Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.12 Issue.2

Submission
Last date
28-Apr-2026
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-12,Issue-2. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY
PaperId: :  21228
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 9 Issue 4 2023
DUI:    16.0415/IJARIIE-21228
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
BHARATH KUMAR G MAMC Engineering college, Banglore
BARNALI CHAKRABOTYAMC Engineering college, Banglore

Abstract

MCA
counterfeit, block chain, identification
With the increasing globalisation and the quickening pace of technological advancement, the quantity of production and the ease of finding counterfeit products have increased to vast range levels. To deter counterfeiting of food, drugs, or luxury products, all sorts of industrial manufacturing and distribution companies are now seeking greater transparency in supply chain activities.. In order to detect fake goods in the supply chain system, this article offers a decentralized Blockchain-based application system (DApp). Due to the rapid advancement of Blockchain systems, it is now widely accepted that the records kept there is safe and unalterable. Therefore, the project that is being proposed here uses this concept to deal with the transfer of ownership of products. A customer can verify the distribution and ownership details of the products by scanning a Quick Response (QR) code generated by the DApp for each product linked to the Blockchain Index Terms: Counterfeit, Supplychain, Blockchain, Ethereum, QR Code. tool in the fight against counterfeiting. End users may quickly and accurately identify counterfeit goods by comparing them to trained models thanks to automatic image and text recognition and classification of product information. [4]. In this study proposed by De Li et al.(2017) a brand-new anti-counterfeiting method and a highly reliable digital watermarking technique were proposed. We used a QR code as the carrier image, which is created using the pertinent data of the copyright owner, and added the owner's information as a watermark on the QR code. After that, we used watermark detection and two-dimensional bar code scanning techniques to extract the watermark data from the QR code. We could evaluate watermark information and scanning data to confirm its validity in order to meet the goal of anti- counterfeiting. The experiment demonstrated the method's resistance to attacks such as compressive, rotational, and noise attack. [5]. The pharmaceutical supply chain can easily track the history of drugs thanks to blockchain technology. The fact that the blocks in a blockchain are timestamped and immutable, making data tampering impossible, are two key features that make data on a blockchain secure and safe. A blockchain can be either public or private for an organisation. On these blockchains, the parties engaged in the production and distribution of the drug will share a distributed ledger. Additionally, these blockchains only offer restricted access, which is dependent on the parties' data-sharing agreement. We can fully trace the movement of pharmaceuticals via blockchain, from manufacturers to final users in the system proposed by Kumari K & Saini K. (2019) The block supply chain stores the information each time the medicine moves from one entity to another. This makes medicine tracing simple and aids in the fight against industry-wide counterfeiting [6] This study proposed by Shreekumar et al. (2022) uses blockchain and supply chain technologies to demonstrate a contemporary and practical phenomenon. These technologies already provide high levels of security and transparency for the system, but this study adds some additional characteristics by using one-time password (OTP) authentication to confirm the legitimacy of supply chain participants and products and to update product information in the block. It becomes ingrained in people to read product reviews before making a purchase[3], especially prospective buyers. Positive customer feedback can result in substantial financial gains for a firm, which can be used as information when making decisions on how to create products and what services to offer clients. The fraudsters attempted to take advantage of the current system by writing false reviews and offering an assessment that is unfair to either promote or discredit a product or service. This was done in relation to the financial gains made as a result of the positive reviews about the product or service from the customer. The goal of automatically detecting spammers is crucial, but research is still needed. [7] In this In this study, a brand-new product ownership management system (POMS) for products with RFID tags for counterfeit prevention that can be applied in the post supply chain is proposed by Toyoda et al.(2017). He use the blockchain concept of Bitcoin for this, where anyone can verify the balance evidence of ownership. If the seller does not have ownership of the counterfeit goods, the consumer can refuse to buy them even if the RFID

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE BHARATH KUMAR G M, and BARNALI CHAKRABOTY. "IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY" International Journal Of Advance Research And Innovative Ideas In Education Volume 9 Issue 4 2023 Page 1316-1321
MLA BHARATH KUMAR G M, and BARNALI CHAKRABOTY. "IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY." International Journal Of Advance Research And Innovative Ideas In Education 9.4(2023) : 1316-1321.
APA BHARATH KUMAR G M, & BARNALI CHAKRABOTY. (2023). IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY. International Journal Of Advance Research And Innovative Ideas In Education, 9(4), 1316-1321.
Chicago BHARATH KUMAR G M, and BARNALI CHAKRABOTY. "IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY." International Journal Of Advance Research And Innovative Ideas In Education 9, no. 4 (2023) : 1316-1321.
Oxford BHARATH KUMAR G M, and BARNALI CHAKRABOTY. 'IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY', International Journal Of Advance Research And Innovative Ideas In Education, vol. 9, no. 4, 2023, p. 1316-1321. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/IDENTIFICATION_OF_COUNTERFEIT_PRODUCT_USING_BLOCK_CHAIN_TECHNOLOGY_ijariie21228.pdf (Accessed : ).
Harvard BHARATH KUMAR G M, and BARNALI CHAKRABOTY. (2023) 'IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY', International Journal Of Advance Research And Innovative Ideas In Education, 9(4), pp. 1316-1321IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/IDENTIFICATION_OF_COUNTERFEIT_PRODUCT_USING_BLOCK_CHAIN_TECHNOLOGY_ijariie21228.pdf (Accessed : )
IEEE BHARATH KUMAR G M, and BARNALI CHAKRABOTY, "IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY," International Journal Of Advance Research And Innovative Ideas In Education, vol. 9, no. 4, pp. 1316-1321, Jul-Aug 2023. [Online]. Available: https://ijariie.com/AdminUploadPdf/IDENTIFICATION_OF_COUNTERFEIT_PRODUCT_USING_BLOCK_CHAIN_TECHNOLOGY_ijariie21228.pdf [Accessed : ].
Turabian BHARATH KUMAR G M, and BARNALI CHAKRABOTY. "IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 9 number 4 ().
Vancouver BHARATH KUMAR G M, and BARNALI CHAKRABOTY. IDENTIFICATION OF COUNTERFEIT PRODUCT USING BLOCK CHAIN TECHNOLOGY. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2023 [Cited : ]; 9(4) : 1316-1321. Available from: https://ijariie.com/AdminUploadPdf/IDENTIFICATION_OF_COUNTERFEIT_PRODUCT_USING_BLOCK_CHAIN_TECHNOLOGY_ijariie21228.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
WORD-LEVEL BLUR FOR REAL-TIME SCREEN ABUSE DETECTION: IMPLEMENTATION AND EVALUATIONcomputer Engineeringsohel sayyad Download
Heart Attack Risk Prediction Using Retinal Eye ImagesMachine LearningPrasanthi Siri Kuruma Download
Real Time Zero Knowledge Privacy & Ai Security for currency Transaction Using EthereumComputer EngineeringPANTHULA SAI MURALI Download
JANMITRA - AI POWERED PLATFORM BRIDGING SOCIETIES WITH NGO'S AND ORGANIZATIONScomputer engineeringUMESH AAGDE Download
Improvising Personalized Travel Recommendation System with Recency Effectscomputer science engineeringMrs. Fathima Zahera Download
Ensemble Models and Explainable AI for Malware DetectionComputer Science M Vandana Download
Smart E-Healthcare SystemComputer EngineeringVattikoti Sai Download
SURVEY ON RETAIL INSIGHT GENERATOR: VISION AI FOR CUSTOMER ANALYTICS AND HEATMAPSComputer EngineeringAmalkrishna K B Download
SMART COLLEGE SECURITY:AI-POWERED IDCARD VIOLATION AND FACE RECOGNITIONSYSTEMComputer science Athira Thomas Download
Consumer Behavioural Analysis Using Advanced Clustering TechniquesComputer Science and EngineeringSupriya Thati Download
A Low-Cost Smartphone-Based Sign Language Translator Using Computer Vision for Real-Time Deaf–Hearing CommunicationComputer Science and EngineeringHarsh Mishra Download
Predicting Stock Market Trends using Deep Learning TechniquesComputer Science and EngineeringAkruthi Shere Download
A SURVEY ON SMART VOTING SYSTEM USING BLOCKCHAINComputer Science EngineeringAleena Shaju Download
A SURVEY ON SECURESCAN 360: CYBER INTEGRATED SYSTEM FOR THREAT DETECTION AND IMAGE AUTHENTICATIONComputer Science and EngineeringAparna Sunil Download
Efficient Use of Dialog Boxes in GUI Development using VB.NETComputer ScienceDR. RISHI MATHUR Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2026. IJARIIE. All Rights Reserved.