Counterfeit Cosmetics Verification System using Blockchain Final Year Project Report B.S. in Software Engineering By Muhammad Mubashir Uddin (GL) Syed Qurtain Haider Abidi Maaz Ahmed Supervised By Miss Farheen Qazi Senior Lecturer SSUET 2022-2023 DEPARTMENT OF SOFTWARE ENGINEERING Sir Syed University of Engineering and Technology 2019-SE-130 2019-SE-128 2019-SE-146 Preface The global development of a product or technology always comes with risk factors such as counterfeiting and duplication, which can affect the company’s name, com- pany revenue, and customer health. There are so many products that exist in the supply chain. To ensure that the product is real or fake. Because of counterfeit or fake products manufac- turers facing the biggest problem and huge losses. To find the genuineness of the product we can use blockchain technology. Blockchain is an arrangement of recording information that makes it troublesome or hard to change, hack, or cheat the framework. A blockchain is es- sentially a computerized record of transactions that is duplicated and distributed across the entire network of PC systems on the blockchain. Each block in the chain contains multiple transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s record. The decentralized database managed by the number of participants is known as Distributed Ledger Technology (DLT). Blockchain is a type of DLT in which transactions are recorded with an immutable cryptographic signature called a hash. Blockchain technology helps to solve the problem of counterfeiting a product. Blockchain technology is more secure. Once the product is stored on the network hash code is generated of that product and it is possible to maintain all transaction records of the product and its current owner as a chain will be created for that product transactions. All the trans- action records will be stored in the form of blocks in the blockchain. In the proposed system we are assigning a generated QR code to a particular product and the end customer can scan that QR code to get all information about that product. After scanning the QR code we can identify that the product is real or fake i Acknowledgments First of all, we thank the Almighty Allah for blessing us and supporting us throughout this endeavor. Thanks to all those who have helped in carrying out the research. We take this opportunity to express our profound and sincere gratitude to our guide Ms. Farheen Qazi for their exemplary guidance, monitoring and constant encouragement throughout the course of this presentation. Also we would like to thanks Miss Dur e Shewar Agha who helped us in every difficulty part. His motivation and instructions guided us alot. We also take this opportunity to express a deep sense of gratitude to our class fellows for their cordial support and cooperation, valuable suggestion and guidance. Lastly, we thank all our friends without whom this project would not be possible. ii Introduction to Group Members Muhammad Mubashir Uddin (GL) (2019-SE-130) Back-end Developer / Blockchain smart contract development / Group Leader Contact: 0346-2701956, se19-130@ssuet.edu.pk Syed Qurtain Haider Abidi (2019-SE-128) Front-end Development / Standee and Brochure Design Contact: 0333-2430978, se19-128@ssuet.edu.pk Maaz Ahmed (2019-SE-146) Research and Development process / Quality Assurance Contact: 0330-2347357, se19-146@ssuet.edu.pk iii CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Mubashir Uddin 2019-SE-130 Syed Qurtain Haider Abidi 2019-SE-128 Maaz Ahmed 2019-SE-146 Have successfully completed the requirements for Final Year Project titled Counterfeit Cosmetics Verification System using Blockchain In the report submission for the Degree of Bachelor of Science in Software Engineering Miss Farheen Qazi Senior Lecturer SSUET iv Abstract In recent years, Counterfeit products play an important role in product manufacturing industries. This affects the companies name, sales, and profit of the companies. Blockchain technology is used to identification of real products and detects fake products. Blockchain technology is the distributed, decentralized, and digital ledger that stores transactional information in the form of blocks in many databases which is connected with the chains. Blockchain technology is secure technology therefore any block cannot be changed or hacked. By using Blockchain technology, customers or users do not need to rely on third-party users for confirmation of product safety. In this project, with emerging trends in mobile and wireless technology, Quick Response (QR) codes provide a robust technique to fight the practice of counterfeiting the products. counterfeit products are detected using a QR code scanner, where a QR code of the product is linked to a Blockchain. So this system may be used to store product details and generated unique code of that product as blocks in the database. v Contents PREFACE . . . . . . . . . ACKNOWLEDGMENTS ABSTRACT . . . . . . . LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i ii v viii . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 1 2 2 2 2 Literature Review 2.1 Value of Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Previous/Similar Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 3 3 3 Design 3.1 Design Methodology and Software Process Model 3.2 Architectural design / Design Patterns . . . . . . 3.3 Process flow / Representation . . . . . . . . . . . 3.4 Design model . . . . . . . . . . . . . . . . . . . . 3.5 Data Design . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 5 5 7 9 4 System Development 4.1 Technological Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Protocol Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 11 11 11 5 Testing 5.1 Manual Testing . . . . . . 5.1.1 Unit testing . . . . 5.1.2 Integration testing 5.2 Automation Testing . . . . 13 13 13 13 14 1 Introduction 1.1 Overview . . . . . . 1.2 Problem Statement 1.3 Objectives . . . . . 1.4 System Features . . 1.5 Project Scope . . . 1.6 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Future Directions and Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 vi Appendicies Appendix A Appendix B Appendix C Appendix D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 17 28 31 38 42 vii List of Figures 3.1 3.2 3.3 Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Design Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8 10 5.1 5.2 Integration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automation Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 15 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 Process Flow . . . . . . . . . . Design model . . . . . . . . . . Data design . . . . . . . . . . . Structure of Blockchain process QR code scan image . . . . . . After QR code scanning . . . . QR code scan image . . . . . . QR code scan image . . . . . . Standee . . . . . . . . . . . . . Brochure Front . . . . . . . . . Brochure Back . . . . . . . . . . 18 19 21 22 24 26 34 36 39 40 41 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 1 Introduction 1.1 Overview In this exceptional time, counterfeit cosmetics are found in more important closeness. This prompts the arrangement of a lot of fake things which achieves confusion and uncertainty among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code of the item will be connected to a Blockchain. We can store the item’s details and create a QR code for that item as a block in the database. Now, individuals would have the option to check the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for the link attached to it. Assuming the data get found, it will redirect it to the information of the product which is stored on the blockchain. 1.2 Problem Statement Pakistan and various countries are engaging in such endlessly counterfeit things. In the the proposed system, system produces QR codes using Blockchain advancement. Why blockchain?? Unlike a typical database, Blockchain has a non-horrendous (permanent) method for following data changes over the long run. This implies that data isn’t editable rather, at whatever point refreshes are made, another block is added to the ”block-chain”. This helps track the verifiable data (genuineness and proprietor data) of an item. The plus point we have in the blockchain is transparency. Utilizing Blockchain, authenticity can be checked and responsibility for a cosmetic can be moved a very long time from now; regardless of whether the cosmetic is ceased. 1.3 Objectives The idea of this project came into existence because of the increase in counterfeit products. The objectives of this project are: 1. To Design Anti Counterfeit System using Blockchain. 2. To secure product details using a QR code. 3. Provide security to the clients by offering data to the client. 1 Chapter-1 1.4 Introduction System Features The system features will be: Scanning QR code Checking the cosmetic data in the blockchain Take to the link to check the validity of the product. 1.5 Project Scope For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code of the item will be connected to a Blockchain. We can store the item’s details and create a QR code for that item as a block in the database. Now, individuals would have the option to check the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for the link attached to it. Assuming the data get found, it will redirect it to the information of the product which is stored on the blockchain. 1.6 Chapter Summary Counterfeit products are growing exponentially with the enormous amount online. So, there is a strong need to detect counterfeit products and blockchain technology is used to detect fake products. Furthermore, the information is encoded into a QR code. Customers or users scan the QR code and then they can detect the fake product. Digital information about products can be stored in the form of blocks in blockchain technology. The data can be stored in the ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply chain. Customers can scan QR codes assigned to a product and can get all the information like transaction history, and current owner based on which end-user can check whether the product is genuine or not. 2 Chapter 2 Literature Review 2.1 Value of Literature The literature review is an essential part of the research paper . It provides knowledge based on the research topic. It identifies the research gap in previous related research and discusses the questions that arise in previous related research. It also explains the relation between current research and previous research .it makes clear either new research is needed or not. In short, it describes why your research is better than others. It is also important to support research in case of funding. Make sure to give credit to others whose research you cite in your research paper. 2.2 Introduction In this exceptional time, counterfeit cosmetics are found in more important closeness. This prompts the arrangement of a lot of fake things which achieves confusion and uncertainty among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code of the item will be connected to a Blockchain. We can store the item’s details and create a QR code for that item as a block in the database. Now, individuals would have the option to check the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for the link attached to it. Assuming the data get found, it will redirect it to the information of the product which is stored on the blockchain. 2.3 Previous/Similar Projects There is no decent arrangement before to separate fake cosmetics from original cosmetics. Blockchain innovation can be useful to handle such issues. The task’s primary objective is to assist individuals with distinguishing whether the cosmetic is an original cosmetic or a fake. Some survey reports say that [1] Counterfeit products are developing dramatically with the gigantic measure on the web and underground market. In this way, there is a solid need to address the difficulties of detecting counterfeit products and planning proper innovation to further develop location precision. 3 Chapter-2 Literature Review This is one of the dynamic exploration regions to be investigated in the ongoing scene. This paper examines different techniques for recognizing counterfeit products. We have read [2] research papers regarding counterfeit products in the market [3] A Survey of Counterfeit Product Detection by Prabhu Shankar, R. Jayavadivel. Counterfeit products are growing exponentially with the enormous amount of online and black markets. So, there is a strong need to address the challenges of detecting counterfeit products and designing appropriate technology to improve detection accuracy. This is one of the active research areas to be explored in the current world. This paper discusses various techniques for identifying counterfeit products. [4] Smart Tags for Brand protection and anti-counterfeiting in the wine industry by steven, Marko. This paper describes a brand protection and anticounterfeiting solution for the wine industry based on smart tags and Cloud-enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported by the Cloud system and two-way communication between the winemaker and end-user. [5] A Blockchain-based Supply Chain Quality Management Framework by Si Chen, Rui Shi. In this paper, we propose a blockchain-based framework. This framework will provide a theoretical basis for intelligent quality management of the supply chain based on blockchain technology. Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations. [6] 4 Chapter 3 Design 3.1 Design Methodology and Software Process Model The purpose of the Blockchain-Based Verification System is to provide authenticity and verifiable to the product. which can save the product from replication, forging, and duplication. as the identity will be stored in blockchain so it will be immutable and unique. NFT refers to “non-fungible token”, a type of token originally created through the Ethereum smart contracts. As a special digital asset, it is indivisible, tamper-proof, irreplaceable, and one-of-a-kind. The concept of NFT is relative to FT, which stands for “fungible token”. Bitcoin is a typical example of fungible tokens – each Bitcoin is identical to one other and can be divided into smaller units. Each NFT, however, has a single unique identifier, which cannot be interchanged with any other one or split into smaller units. NFT can empower creators in various fields with its unique attributes, providing a more convenient and reliable way to authenticate digital assets. With NFTs, creators can easily prove the existence and ownership of digital works in the form of pictures, videos, artworks, tickets, etc. In addition, creators can also earn royalties every time the NFTs are traded. 3.2 Architectural design / Design Patterns For our architecture, we have used HTML, CSS, and Bootstrap for landing page and solidity for blockchain smart contracts. 3.3 Process flow / Representation 5 Chapter-3 Design Figure 3.1: Process Flow 6 Chapter-3 3.4 Design Design model For the design model, this class diagram is the base for the understanding of the project overview. 7 Chapter-3 Design Figure 3.2: Design Model 8 Chapter-3 3.5 Design Data Design The below design is the overview of the data verification of products through blockchain. 9 Chapter-3 Design Figure 3.3: Data Design 10 Chapter 4 System Development 4.1 Technological Elements Blockchain: Blockchain is a technology that was first known as a distributed ledger for Bitcoin. Blockchain is a distributed and tamper-proof database. In essence, it is a list of recorded data and information that is protected by encryption protocols. Blockchain provides a viable solution to the long-standing Byzantine Generals’ problem. Smart contract: The smart contract accelerates the execution and verification process of digital protocols. Blockchain-based smart contracts use Turing complete scripting languages to build complex functions that are compatible with each other and are executed through consensus algorithms to ensure consistency. Smart contracts enable fair transactions that do not rely on third-party credit intermediaries, thus making cross-industry, cross-field, and cross-ecosystem value interactions possible. On-chain transaction: On-chain transactions require blockchain addresses and instructions for the transactions. A blockchain address is composed of a fixed number of letters, numbers, and characters It is a unique identifier for users to send and receive assets, much like a bank account, and has a pair of corresponding public and private keys to verify the authenticity of the transaction. Data coding: Through data coding, files can be compressed into an effective format to save storage. The authentication of the NFT assets is actually the authentication of the hash values signed by the creator of the NFT. Others may copy the metadata, but they cannot prove their ownership. 4.2 Protocol Standards Fundamentally, the underlying logic of NFT is based on distributed ledger and relies on peerto-peer networks for transactions. If the blockchain distributed ledger is regarded as a special type of database, then it is the place where NFTs are stored – the actual storage of NFTs is more complicated though. Assuming that this database is secure, consistent, integral, and accessible, the entire NFT closed-loop ecosystem mainly includes the following scenarios. 4.3 Key Features NFT is essentially a type of dApp, that is, a decentralized application. It inherits various qualities from the underlying public ledger, which can be summarized as follows: 11 Chapter-4 System Development Verifiable: NFT’s token metadata and ownership can be publicly verified. The premise is that metadata is stored on the blockchain. If it is stored off-chain, then it is up to the off-chain storage system to determine whether it can be publicly verified. Centralized storage does not allow public verification, which means the device owners can change the data as they wish; IPFS can verify whether the data has been tampered with through CID, but cannot verify the storage status; IPFS and other decentralized cloud storage systems can not only verify whether the data has tampered but also the storage and redundancy status of the data. Transparent: the entire process of NFT including minting, selling, and purchasing is publicly accessible. However, the storage of NFT metadata and media data is not completely transparent or available to the public. NFT creators can choose the storage method they like, but the security of most storage methods cannot be clearly assessed. Available: The system on the blockchain that NFT relies on will never be compromised. All the issued NFTs will never have difficulty in selling or purchasing. There are the potential risks of unavailability for off-chain storage for NFT data. Currently, only decentralized storage systems such as MEFS have set up well-established risk control mechanisms; all the centralized storage systems and IPFS are not yet ready for risk control. Tamper-proof : once confirmed, NFT metadata and the complete set of transaction records are permanently stored; it only allows further addition of new information but not a modification to the existing information. If the metadata is stored in a centralized server, the service operators can tamper with the data at will; and file systems such as IPFS and MEFS are tamper-resistance. Easy to circulate: the information that each NFT user sees is updated in real-time, which eliminates the traditional information barrier between the creator, credit intermediary, and the buyer, and makes the information clearer and easy to circulate. Atomic: NFT transactions can be completed in an atomic, consistent, isolated, and durable (ACID) system. 12 Chapter 5 Testing Smart Contract testing is the process of evaluating and verifying whether a contract is getting the data or not. The benefits of testing include preventing bugs, reducing development costs and improving performance. 5.1 Manual Testing The purpose of Manual Testing is to identify the bugs, issues, and defects in the smart contract. Manual smart contract testing is the most primitive technique of all testing types and it helps to find critical bugs in the smart contract. Once the smart contract has been successfully deployed, testing has to be performed to ensure that the contract is working as intended. This is also to check that the contract meets the requirements stated earlier. Besides that, testing will help in finding the errors that may be hidden from the user. 5.1.1 Unit testing A unit test is simple, quick to run, and provides a clear idea of what went wrong if the test fails. Unit tests are crucial for smart contract development, especially if you need to add new logic to the code. You can verify the behavior of each function and confirm that it executes as intended. 5.1.2 Integration testing The result of integration testing is below: 13 Chapter-5 Testing Figure 5.1: Integration Testing 5.2 Automation Testing You may be wondering how we’re going to run these tests since smart contracts are executed inside a blockchain. Using the actual Ethereum network would be very expensive, and while testnets are free, they are also slow (with block times between 5 and 20 seconds). If we intend to run hundreds of tests whenever we make a change to our code, we need something better. What we will use is called a local blockchain: a slimmed-down version of the real thing, disconnected from the Internet, running on your machine. This will simplify things quite a bit: you won’t need to get Ether, and new blocks will be mined instantly. 14 Chapter-5 Testing Figure 5.2: Automation Testing 15 Chapter 6 Future Directions and Conclusion Future Directions: Integration with e-commerce platforms: Integrating the verification system with popular e-commerce platforms can greatly increase its adoption and effectiveness. This will enable customers to easily verify the authenticity of cosmetics products purchased online. Artificial intelligence and machine learning: Incorporating artificial intelligence and machine learning algorithms can improve the accuracy and efficiency of the verification process. This can help to detect counterfeit products with even greater accuracy and reduce false positives. Expansion to other industries: The concept of using blockchain for product verification can be expanded to other industries, such as pharmaceuticals and luxury goods. This will help to combat the problem of counterfeit products in these industries and provide consumers with greater protection. Conclusion: Counterfeit cosmetics products pose a serious threat to both consumers and the cosmetics industry. By using blockchain technology, the Counterfeit Cosmetics Verification System provides a secure and reliable way to verify the authenticity of cosmetics products. As the system continues to evolve and incorporate new technologies, it has the potential to make a significant impact in the fight against counterfeit cosmetics. 16 Appendix A - User Manual Introduction The global development of a product or technology always comes with risk factors such as counterfeiting and duplication, which can affect the company’s name, company revenue, and customer health. There are so many products that exist in the supply chain. To ensure that the product is real or fake. Because of counterfeit or fake products, manufacturers face the biggest problem and huge losses. To find the genuineness of the product we can use blockchain technology. Blockchain is an arrangement of recording information that makes it troublesome or hard to change, hack, or cheat the framework. A blockchain is essentially a computerized record of transactions that is duplicated and distributed across the entire network of PC systems on the blockchain. Each block in the chain contains multiple transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s record. The decentralized database managed by the number of participants is known as Distributed Ledger Technology (DLT). Blockchain is a type of DLT in which transactions are recorded with an immutable cryptographic signature called a hash. Blockchain technology helps to solve the problem of counterfeiting a product. Blockchain technology is more secure. Once the product is stored on the network hash code is generated for that product and it is possible to maintain all transaction records of the product and its current owner as a chain will be created for that product’s transactions. All the transaction records will be stored in the form of blocks in the blockchain. In the proposed system we are assigning a generated QR code to a particular product and the end customer can scan that QR code to get all information about that product. After scanning the QR code we can identify whether the product is real or fake. Literature Review Value of Literature The literature review is an essential part of the research paper. It provides knowledge based on the research topic. It identifies the research gap in previous related research and discusses the questions that arise in previous related research. It also explains the relationship between current research and previous research .it makes clear either new research is needed or not. In short, it describes why your research is better than others. It is also important to support research in case of funding. Make sure to give credit to others whose research you cite in your research paper. Design Process Flow of project: 17 Appendix A Figure 6.1: Process Flow 18 Appendix A Figure 6.2: Design model Design model For the design model, this class diagram is the base for the understanding of the project overview. 19 Appendix A Data design The below design is the overview of the data verification of products through blockchain. 20 Appendix A Figure 6.3: Data design 21 Appendix A Figure 6.4: Structure of Blockchain process Structure of Blockchain process The below diagram is an overview of the Structure of the Blockchain process. 22 Appendix A System Development: Blockchain: Blockchain is a technology that was first known as a distributed ledger for Bitcoin. Blockchain is a distributed and tamper-proof database. In essence, it is a list of recorded data and information that is protected by encryption protocols. Blockchain provides a viable solution to the long-standing Byzantine Generals’ problem. Smart contract: The smart contract accelerates the execution and verification process of digital protocols. Blockchain-based smart contracts use Turing complete scripting languages to build complex functions that are compatible with each other and are executed through consensus algorithms to ensure consistency. Smart contracts enable fair transactions that do not rely on third-party credit intermediaries, thus making cross-industry, cross-field, and cross-ecosystem value interactions possible. On-chain transaction: On-chain transactions require blockchain addresses and instructions for the transactions. A blockchain address is composed of a fixed number of letters, numbers, and characters It is a unique identifier for users to send and receive assets, much like a bank account, and has a pair of corresponding public and private keys to verify the authenticity of the transaction. Data coding: Through data coding, files can be compressed into an effective format to save storage. The authentication of the NFT assets is actually the authentication of the hash values signed by the creator of the NFT. Others may copy the metadata, but they cannot prove their ownership. Project Working QR code scan image: 23 Appendix A Figure 6.5: QR code scan image 24 Appendix A After QR code scanning: 25 Appendix A 26 Figure 6.6: After QR code scanning Appendix A RESULT: This real-time system can be implemented to check whether the received product is a counterfeit product or an original product. The manufacturer uses the SHA-256 algorithm to generate a QR code in blockchain technology. The generated QR code is scanned by the user to check given product is fake or real. CONCLUSION: Counterfeit products are growing exponentially with the enormous amount online. So, there is a strong need to detect counterfeit products and blockchain technology is used to detect fake products. Furthermore, the information is encoded into a QR code. Customers or users scan the QR code and then they can detect the fake product. Digital information about products can be stored in the form of blocks in blockchain technology. The data can be stored in the ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply chain. Customers can scan QR codes assigned to a product and can get all the information like transaction history, and current owner based on which end-user can check whether the product is genuine or not. 27 Appendix B- Software Requirement Specification (SRS) Introduction: In this exceptional time, counterfeit cosmetics are found in more important closeness. This prompts the arrangement of a lot of fake things which achieves confusion and uncertainty among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code of the item will be connected to a Blockchain. We can store the item’s details and create a QR code for that item as a block in the database. Now, individuals would have the option to check the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for the link attached to it. Assuming the data get found, it will redirect it to the information of the product which is stored on the blockchain. PURPOSE: The purpose of the Blockchain-Based Verification System is to provide authenticity and verifiable to the product. which can save the product from replication, forging, and duplication. as the identity will be stored in blockchain so it will be immutable and unique. Intended Audience: The Audience for the current product is consumers/buyers of the product they will be able to verify the product’s genuineness easily and they can trust that the item they have is authentic. it can also include retail sellers who can also verify the product they are going to put forth in the market for selling purposes. Intended Use: The Usage of the product is to let the User verify the product’s genuineness and authenticity. the product will be able to remove the issue regarding forgery and replication of the same product. it will be used to differentiate between a real and a fake product. System Features and Requirements: Functional Requirements: The Functional Requirement is to make and store the unique identity of the product in blockchain so it becomes immutable and stored in the ledger forever. After storing the prod28 Appendix A uct details we will use the NFT (ERC-721) Mechanism to store the product as an NFT . and it will be listed in the Marketplace called Opensea for the user to locate and view the product details. We will convert the product link into a QR-CODE which will be printed or embedded on the product. So it can be scanned and redirected to the product description page. External Interface Requirements: There are two External Interfaces which are as follows: Product Description Page: It will be an Opensea link where the product and its details, and description will be located. Product Insertion Page.: It will be the page where the admin will be able to register the product in the blockchain. QR Code Scanning The system shall allow users to scan a product’s QR code to retrieve information about the product and its manufacturer. Product Information Retrieval The system shall retrieve the product information from the blockchain database, including the product’s manufacturer, ingredients, and production date. Authentication Verification The system shall verify the authenticity of the product by comparing the information retrieved from the QR code with the information stored in the blockchain database. Alerts for Counterfeit Products The system shall provide an alert to the user if a product is determined to be counterfeit. Blockchain Database The system shall use blockchain technology to create a secure and tamper-proof database of cosmetics products and their respective manufacturers. Non-Functional Requirements Security The system shall use encryption and secure authentication methods to ensure the security of the blockchain database and prevent unauthorized access. User-Friendliness The system shall have a user-friendly interface for scanning QR codes and accessing product information. 29 Appendix A Scalability The system shall be scalable and able to accommodate an increasing number of products and users over time. Performance The system shall have a fast and efficient performance, with a quick response time for QR code scanning and product information retrieval. Constraints Technology The system shall use blockchain technology for creating and maintaining the database of cosmetics products and their respective manufacturers. Integration The system shall be integrated with existing cosmetics industry standards and regulations. Assumptions and Dependencies QR Code Availability It is assumed that all cosmetics products will have a unique QR code that can be scanned by the system. Internet Connectivity It is assumed that users will have access to the internet to use the system. Compliance with Industry Standards It is assumed that all cosmetics products and manufacturers will comply with existing industry standards and regulations. Conclusion The proposed blockchain-based system for detecting counterfeit cosmetics will provide a secure and efficient solution for verifying the authenticity of cosmetics products. The system will use blockchain technology to create a tamper-proof database and QR code scanning to retrieve product information and verify authenticity. The system will be user-friendly and scalable to accommodate an increasing number of products and users over time. 30 Appendix C- Dissemination Activity Abstract In recent years, Counterfeit products play an important role in product manufacturing industries. This affects the companies name, sales, and profit of the companies. Blockchain technology is used to identification of real products and detects fake products. Blockchain technology is the distributed, decentralized, and digital ledger that stores transactional information in the form of blocks in many databases which is connected with the chains. Blockchain technology is secure technology therefore any block cannot be changed or hacked. By using Blockchain technology, customers or users do not need to rely on third-party users for confirmation of product safety. In this project, with emerging trends in mobile and wireless technology, Quick Response (QR) codes provide a robust technique to fight the practice of counterfeiting the products. counterfeit products are detected using a QR code scanner, where a QR code of the product is linked to a Blockchain. So this system may be used to store product details and generated unique code of that product as blocks in the database. Introduction In this exceptional time, counterfeit cosmetics are found in more important closeness. This prompts the arrangement of a lot of fake things which achieves confusion and uncertainty among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code of the item will be connected to a Blockchain. We can store the item’s details and create a QR code for that item as a block in the database. Now, individuals would have the option to check the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for the link attached to it. Assuming the data get found, it will redirect it to the information of the product which is stored on the blockchain. Background Study There is no decent arrangement before to separate fake cosmetics from original cosmetics. Blockchain innovation can be useful to handle such issues. The task’s primary objective is to assist individuals with distinguishing whether the cosmetic is an original cosmetic or a fake Pakistan and various countries are engaging in such endlessly counterfeit things. In the the proposed system, system produces QR codes using Blockchain advancement. Why blockchain?? Unlike a typical database, Blockchain has a non-horrendous (permanent) method for following data changes over the long run. This implies that data isn’t editable rather, at whatever point refreshes are made, another block is added to the ”block-chain”. This helps track the verifiable data (genuineness and proprietor data) of an item. The plus point we have in the blockchain is transparency. Utilizing Blockchain, authenticity can be checked and responsibility for a cosmetic can be moved a very long time from now; regardless of whether the cosmetic is ceased. 31 Appendix C Previous Projects A Survey of Counterfeit Product Detection by Prabhu Shankar, R. Jayavadivel. Counterfeit products are growing exponentially with the enormous amount of online and black markets. So, there is a strong need to address the challenges of detecting counterfeit products and designing appropriate technology to improve detection accuracy. This is one of the active research areas to be explored in the current world. This paper discusses various techniques for identifying counterfeit products. Smart Tags for Brand protection and anti-counterfeiting in the wine industry by steven, Marko. This paper describes a brand protection and anticounterfeiting solution for the wine industry based on smart tags and Cloud-enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported by the Cloud system and two-way communication between the winemaker and end-user. A Blockchain-based Supply Chain Quality Management Framework by Si Chen, Rui Shi. In this paper, we propose a blockchain-based framework. This framework will provide a theoretical basis for intelligent quality management of the supply chain based on blockchain technology. Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations. Features NFT is essentially a type of dApp, that is, a decentralized application. It inherits various qualities from the underlying public ledger, which can be summarized as follows: Verifiable: NFT’s token metadata and ownership can be publicly verified. The premise is that metadata is stored on the blockchain. If it is stored off-chain, then it is up to the off-chain storage system to determine whether it can be publicly verified. Centralized storage does not allow public verification, which means the device owners can change the data as they wish; IPFS can verify whether the data has been tampered with through CID, but cannot verify the storage status; IPFS and other decentralized cloud storage systems can not only verify whether the data has tampered but also the storage and redundancy status of the data. Transparent: the entire process of NFT including minting, selling, and purchasing is publicly accessible. However, the storage of NFT metadata and media data is not completely transparent or available to the public. NFT creators can choose the storage method they like, but the security of most storage methods cannot be clearly assessed. Available: The system on the blockchain that NFT relies on will never be compromised. All the issued NFTs will never have difficulty in selling or purchasing. There are the potential risks of unavailability for off-chain storage for NFT data. Currently, only decentralized storage systems such as MEFS have set up well-established risk control mechanisms; all the centralized storage systems and IPFS are not yet ready for risk control. Tamper-proof: once confirmed, NFT metadata and the complete set of transaction records are permanently stored; it only allows further addition of new information but not a modification to the existing information. If the metadata is stored in a centralized server, the service operators can tamper with the data at will; and file systems such as IPFS and MEFS are tamper-resistance. Easy to circulate: the information that each NFT user sees is updated in real-time, which 32 Appendix C eliminates the traditional information barrier between the creator, credit intermediary, and the buyer, and makes the information clearer and easy to circulate. Atomic: NFT transactions can be completed in an atomic, consistent, isolated, and durable (ACID) system. This real-time system can be implemented to check whether the received product is a counter- feit product or an original product. The manufacturer uses the SHA-256 algorithm to generate a QR code in blockchain technology. The generated QR code is scanned by the user to check given product is fake or real Technology Elements Blockchain: Blockchain is a technology that was first known as a distributed ledger for Bitcoin. Blockchain is a distributed and tamper-proof database. In essence, it is a list of recorded data and information that is protected by encryption protocols. Blockchain provides a viable solution to the long-standing Byzantine Generals’ problem. Smart contract: The smart contract accelerates the execution and verification process of digital protocols. Blockchain-based smart contracts use Turing complete scripting languages to build complex functions that are compatible with each other and are executed through consensus algorithms to ensure consistency. Smart contracts enable fair transactions that do not rely on third-party credit intermediaries, thus making cross-industry, cross-field, and crossecosystem value interactions possible. On-chain transaction: On-chain transactions require blockchain addresses and instructions for the transactions. A blockchain address is composed of a fixed number of letters, numbers, and characters It is a unique identifier for users to send and receive assets, much like a bank account, and has a pair of corresponding public and private keys to verify the authenticity of the transaction. Data coding: Through data coding, files can be compressed into an effective format to save storage. The authentication of the NFT assets is actually the authentication of the hash values signed by the creator of the NFT. Others may copy the metadata, but they cannot prove their ownership. Project Working QR code scan image: 33 Appendix C Figure 6.7: QR code scan image 34 Appendix C After QR code scanning: 35 Appendix C 36 Figure 6.8: QR code scan image Appendix C RESULT: This real-time system can be implemented to check whether the received product is a counterfeit product or an original product. The manufacturer uses the SHA-256 algorithm to generate a QR code in blockchain technology. The generated QR code is scanned by the user to check given product is fake or real. CONCLUSION: Counterfeit products are growing exponentially with the enormous amount online. So, there is a strong need to detect counterfeit products and blockchain technology is used to detect fake products. Furthermore, the information is encoded into a QR code. Customers or users scan the QR code and then they can detect the fake product. Digital information about products can be stored in the form of blocks in blockchain technology. The data can be stored in the ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply chain. Customers can scan QR codes assigned to a product and can get all the information like transaction history, and current owner based on which end-user can check whether the product is genuine or not. 37 Appendix D- Marketing/Promotional Material Standee 38 Appendix D Figure 6.9: Standee 39 Appendix D Figure 6.10: Brochure Front Brochure Front 40 Appendix D Figure 6.11: Brochure Back Brochure Back 41 References [1] https://ieeexplore.ieee.org/document/8119146 [2] https://www.researchgate.net/publication/355516768P roductA uthenticationU singB lockchain [3] Si Chen, Rui Shi, Ren, Jiaqi Yan, Yani Shi, “A Blockchain-based Supply Chain Quality Management Framework”, 14th, IEEE International Conference on e-Business Engineering, 2017. [4] Blockchain-Based Fake Product Identification in Supply Chain www.irjet.net: Ajay Funde, Pranjal Nahar, Ashwini Khilari. [5] Fake News Detection In Social Media using Blockchain: - Shovon Paul, Jubair Joy, Shaila Sarkar. 42