1.1MOTIVATION

There The dissemination of counterfeit goods has expanded globally in recent years. The
existingsupply chain contains a large number of counterfeit goods. The survey claims that
occurrences of bogus products have increased recently. It is essential to have a system in
place that allows buyers or users to verify all the product’s specifications so they can
determine whether the item is authentic or not. There is currently no system in place in
India to identify fake goods. Therefore, the solution entails a straightforward QR code-
based identification that can assist theend-user or customers in scanning and verifying the
product’s authenticity using a smartphone.

1.1 PROBLEM DEFINITION

Risk factors like forging and duplication frequently accompany the global enhancement
of a product or innovation. The reputation of the company and the well-being of the
customer can both be affected by forging. Nowadays, finding fake items is the biggest test.
False goods have aserious negative effect on the organization and the clients’ welfare. As
a result, product makers are facing severe hardship. India and other countries are fighting
against such phoney and counterfeit goods. The suggested framework generates QR
codes by employing Blockchain technology. Blocks are used to hold exchange records in
this innovation. Data stored in these squares cannot easily be accessed or changed. A QR
code can be used to identify bogus goods.

1.2 OBJECTIVES

• This project's concept originated as a result of the rise in counterfeit goods.

• The project's goals are to develop a anti-counterfeit system.

• To use a QR code to safeguard product information. By making data available to


clients, you may give them security.
• Manufacturers can use the system to store information of products will sale and
buying inBlockchain which is accessible to everyone.

8
CHAPTER 2
LITERATURE SURVEY

2.1 STUDY OF RESEARCH PAPER

A research paper is a document of a scientific article that contains relevant expertise, including
substantive observations, and also references to a specific subject of philosophy and technique.
Use secondary references are reviewed in literature and no current or initial experimental work
is published.

1. Paper Name: A Blockchain-Based Application System for Product Anti-Counterfeiting

Author: JINHUA MA , SHIH-YA LIN , XIN CHEN , HUNG-MIN SUN , YEHCHENG

CHEN , (Graduate Student Member, IEEE) AND HUAXIONG WANG

Abstract :In recent years, blockchain has received increasing attention and numerous
applications have emerged from this technology. A renowned Blockchain application is the
cryptocurrency Bitcoin, thathas not only been effectively solving the double-spending problem
but also it can confirm the legitimacy of transactional records without relying on a centralized
system to do so. Therefore, any application using Blockchain technology as the base
architecture ensures that the contents of its data are tamper-proof. This paper uses the
decentralized Blockchain technology approach to ensure that consumers do not fully rely on
the merchants to determine if products are genuine. We describe a decentralized Blockchain
system with products anti-counterfeiting, in that way manufacturers can use this system to
provide genuine products without having to manage direct-operated stores, which can
significantly reduce the cost of product quality assurance.

9
2. Paper Name:A Block Chain based Management System for Detecting
CounterfeitProduct in Supply Chain
Author: Mrs.M.C.Jayaprasanna, Ms.V.A.Soundharya, Ms.M.Suhana, Dr.S.Sujatha
Abstract :In recent years, Counterfeit goods play a vital role in product manufacturing
industries. This Phenomenon affects the sales and profit of the companies. To ensure the
identification of real products throughout the supply chain, a functional block chain
technology used for preventing product counterfeiting. By using a block chain technology,
consumers do not need to rely on the trusted third parties to know the source of the
purchased product safely. Any application that uses block chain technology as a basic
framework ensures that the data content is ‘tamperresistant’. In view of the fact that a block
chain is the decentralized, distributed and digital ledger that stores transactional records
known as blocks of the public in several databases known as chain across many networks.
Therefore, any involved block cannot be changed in advance, without changing all
subsequent block. In this paper, counterfeit products are detected using barcode reader,
where a barcode of the product linked to a Block Chain Based Management (BCBM) system.
So the proposed system may be used to store product details and unique code of that product
as blocks in database. It collects the unique code from the customer and compares the code
against entries in block chain database. If the code matches, it will give notification to the
customer, otherwise it gets information from the customer about where they bought the
product to detect counterfeit product manufacturer.

10
3. Paper Name: Identifying Counterfeit Products using Blockchain Technology in Supply
Chain System.
Author: Nafisa Anjum,Pramit Dutta

Abstract :With the advent of globalization and the ever growing rate of technology, the
volume of production as well as ease of procuring counterfeit goods has become
unprecedented. Be it food, drug or luxury items, all kinds of industrial manufacturers and
distributors are now seeking greatertransparency in supply chain operations with a view to
deter counterfeiting. This paper introduces a decentralized Blockchain based application
system (DApp) with a view to identifying counterfeit products in the supply chain system.
With the rapid rise of Blockchain technology, it has become known that data recorded
within Blockchain is immutable and secure. Hence, the proposed project here uses this
concept to handle the transfer of ownership of products. A consumer can verify the product
distribution and ownership information scanning a Quick Response (QR) code generated by
the DApp for each product linked to the Blockchain.

11
4. Paper Name: BLOCKCHAIN BASED FAKE PRODUCT IDENTIFICATION SYSTEM

Author Name: Swaroop Jambhulkar, Harsh Bhoyar, Shantanu Dhore, Arpita Bidkar, Prema
DesaiAbstract: There are many fake products in the existing supply chain. It is necessary to
have a systemfor end user to check all details about product that they are buying so that the
customer can check if the product is genuine or not. In recent years, Counterfeit products
play an important role in product manufacturing industries. This affects the company name,
sales, and profit of the companies. Block technology is used to identification of real products
and detects fake products. Blockchain technology is the distributed, decentralized and digital
ledger that stores transactional information in the form of blocks in many database/node-
computers which is connected with the chains. Blockchain technology is secure as the data
stored once in the chain is immutable thereforeany block cannot be changed or hacked. By
using Blockchain technology, customers or users do not need to rely on thirdparty users for
confirmation of product authenticity and safety. Our System provides the emerging
technology of web use cases, Quick Response (QR) codes provide a robust technique to fight
the practice of counterfeiting the products. Counterfeited products can be detectedusing a QR
code scanner, where a QR code of the product is linked to Blockchain. So, this system may
be used to store product details and generated unique code of that product as blocks in
database.It collects the unique code from the user and compares the code against entries in
the Blockchain database. If the code matches, it will give all the information of the product
otherwise no informationwill be outputted to the customer which shows that the product is
fake or counterfeited.

12
5. Paper Name: Fake Product Detection Using Blockchain Technology

Author: Tejaswini Tambe , Sonali Chitalkar , Manali Khurud , Madhavi Varpe , S. Y. Raut
Abstract: In recent years, Counterfeit products play an important role in product
manufacturing industries. This affects the companies name, sales, and profit of the
companies. Blockchaintechnology is used to identification of real products and detects fake
products. Blockchain technology is the distributed, decentralized, and digital ledger that
stores transactional informationin the form of blocks in many databases which is connected
with the chains. Blockchain technology is secure technology therefore any block cannot be
changed or hacked. By using Blockchain technology, customers or users do not need to rely
on third-party users for confirmation of productsafety. In this project, with emerging trends
in mobile and wireless technology, Quick Response (QR) codes provide a robust technique
to fight the practice of counterfeiting the products. counterfeit products are detected using a
QR code scanner, where a QR code of the product is linkedto a Blockchain. So this system
may be used to store product details and generated unique code of that product as blocks in
the database. It collects the unique code from the user and compares the code against entries
in the Blockchain database. If the code matches, it will give a notification to the customer,
otherwise it will give the notification to the customer that the product is fake.

13
CHAPTER 3
SOFTWARE REQUIREMENTSSPECIFICATION

3.1 INTRODUCTION

The global growth of a technology or product is always fraught with risk in the rapidly
evolving world of technology. Forgery and duplication, which can harm a company’s
reputation and financial performance, and client well-being. The main goal of the project is
to confirm that the customer’s purchased item is as described in the fake or genuine We
have the conventional supplychain in comparison to Blockchain. Typical supply chains offer
centralized network where the firmproviding the service or the products holds the data they
control the market and the data, making them vulnerable because they can manipulate it
anyway they like. Blockchain technology aids in addressing the issue of product
counterfeiting. Technology based on Blockchain is more secure. Achain will be constructed
for that product’s transactions once it is stored on the network, making it possible to keep
all transaction records for both the product and its present owner. In the Blockchain, all
transaction histories will be kept as blocks. In the suggested system, each product is given a
generated QR code that the end user can scan. the product’s full details by scanning theQR
code. We can tell whether a product is genuine or phoney by scanning the QR code.

3.2 PROJECT SCOPE

• To track every genuine product that is to be sold. Implement this idea in other fields.
• Virtual transactions. Using tamper-proof tags Dynamic (read & write NFC tags) QR
codes thathave secure graphic
• Implement our own tokens which can be sold to users so that they can purchase
ownership of aproduct using tokens which helps in insurance processional's

14
3.3 USER CLASSES AND CHARACTERISTICS

Fast Accurate prediction: Logos can be identified quickly due to the machine’s ability to
learn from experience with the CNN algorithm. Reduce human errors of identifying whether
the product is original or fake is the right of every purchaser. A Human may err while
selecting the product just by looking at the logo, but Deep Learning (DL) models will
provide accurate results.
Go through these telltale signs that can help you identify an original from a counterfeit, and
makesure you are not taken for a ride.

3.4 ASSUMPTIONS AND DEPENDENCIES

Assumption: To generate a hash SHA256 algorithm can be used.

Dependencies: JSP Servlet, Mining, P2P Verification, Validate Majority, Recovery.

3.5 MATHEMATICAL MODELING

Let S be the Whole system S= I,P,O I-input P-procedure O-output


Input( I) I= Fake Product Data Where, Data contain Real or Fake products. Procedure (P),
P=I, Using I System perform operations and Identify the Fake Product using QR Code a
Blockchain
Output(O)- O=System Identify the Fake or real Product.

3.6 FUNCTIONAL REQUIREMENTS

3.6.1 System feature

1. Database: The Personal details of sender and receiver also account details of sender
and receiver are stored in database.

2. User: User do the registration on the system for QR code scan.

3. System: In system, Blockchain technology is used to identification of real products


and detects fake products

15
3.7 EXTERNAL INTERFACE REQUIREMENT

3.7.1 User Interface

To identification of real products and detects fake products.

3.7.2 Hardware Interfaces:

• RAM : 8 GB

• RAM minimum required is 8 GB.

• Hard Disk : 40 GB

• Processor : Intel i5 Processor

3.7.3 Software Interfaces

• Programming Language : Java


• Operating System : Windows 10

16
3.8 NON FUNCTIONAL REQUIREMENT

3.8.1 Performance Requirements

 The performance of the functions and every module must be well. The overall
performance of thesoftware will enable the users to work efficiently.
 Performance of encryption of data should be fast.
 Performance of the providing virtual environment should be fast Safety Requirement.
 The application is designed in modules where errors can be detected
and removed easily.This makes it easier to install and update new
functionality if required.

3.8.2 Safety Requirement

The application is designed in modules where errors can be detected and fixed
easily.This makes it easier to install and update new functionality if required.

3.8.3 Software Quality Attributes

• Our software has many quality attribute that are given below:-

• Adaptability: This software is adaptable by all users.

• Availability: This software is freely available to all users. The availability of the
software is easyfor everyone.

• Maintainability: After the deployment of the project if any error occurs then it can
be easilymaintained by the software developer.

17
• Reliability: The performance of the software is better which will increase the
reliability of theSoftware.

• User Friendliness: Since, the software is a GUI application; the output generated is
much userfriendly in its behavior.

• Integrity: Integrity refers to the extent to which access to software or data by


unauthorized personscan be controlled.

• Test ability: The software will be tested considering all the aspects.

3.8.4 Security Requirements:

Users are authenticated using many security phases so reliable security is provided.

3.9 SYSTEM REQUIREMENTS

3.9.1 Software requirements

• RAM : 8 GB

• RAM minimum required is 8 GB.

• Hard Disk : 40 GB

18
3.9.2 Hardware requirements

• Processor : Intel i5 Processor

• Programming Language : Java

• Operating System : Windows 10

3.10 ANALYSIS MODEL (SDLC MODEL)

Figure 3.1: Waterfall Model

19
CHAPTER 4
SYSTEM DESIGN
4.1 SYSTEM ARCHITECTURE

Figure 4.1: System Architecture

4.1.1 Data Flow Diagram

In Data Flow Diagram,we Show that flow of data in our system in DFD0 we
show that base DFD in which rectangle present input as well as output and
circle show our system,In DFD1 we show actual input and actual output of
system input of our system is text or image and output is rumor detected like
wise in DFD 2 we presentoperation of user as well as admin.

20
4.1.1.1 Data Flow Diagram Level 0

Figure 4.2: Data Flow diagram

Fig.4.3 Data flow Diagram

21
Fig 4.4 Data flow diagram

22
4.2 UML DIAGRAMS

Unified Modelling Language is a standard language for writing software


blueprints. The UML may be used to visualize, specify, construct and
document the artifacts of a software intensive system. UML is process
independent, although optimally it should be used in process that is use case
driven, architecture enteric, iterative and incremental. The Number of UML
Diagram is available.

• Use case Diagram.

• Component Diagram.

• Activity Diagram.

• Sequence Diagram.

23
Figure 4.5: Use case Diagram

24
Figure 4.6: Activity Diagram

25
Figure 4.7: Sequence Diagram

26
Figure 4.8: Class Diagram

27
CHAPTER 5
OTHER SPECIFICATION

5.1 ADVANTAGES

• This enables not only customs officials to detect counterfeits, any customer would be
able todo that using the detection app.
• Inexpensive.
• Save time.
• Environmental factors are not an issue.

5.2 LIMITATIONS

• Fake product is a real problem in today’s world, And it has become more extensive and
harderto identify.
• A major challenge in fake news detection is to detect it in the early phase.
• Another challenge in fake product detection is the unavailability or the shortage of
labeled datafor training the detection models.

5.3 APPLICATIONS

• Shops
• Malls

28
CHAPTER 6
CONCLUSION AND FUTUREWORK

6.1 CONCLUSION

With the vast range of products available online, fake items are expanding tremendously.
Therefore, there is a critical need to identify phoney goods, and Blockchain technology is
employed to do so. Additionally, a QR code with the information has been created.
Customers or consumers can identify a phoney product after scanning the QR code. So, in
this article, we talked about a system that helps consumers determine whether a product is
real or not by looking at its entire supply chain history. End users can scan QR codes
assigned to products to access allthe data that has been posted across the supply chain in
the Blockchain, allowing them to determine whether or not a product is genuine or not.
In future,to track every genuine product that is to be sold. Implement this idea in
other fields.Virtual transactions. Using tamper-proof tags Dynamic (read write NFC
tags) QR codes that havesecure graphic Implement our own tokens which can be sold to
users so that they can purchase ownership of a product using tokens which helps in
insurance processing.

29
ANNEXURE
APPENDIX: - A
What is P? • P is set of all decision problems which can be solved in polynomial time by a
deterministic.
• Since it can be solved in polynomial time, it can be verified in polynomial time.
• Therefore P is a subset of NP. P

A novel abstractive multi-document summarization system based on chunk-graph (CG)


and recurrent neural network language model (RNNLM). A CG which is based on word-
graph is constructed to organize all information in a sentence cluster, CG can reduce the
size of graph and keep more semanticinformation than word-graph. System outperforms all
baseline systems and reach the state-of-art systems, and the system with CG can generate
better summaries than that with ordinary word-graph.

30
What is NP?
• “NP” means “we can solve it in polynomial time if we can break the normal rules of step-

by-stepcomputing”.

What is NP Hard?
A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-
problem(nondeterministic polynomial time) problem. NP-hard therefore means “at least as hard
as any NP problem,” although it might, in fact, be harder.

Np-Hard:
A CG which is based on word-graph is constructed to organize all information in a sentence
cluster, CG can reduce the size of graph and keep more semantic information than word-graph.
We use beam search and character-level RNNLM to generate readable and informative
summaries from the CG for each sentence cluster, RNNLM is a better model to evaluate
sentence linguistic quality than n-gram language model. the system with CG can generate better
summaries than that with ordinary word-graph.

31
What is NP-Complete? Since this amazing “N” computer can also do anything a normal computer
can,we know that “P” problems are also in “NP”.

• So, the easy problems are in “P” (and “NP”), but the really hard ones are only in “NP”, and

they arecalled “NP-complete”.

• It is like saying there are things that People can do (“P”), there are things that Super People can do
(“SP”),and there are things only super people can do (“SP complete”).

NP-Complete:

As our system is in developing state so we can’t say that our system is currently in NP complete state

Ideas of pattern-growth in uncertain environment:


The ideas of pattern-growth in uncertain environment, two alternative algorithms are designed
to discover all the STP candidates with support values for each user. That provides a trade-off
between accuracy and efficiency. The user-aware rare pattern concerned here is a new concept
and a formal criterion must be well defined, so that it can effectively characterize most of
personalized and abnormalbehaviors of Internet users.

32
APPENDIX B
[1]. G. Vidhya Lakshmi, Subbarao Gogulamudi, Bodapati Nagaeswari, Shaik
Reehana, “Blockchain Based Inventory Management by QR Code Using Open
CV”,
International Conference on Computer Communication and Informatics (ICCCI 2021)
Coimbatore, INDIA,
Jan. 27 – 29, 2021.

[2]. Abhinav Sanghi, Aayush, Ashutosh Katakwar, Anshul Arora, Aditya


Kaushik,“Detecting Fake Drugs using Blockchain”, International Journal of
Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-10
Issue-1, May 2021.

[3]. Miguel A. Prada-Delgado, Gero Dittmann, Ilie Circiumaru, Jens Jelitto “A blockchain-
based crypto-anchor platform for interoperable product authentication”, EEE International
Symposium on Circuits and Systems (ISCAS),2021.

[4]. Mrs S. Thejaswini, Ranjitha K R, “Blockchain in Agriculture by using


Decentralized Peer to Peer Networks”,Proceedings of the Fourth International Conference on
InventiveSystems and Control (ICISC 2020),2020.

[5]. Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, and Huaxiong
Wang, “ABlockchain-Based Application System for Product Anti- Counterfeiting”, IEEE
Access,2020.

33
Chapter 7
References

[1]. Fake Product Detection using Blockchain

Publisher: IEEE

P.M. Lavanya; N. Ananthi; K. Kumaran; M. Abinaya; B. Kalaivani; V. Krithika;

[2]. Fake Product Detection Using Blockchain Technology

Tejaswini Tambe, Sonali Chitalkar 12, Manali Khurud [3], Madhavi Varpe, S. Y. Raut

[3]. Product Identification Using blockchain

Sushil Kumar', Vikas Gupta', Yash Pachori', Rishabh Sharma', Anshika Agarwal¹

Department of Computer Science and Engineering, Krishna Engineering College,

Ghaziabad, India

[4]. Blockchain Based Fake Product Identification in Supply Chain

Ajay Funde¹, Pranjal Nahar², Ashwini Khilari³, Nikhil Marne, Ms. Nikhita Nerkars

1234( Department of Computer Engineering), R.M.D Sinhgad College of Engineering


Pune,

34

You might also like