Uploaded by mubashirqamar46

Counterfeit Cosmetics Verification using Blockchain FYP Report

advertisement
Counterfeit Cosmetics Verification System
using Blockchain
Final Year Project Report
B.S. in Software Engineering
By
Muhammad Mubashir Uddin (GL)
Syed Qurtain Haider Abidi
Maaz Ahmed
Supervised By
Miss Farheen Qazi
Senior Lecturer
SSUET
2022-2023
DEPARTMENT OF SOFTWARE ENGINEERING
Sir Syed University of Engineering and Technology
2019-SE-130
2019-SE-128
2019-SE-146
Preface
The global development of a product or technology always comes with risk factors such as
counterfeiting and duplication, which can affect the company’s name, com- pany revenue, and
customer health. There are so many products that exist in the supply chain. To ensure that
the product is real or fake. Because of counterfeit or fake products manufac- turers facing
the biggest problem and huge losses. To find the genuineness of the product we can use
blockchain technology. Blockchain is an arrangement of recording information that makes it
troublesome or hard to change, hack, or cheat the framework. A blockchain is es- sentially a
computerized record of transactions that is duplicated and distributed across the entire network
of PC systems on the blockchain. Each block in the chain contains multiple transactions,
and every time a new transaction occurs on the blockchain, a record of that transaction is
added to every participant’s record. The decentralized database managed by the number of
participants is known as Distributed Ledger Technology (DLT). Blockchain is a type of DLT
in which transactions are recorded with an immutable cryptographic signature called a hash.
Blockchain technology helps to solve the problem of counterfeiting a product. Blockchain
technology is more secure. Once the product is stored on the network hash code is generated
of that product and it is possible to maintain all transaction records of the product and its
current owner as a chain will be created for that product transactions. All the trans- action
records will be stored in the form of blocks in the blockchain. In the proposed system we are
assigning a generated QR code to a particular product and the end customer can scan that QR
code to get all information about that product. After scanning the QR code we can identify
that the product is real or fake
i
Acknowledgments
First of all, we thank the Almighty Allah for blessing us and supporting us throughout this
endeavor. Thanks to all those who have helped in carrying out the research. We take this
opportunity to express our profound and sincere gratitude to our guide Ms. Farheen Qazi
for their exemplary guidance, monitoring and constant encouragement throughout the course
of this presentation. Also we would like to thanks Miss Dur e Shewar Agha who helped us
in every difficulty part. His motivation and instructions guided us alot. We also take this
opportunity to express a deep sense of gratitude to our class fellows for their cordial support
and cooperation, valuable suggestion and guidance. Lastly, we thank all our friends without
whom this project would not be possible.
ii
Introduction to Group Members
Muhammad Mubashir Uddin (GL) (2019-SE-130)
Back-end Developer / Blockchain smart contract development / Group Leader
Contact: 0346-2701956, se19-130@ssuet.edu.pk
Syed Qurtain Haider Abidi (2019-SE-128)
Front-end Development / Standee and Brochure Design
Contact: 0333-2430978, se19-128@ssuet.edu.pk
Maaz Ahmed (2019-SE-146)
Research and Development process / Quality Assurance
Contact: 0330-2347357, se19-146@ssuet.edu.pk
iii
CERTIFICATE OF COMPLETION
This is to certify that the following students
Muhammad Mubashir Uddin
2019-SE-130
Syed Qurtain Haider Abidi
2019-SE-128
Maaz Ahmed
2019-SE-146
Have successfully completed the requirements for Final Year Project
titled
Counterfeit Cosmetics Verification System using
Blockchain
In the report submission for the Degree of Bachelor of Science in
Software Engineering
Miss Farheen Qazi
Senior Lecturer
SSUET
iv
Abstract
In recent years, Counterfeit products play an important role in product manufacturing industries. This affects the companies name, sales, and profit of the companies. Blockchain
technology is used to identification of real products and detects fake products. Blockchain
technology is the distributed, decentralized, and digital ledger that stores transactional information in the form of blocks in many databases which is connected with the chains. Blockchain
technology is secure technology therefore any block cannot be changed or hacked. By using
Blockchain technology, customers or users do not need to rely on third-party users for confirmation of product safety. In this project, with emerging trends in mobile and wireless technology,
Quick Response (QR) codes provide a robust technique to fight the practice of counterfeiting
the products. counterfeit products are detected using a QR code scanner, where a QR code
of the product is linked to a Blockchain. So this system may be used to store product details
and generated unique code of that product as blocks in the database.
v
Contents
PREFACE . . . . . . . . .
ACKNOWLEDGMENTS
ABSTRACT . . . . . . .
LIST OF FIGURES . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
i
ii
v
viii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
1
1
2
2
2
2 Literature Review
2.1 Value of Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Previous/Similar Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
3
3
3
3 Design
3.1 Design Methodology and Software Process Model
3.2 Architectural design / Design Patterns . . . . . .
3.3 Process flow / Representation . . . . . . . . . . .
3.4 Design model . . . . . . . . . . . . . . . . . . . .
3.5 Data Design . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
5
5
5
5
7
9
4 System Development
4.1 Technological Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Protocol Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11
11
11
11
5 Testing
5.1 Manual Testing . . . . . .
5.1.1 Unit testing . . . .
5.1.2 Integration testing
5.2 Automation Testing . . . .
13
13
13
13
14
1 Introduction
1.1 Overview . . . . . .
1.2 Problem Statement
1.3 Objectives . . . . .
1.4 System Features . .
1.5 Project Scope . . .
1.6 Chapter Summary
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
6 Future Directions and Conclusion
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
16
vi
Appendicies
Appendix A
Appendix B
Appendix C
Appendix D
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
References
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
17
17
28
31
38
42
vii
List of Figures
3.1
3.2
3.3
Process Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Design Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
8
10
5.1
5.2
Integration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automation Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
15
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9
6.10
6.11
Process Flow . . . . . . . . . .
Design model . . . . . . . . . .
Data design . . . . . . . . . . .
Structure of Blockchain process
QR code scan image . . . . . .
After QR code scanning . . . .
QR code scan image . . . . . .
QR code scan image . . . . . .
Standee . . . . . . . . . . . . .
Brochure Front . . . . . . . . .
Brochure Back . . . . . . . . . .
18
19
21
22
24
26
34
36
39
40
41
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
viii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Chapter 1
Introduction
1.1
Overview
In this exceptional time, counterfeit cosmetics are found in more important closeness. This
prompts the arrangement of a lot of fake things which achieves confusion and uncertainty
among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has
been very powerful in giving anti-counterfeit measures. Consider the possibility that we use
blockchain innovation to recognize unique items and add a QR code to them while assembling.
The QR code of the item will be connected to a Blockchain. We can store the item’s details
and create a QR code for that item as a block in the database. Now, individuals would have
the option to check the QR code utilizing their cell phones and scan the QR code. It will look
at the QR code for the link attached to it. Assuming the data get found, it will redirect it to
the information of the product which is stored on the blockchain.
1.2
Problem Statement
Pakistan and various countries are engaging in such endlessly counterfeit things. In the the
proposed system, system produces QR codes using Blockchain advancement. Why blockchain??
Unlike a typical database, Blockchain has a non-horrendous (permanent) method for following
data changes over the long run. This implies that data isn’t editable rather, at whatever point
refreshes are made, another block is added to the ”block-chain”. This helps track the verifiable
data (genuineness and proprietor data) of an item. The plus point we have in the blockchain
is transparency. Utilizing Blockchain, authenticity can be checked and responsibility for a
cosmetic can be moved a very long time from now; regardless of whether the cosmetic is
ceased.
1.3
Objectives
The idea of this project came into existence because of the increase in counterfeit products.
The objectives of this project are:
1. To Design Anti Counterfeit System using Blockchain.
2. To secure product details using a QR code.
3. Provide security to the clients by offering data to the client.
1
Chapter-1
1.4
Introduction
System Features
The system features will be:
Scanning QR code
Checking the cosmetic data in the blockchain
Take to the link to check the validity of the product.
1.5
Project Scope
For over 10 years now, RFID (Radio Frequency Identification) innovation has been very powerful in giving anti-counterfeit measures. Consider the possibility that we use blockchain innovation to recognize unique items and add a QR code to them while assembling. The QR code
of the item will be connected to a Blockchain. We can store the item’s details and create a QR
code for that item as a block in the database. Now, individuals would have the option to check
the QR code utilizing their cell phones and scan the QR code. It will look at the QR code for
the link attached to it. Assuming the data get found, it will redirect it to the information of
the product which is stored on the blockchain.
1.6
Chapter Summary
Counterfeit products are growing exponentially with the enormous amount online. So, there is
a strong need to detect counterfeit products and blockchain technology is used to detect fake
products. Furthermore, the information is encoded into a QR code. Customers or users scan
the QR code and then they can detect the fake product. Digital information about products
can be stored in the form of blocks in blockchain technology. The data can be stored in the
ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply
chain. Customers can scan QR codes assigned to a product and can get all the information
like transaction history, and current owner based on which end-user can check whether the
product is genuine or not.
2
Chapter 2
Literature Review
2.1
Value of Literature
The literature review is an essential part of the research paper . It provides knowledge based on
the research topic. It identifies the research gap in previous related research and discusses the
questions that arise in previous related research. It also explains the relation between current
research and previous research .it makes clear either new research is needed or not. In short,
it describes why your research is better than others. It is also important to support research
in case of funding. Make sure to give credit to others whose research you cite in your research
paper.
2.2
Introduction
In this exceptional time, counterfeit cosmetics are found in more important closeness. This
prompts the arrangement of a lot of fake things which achieves confusion and uncertainty
among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has
been very powerful in giving anti-counterfeit measures. Consider the possibility that we use
blockchain innovation to recognize unique items and add a QR code to them while assembling.
The QR code of the item will be connected to a Blockchain. We can store the item’s details
and create a QR code for that item as a block in the database. Now, individuals would have
the option to check the QR code utilizing their cell phones and scan the QR code. It will look
at the QR code for the link attached to it. Assuming the data get found, it will redirect it to
the information of the product which is stored on the blockchain.
2.3
Previous/Similar Projects
There is no decent arrangement before to separate fake cosmetics from original cosmetics.
Blockchain innovation can be useful to handle such issues. The task’s primary objective is to
assist individuals with distinguishing whether the cosmetic is an original cosmetic or a fake.
Some survey reports say that
[1] Counterfeit products are developing dramatically with the gigantic measure on the web
and underground market. In this way, there is a solid need to address the difficulties of detecting counterfeit products and planning proper innovation to further develop location precision.
3
Chapter-2
Literature Review
This is one of the dynamic exploration regions to be investigated in the ongoing scene. This
paper examines different techniques for recognizing counterfeit products.
We have read [2] research papers regarding counterfeit products in the market
[3] A Survey of Counterfeit Product Detection by Prabhu Shankar, R. Jayavadivel. Counterfeit products are growing exponentially with the enormous amount of online and black
markets. So, there is a strong need to address the challenges of detecting counterfeit products
and designing appropriate technology to improve detection accuracy. This is one of the active
research areas to be explored in the current world. This paper discusses various techniques for
identifying counterfeit products.
[4] Smart Tags for Brand protection and anti-counterfeiting in the wine industry by steven,
Marko. This paper describes a brand protection and anticounterfeiting solution for the wine
industry based on smart tags and Cloud-enabled technologies. The main idea behind smart
tags is to utilize quick response codes and functional inks supported by the Cloud system and
two-way communication between the winemaker and end-user.
[5] A Blockchain-based Supply Chain Quality Management Framework by Si Chen, Rui Shi. In
this paper, we propose a blockchain-based framework. This framework will provide a theoretical basis for intelligent quality management of the supply chain based on blockchain technology.
Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations.
[6]
4
Chapter 3
Design
3.1
Design Methodology and Software Process Model
The purpose of the Blockchain-Based Verification System is to provide authenticity and verifiable to the product. which can save the product from replication, forging, and duplication.
as the identity will be stored in blockchain so it will be immutable and unique. NFT refers to
“non-fungible token”, a type of token originally created through the Ethereum smart contracts.
As a special digital asset, it is indivisible, tamper-proof, irreplaceable, and one-of-a-kind. The
concept of NFT is relative to FT, which stands for “fungible token”. Bitcoin is a typical example of fungible tokens – each Bitcoin is identical to one other and can be divided into smaller
units. Each NFT, however, has a single unique identifier, which cannot be interchanged with
any other one or split into smaller units. NFT can empower creators in various fields with its
unique attributes, providing a more convenient and reliable way to authenticate digital assets.
With NFTs, creators can easily prove the existence and ownership of digital works in the form
of pictures, videos, artworks, tickets, etc. In addition, creators can also earn royalties every
time the NFTs are traded.
3.2
Architectural design / Design Patterns
For our architecture, we have used HTML, CSS, and Bootstrap for landing page and solidity
for blockchain smart contracts.
3.3
Process flow / Representation
5
Chapter-3
Design
Figure 3.1: Process Flow
6
Chapter-3
3.4
Design
Design model
For the design model, this class diagram is the base for the understanding of the project
overview.
7
Chapter-3
Design
Figure 3.2: Design Model
8
Chapter-3
3.5
Design
Data Design
The below design is the overview of the data verification of products through blockchain.
9
Chapter-3
Design
Figure 3.3: Data Design
10
Chapter 4
System Development
4.1
Technological Elements
Blockchain: Blockchain is a technology that was first known as a distributed ledger for
Bitcoin. Blockchain is a distributed and tamper-proof database. In essence, it is a list of
recorded data and information that is protected by encryption protocols. Blockchain provides
a viable solution to the long-standing Byzantine Generals’ problem.
Smart contract: The smart contract accelerates the execution and verification process of
digital protocols. Blockchain-based smart contracts use Turing complete scripting languages
to build complex functions that are compatible with each other and are executed through
consensus algorithms to ensure consistency. Smart contracts enable fair transactions that
do not rely on third-party credit intermediaries, thus making cross-industry, cross-field, and
cross-ecosystem value interactions possible.
On-chain transaction: On-chain transactions require blockchain addresses and instructions for the transactions. A blockchain address is composed of a fixed number of letters,
numbers, and characters It is a unique identifier for users to send and receive assets, much
like a bank account, and has a pair of corresponding public and private keys to verify the
authenticity of the transaction.
Data coding: Through data coding, files can be compressed into an effective format to
save storage. The authentication of the NFT assets is actually the authentication of the hash
values signed by the creator of the NFT. Others may copy the metadata, but they cannot
prove their ownership.
4.2
Protocol Standards
Fundamentally, the underlying logic of NFT is based on distributed ledger and relies on peerto-peer networks for transactions. If the blockchain distributed ledger is regarded as a special
type of database, then it is the place where NFTs are stored – the actual storage of NFTs
is more complicated though. Assuming that this database is secure, consistent, integral, and
accessible, the entire NFT closed-loop ecosystem mainly includes the following scenarios.
4.3
Key Features
NFT is essentially a type of dApp, that is, a decentralized application. It inherits various
qualities from the underlying public ledger, which can be summarized as follows:
11
Chapter-4
System Development
Verifiable: NFT’s token metadata and ownership can be publicly verified. The premise is
that metadata is stored on the blockchain. If it is stored off-chain, then it is up to the off-chain
storage system to determine whether it can be publicly verified. Centralized storage does not
allow public verification, which means the device owners can change the data as they wish;
IPFS can verify whether the data has been tampered with through CID, but cannot verify the
storage status; IPFS and other decentralized cloud storage systems can not only verify whether
the data has tampered but also the storage and redundancy status of the data.
Transparent: the entire process of NFT including minting, selling, and purchasing is publicly accessible. However, the storage of NFT metadata and media data is not completely
transparent or available to the public. NFT creators can choose the storage method they like,
but the security of most storage methods cannot be clearly assessed.
Available: The system on the blockchain that NFT relies on will never be compromised.
All the issued NFTs will never have difficulty in selling or purchasing. There are the potential
risks of unavailability for off-chain storage for NFT data. Currently, only decentralized storage
systems such as MEFS have set up well-established risk control mechanisms; all the centralized
storage systems and IPFS are not yet ready for risk control.
Tamper-proof : once confirmed, NFT metadata and the complete set of transaction records
are permanently stored; it only allows further addition of new information but not a modification to the existing information. If the metadata is stored in a centralized server, the service
operators can tamper with the data at will; and file systems such as IPFS and MEFS are
tamper-resistance.
Easy to circulate: the information that each NFT user sees is updated in real-time, which
eliminates the traditional information barrier between the creator, credit intermediary, and the
buyer, and makes the information clearer and easy to circulate.
Atomic: NFT transactions can be completed in an atomic, consistent, isolated, and durable
(ACID) system.
12
Chapter 5
Testing
Smart Contract testing is the process of evaluating and verifying whether a contract is getting
the data or not. The benefits of testing include preventing bugs, reducing development costs
and improving performance.
5.1
Manual Testing
The purpose of Manual Testing is to identify the bugs, issues, and defects in the smart contract.
Manual smart contract testing is the most primitive technique of all testing types and it helps
to find critical bugs in the smart contract. Once the smart contract has been successfully
deployed, testing has to be performed to ensure that the contract is working as intended. This
is also to check that the contract meets the requirements stated earlier. Besides that, testing
will help in finding the errors that may be hidden from the user.
5.1.1
Unit testing
A unit test is simple, quick to run, and provides a clear idea of what went wrong if the test fails.
Unit tests are crucial for smart contract development, especially if you need to add new logic to
the code. You can verify the behavior of each function and confirm that it executes as intended.
5.1.2
Integration testing
The result of integration testing is below:
13
Chapter-5
Testing
Figure 5.1: Integration Testing
5.2
Automation Testing
You may be wondering how we’re going to run these tests since smart contracts are executed
inside a blockchain. Using the actual Ethereum network would be very expensive, and while
testnets are free, they are also slow (with block times between 5 and 20 seconds). If we intend
to run hundreds of tests whenever we make a change to our code, we need something better.
What we will use is called a local blockchain: a slimmed-down version of the real thing,
disconnected from the Internet, running on your machine. This will simplify things quite a
bit: you won’t need to get Ether, and new blocks will be mined instantly.
14
Chapter-5
Testing
Figure 5.2: Automation Testing
15
Chapter 6
Future Directions and Conclusion
Future Directions:
Integration with e-commerce platforms: Integrating the verification system with popular
e-commerce platforms can greatly increase its adoption and effectiveness. This will enable
customers to easily verify the authenticity of cosmetics products purchased online.
Artificial intelligence and machine learning: Incorporating artificial intelligence and machine learning algorithms can improve the accuracy and efficiency of the verification process.
This can help to detect counterfeit products with even greater accuracy and reduce false positives.
Expansion to other industries: The concept of using blockchain for product verification can
be expanded to other industries, such as pharmaceuticals and luxury goods. This will help to
combat the problem of counterfeit products in these industries and provide consumers with
greater protection.
Conclusion: Counterfeit cosmetics products pose a serious threat to both consumers and the
cosmetics industry. By using blockchain technology, the Counterfeit Cosmetics Verification
System provides a secure and reliable way to verify the authenticity of cosmetics products. As
the system continues to evolve and incorporate new technologies, it has the potential to make
a significant impact in the fight against counterfeit cosmetics.
16
Appendix A - User Manual
Introduction
The global development of a product or technology always comes with risk factors such as
counterfeiting and duplication, which can affect the company’s name, company revenue, and
customer health. There are so many products that exist in the supply chain. To ensure that
the product is real or fake. Because of counterfeit or fake products, manufacturers face the
biggest problem and huge losses. To find the genuineness of the product we can use blockchain
technology. Blockchain is an arrangement of recording information that makes it troublesome
or hard to change, hack, or cheat the framework. A blockchain is essentially a computerized
record of transactions that is duplicated and distributed across the entire network of PC systems on the blockchain. Each block in the chain contains multiple transactions, and every time
a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s record. The decentralized database managed by the number of participants is known
as Distributed Ledger Technology (DLT). Blockchain is a type of DLT in which transactions
are recorded with an immutable cryptographic signature called a hash. Blockchain technology
helps to solve the problem of counterfeiting a product. Blockchain technology is more secure.
Once the product is stored on the network hash code is generated for that product and it is
possible to maintain all transaction records of the product and its current owner as a chain
will be created for that product’s transactions. All the transaction records will be stored in the
form of blocks in the blockchain. In the proposed system we are assigning a generated QR code
to a particular product and the end customer can scan that QR code to get all information
about that product. After scanning the QR code we can identify whether the product is real
or fake.
Literature Review
Value of Literature
The literature review is an essential part of the research paper. It provides knowledge based
on the research topic. It identifies the research gap in previous related research and discusses
the questions that arise in previous related research. It also explains the relationship between
current research and previous research .it makes clear either new research is needed or not.
In short, it describes why your research is better than others. It is also important to support
research in case of funding. Make sure to give credit to others whose research you cite in your
research paper.
Design
Process Flow of project:
17
Appendix A
Figure 6.1: Process Flow
18
Appendix A
Figure 6.2: Design model
Design model
For the design model, this class diagram is the base for the understanding of the project
overview.
19
Appendix A
Data design
The below design is the overview of the data verification of products through blockchain.
20
Appendix A
Figure 6.3: Data design
21
Appendix A
Figure 6.4: Structure of Blockchain process
Structure of Blockchain process
The below diagram is an overview of the Structure of the Blockchain process.
22
Appendix A
System Development:
Blockchain:
Blockchain is a technology that was first known as a distributed ledger for Bitcoin. Blockchain
is a distributed and tamper-proof database. In essence, it is a list of recorded data and information that is protected by encryption protocols. Blockchain provides a viable solution to the
long-standing Byzantine Generals’ problem.
Smart contract:
The smart contract accelerates the execution and verification process of digital protocols.
Blockchain-based smart contracts use Turing complete scripting languages to build complex
functions that are compatible with each other and are executed through consensus algorithms
to ensure consistency. Smart contracts enable fair transactions that do not rely on third-party
credit intermediaries, thus making cross-industry, cross-field, and cross-ecosystem value interactions possible.
On-chain transaction:
On-chain transactions require blockchain addresses and instructions for the transactions. A
blockchain address is composed of a fixed number of letters, numbers, and characters It is a
unique identifier for users to send and receive assets, much like a bank account, and has a pair
of corresponding public and private keys to verify the authenticity of the transaction.
Data coding:
Through data coding, files can be compressed into an effective format to save storage. The
authentication of the NFT assets is actually the authentication of the hash values signed by
the creator of the NFT. Others may copy the metadata, but they cannot prove their ownership.
Project Working
QR code scan image:
23
Appendix A
Figure 6.5: QR code scan image
24
Appendix A
After QR code scanning:
25
Appendix A
26
Figure 6.6: After QR code scanning
Appendix A
RESULT:
This real-time system can be implemented to check whether the received product is a counterfeit product or an original product. The manufacturer uses the SHA-256 algorithm to generate
a QR code in blockchain technology. The generated QR code is scanned by the user to check
given product is fake or real.
CONCLUSION:
Counterfeit products are growing exponentially with the enormous amount online. So, there is
a strong need to detect counterfeit products and blockchain technology is used to detect fake
products. Furthermore, the information is encoded into a QR code. Customers or users scan
the QR code and then they can detect the fake product. Digital information about products
can be stored in the form of blocks in blockchain technology. The data can be stored in the
ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply
chain. Customers can scan QR codes assigned to a product and can get all the information
like transaction history, and current owner based on which end-user can check whether the
product is genuine or not.
27
Appendix B- Software Requirement
Specification (SRS)
Introduction:
In this exceptional time, counterfeit cosmetics are found in more important closeness. This
prompts the arrangement of a lot of fake things which achieves confusion and uncertainty
among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has
been very powerful in giving anti-counterfeit measures. Consider the possibility that we use
blockchain innovation to recognize unique items and add a QR code to them while assembling.
The QR code of the item will be connected to a Blockchain. We can store the item’s details
and create a QR code for that item as a block in the database. Now, individuals would have
the option to check the QR code utilizing their cell phones and scan the QR code. It will look
at the QR code for the link attached to it. Assuming the data get found, it will redirect it to
the information of the product which is stored on the blockchain.
PURPOSE:
The purpose of the Blockchain-Based Verification System is to provide authenticity and
verifiable to the product. which can save the product from replication, forging, and duplication. as the identity will be stored in blockchain so it will be immutable and unique.
Intended Audience:
The Audience for the current product is consumers/buyers of the product they will be
able to verify the product’s genuineness easily and they can trust that the item they have is
authentic. it can also include retail sellers who can also verify the product they are going to
put forth in the market for selling purposes.
Intended Use:
The Usage of the product is to let the User verify the product’s genuineness and authenticity. the product will be able to remove the issue regarding forgery and replication of the same
product. it will be used to differentiate between a real and a fake product.
System Features and Requirements:
Functional Requirements:
The Functional Requirement is to make and store the unique identity of the product in
blockchain so it becomes immutable and stored in the ledger forever. After storing the prod28
Appendix A
uct details we will use the NFT (ERC-721) Mechanism to store the product as an NFT .
and it will be listed in the Marketplace called Opensea for the user to locate and view the
product details. We will convert the product link into a QR-CODE which will be printed or
embedded on the product. So it can be scanned and redirected to the product description page.
External Interface Requirements:
There are two External Interfaces which are as follows:
Product Description Page:
It will be an Opensea link where the product and its details, and description will be located.
Product Insertion Page.:
It will be the page where the admin will be able to register the product in the blockchain.
QR Code Scanning
The system shall allow users to scan a product’s QR code to retrieve information about
the product and its manufacturer.
Product Information Retrieval
The system shall retrieve the product information from the blockchain database, including
the product’s manufacturer, ingredients, and production date.
Authentication Verification
The system shall verify the authenticity of the product by comparing the information retrieved from the QR code with the information stored in the blockchain database.
Alerts for Counterfeit Products
The system shall provide an alert to the user if a product is determined to be counterfeit.
Blockchain Database
The system shall use blockchain technology to create a secure and tamper-proof database of
cosmetics products and their respective manufacturers.
Non-Functional Requirements
Security
The system shall use encryption and secure authentication methods to ensure the security of
the blockchain database and prevent unauthorized access.
User-Friendliness
The system shall have a user-friendly interface for scanning QR codes and accessing product
information.
29
Appendix A
Scalability
The system shall be scalable and able to accommodate an increasing number of products and
users over time.
Performance
The system shall have a fast and efficient performance, with a quick response time for QR code
scanning and product information retrieval.
Constraints
Technology
The system shall use blockchain technology for creating and maintaining the database of cosmetics products and their respective manufacturers.
Integration
The system shall be integrated with existing cosmetics industry standards and regulations.
Assumptions and Dependencies
QR Code Availability
It is assumed that all cosmetics products will have a unique QR code that can be scanned by
the system.
Internet Connectivity
It is assumed that users will have access to the internet to use the system.
Compliance with Industry Standards
It is assumed that all cosmetics products and manufacturers will comply with existing industry
standards and regulations.
Conclusion
The proposed blockchain-based system for detecting counterfeit cosmetics will provide a secure
and efficient solution for verifying the authenticity of cosmetics products. The system will use
blockchain technology to create a tamper-proof database and QR code scanning to retrieve
product information and verify authenticity. The system will be user-friendly and scalable to
accommodate an increasing number of products and users over time.
30
Appendix C- Dissemination Activity
Abstract
In recent years, Counterfeit products play an important role in product manufacturing industries. This affects the companies name, sales, and profit of the companies. Blockchain
technology is used to identification of real products and detects fake products. Blockchain
technology is the distributed, decentralized, and digital ledger that stores transactional information in the form of blocks in many databases which is connected with the chains. Blockchain
technology is secure technology therefore any block cannot be changed or hacked. By using
Blockchain technology, customers or users do not need to rely on third-party users for confirmation of product safety. In this project, with emerging trends in mobile and wireless technology,
Quick Response (QR) codes provide a robust technique to fight the practice of counterfeiting
the products. counterfeit products are detected using a QR code scanner, where a QR code
of the product is linked to a Blockchain. So this system may be used to store product details
and generated unique code of that product as blocks in the database.
Introduction
In this exceptional time, counterfeit cosmetics are found in more important closeness. This
prompts the arrangement of a lot of fake things which achieves confusion and uncertainty
among clients. For over 10 years now, RFID (Radio Frequency Identification) innovation has
been very powerful in giving anti-counterfeit measures. Consider the possibility that we use
blockchain innovation to recognize unique items and add a QR code to them while assembling.
The QR code of the item will be connected to a Blockchain. We can store the item’s details
and create a QR code for that item as a block in the database. Now, individuals would have
the option to check the QR code utilizing their cell phones and scan the QR code. It will look
at the QR code for the link attached to it. Assuming the data get found, it will redirect it to
the information of the product which is stored on the blockchain.
Background Study
There is no decent arrangement before to separate fake cosmetics from original cosmetics.
Blockchain innovation can be useful to handle such issues. The task’s primary objective is to
assist individuals with distinguishing whether the cosmetic is an original cosmetic or a fake
Pakistan and various countries are engaging in such endlessly counterfeit things. In the the proposed system, system produces QR codes using Blockchain advancement. Why blockchain??
Unlike a typical database, Blockchain has a non-horrendous (permanent) method for following
data changes over the long run. This implies that data isn’t editable rather, at whatever point
refreshes are made, another block is added to the ”block-chain”. This helps track the verifiable
data (genuineness and proprietor data) of an item. The plus point we have in the blockchain
is transparency. Utilizing Blockchain, authenticity can be checked and responsibility for a cosmetic can be moved a very long time from now; regardless of whether the cosmetic is ceased.
31
Appendix C
Previous Projects
A Survey of Counterfeit Product Detection by Prabhu Shankar, R. Jayavadivel. Counterfeit
products are growing exponentially with the enormous amount of online and black markets. So,
there is a strong need to address the challenges of detecting counterfeit products and designing
appropriate technology to improve detection accuracy. This is one of the active research areas
to be explored in the current world. This paper discusses various techniques for identifying
counterfeit products.
Smart Tags for Brand protection and anti-counterfeiting in the wine industry by steven, Marko.
This paper describes a brand protection and anticounterfeiting solution for the wine industry
based on smart tags and Cloud-enabled technologies. The main idea behind smart tags is to
utilize quick response codes and functional inks supported by the Cloud system and two-way
communication between the winemaker and end-user.
A Blockchain-based Supply Chain Quality Management Framework by Si Chen, Rui Shi. In
this paper, we propose a blockchain-based framework. This framework will provide a theoretical basis for intelligent quality management of the supply chain based on blockchain technology.
Furthermore, it provides a foundation to develop theories about information resource management in distributed, virtual organizations.
Features
NFT is essentially a type of dApp, that is, a decentralized application. It inherits various
qualities from the underlying public ledger, which can be summarized as follows:
Verifiable: NFT’s token metadata and ownership can be publicly verified. The premise is
that metadata is stored on the blockchain. If it is stored off-chain, then it is up to the off-chain
storage system to determine whether it can be publicly verified. Centralized storage does not
allow public verification, which means the device owners can change the data as they wish;
IPFS can verify whether the data has been tampered with through CID, but cannot verify the
storage status; IPFS and other decentralized cloud storage systems can not only verify whether
the data has tampered but also the storage and redundancy status of the data.
Transparent: the entire process of NFT including minting, selling, and purchasing is
publicly accessible. However, the storage of NFT metadata and media data is not completely
transparent or available to the public. NFT creators can choose the storage method they like,
but the security of most storage methods cannot be clearly assessed.
Available: The system on the blockchain that NFT relies on will never be compromised.
All the issued NFTs will never have difficulty in selling or purchasing. There are the potential
risks of unavailability for off-chain storage for NFT data. Currently, only decentralized storage
systems such as MEFS have set up well-established risk control mechanisms; all the centralized
storage systems and IPFS are not yet ready for risk control.
Tamper-proof: once confirmed, NFT metadata and the complete set of transaction
records are permanently stored; it only allows further addition of new information but not
a modification to the existing information. If the metadata is stored in a centralized server,
the service operators can tamper with the data at will; and file systems such as IPFS and
MEFS are tamper-resistance.
Easy to circulate: the information that each NFT user sees is updated in real-time, which
32
Appendix C
eliminates the traditional information barrier between the creator, credit intermediary, and the
buyer, and makes the information clearer and easy to circulate.
Atomic: NFT transactions can be completed in an atomic, consistent, isolated, and
durable (ACID) system.
This real-time system can be implemented to check whether the received product is a
counter- feit product or an original product. The manufacturer uses the SHA-256 algorithm
to generate a QR code in blockchain technology. The generated QR code is scanned by the
user to check given product is fake or real
Technology Elements
Blockchain: Blockchain is a technology that was first known as a distributed ledger for Bitcoin. Blockchain is a distributed and tamper-proof database. In essence, it is a list of recorded
data and information that is protected by encryption protocols. Blockchain provides a viable
solution to the long-standing Byzantine Generals’ problem.
Smart contract: The smart contract accelerates the execution and verification process of
digital protocols. Blockchain-based smart contracts use Turing complete scripting languages
to build complex functions that are compatible with each other and are executed through
consensus algorithms to ensure consistency. Smart contracts enable fair transactions that do
not rely on third-party credit intermediaries, thus making cross-industry, cross-field, and crossecosystem value interactions possible.
On-chain transaction: On-chain transactions require blockchain addresses and instructions for the transactions. A blockchain address is composed of a fixed number of letters,
numbers, and characters It is a unique identifier for users to send and receive assets, much
like a bank account, and has a pair of corresponding public and private keys to verify the
authenticity of the transaction.
Data coding: Through data coding, files can be compressed into an effective format to
save storage. The authentication of the NFT assets is actually the authentication of the hash
values signed by the creator of the NFT. Others may copy the metadata, but they cannot
prove their ownership.
Project Working
QR code scan image:
33
Appendix C
Figure 6.7: QR code scan image
34
Appendix C
After QR code scanning:
35
Appendix C
36
Figure 6.8: QR code scan image
Appendix C
RESULT:
This real-time system can be implemented to check whether the received product is a counterfeit product or an original product. The manufacturer uses the SHA-256 algorithm to generate
a QR code in blockchain technology. The generated QR code is scanned by the user to check
given product is fake or real.
CONCLUSION:
Counterfeit products are growing exponentially with the enormous amount online. So, there is
a strong need to detect counterfeit products and blockchain technology is used to detect fake
products. Furthermore, the information is encoded into a QR code. Customers or users scan
the QR code and then they can detect the fake product. Digital information about products
can be stored in the form of blocks in blockchain technology. The data can be stored in the
ipfs. Thus, the proposed system is useful for the customer to detect fake products in the supply
chain. Customers can scan QR codes assigned to a product and can get all the information
like transaction history, and current owner based on which end-user can check whether the
product is genuine or not.
37
Appendix D- Marketing/Promotional
Material
Standee
38
Appendix D
Figure 6.9: Standee
39
Appendix D
Figure 6.10: Brochure Front
Brochure Front
40
Appendix D
Figure 6.11: Brochure Back
Brochure Back
41
References
[1] https://ieeexplore.ieee.org/document/8119146
[2] https://www.researchgate.net/publication/355516768P roductA uthenticationU singB lockchain
[3] Si Chen, Rui Shi, Ren, Jiaqi Yan, Yani Shi, “A Blockchain-based Supply Chain Quality Management Framework”, 14th, IEEE International Conference on e-Business Engineering, 2017.
[4] Blockchain-Based Fake Product Identification in Supply Chain www.irjet.net: Ajay Funde, Pranjal Nahar,
Ashwini Khilari.
[5] Fake News Detection In Social Media using Blockchain: - Shovon Paul, Jubair Joy, Shaila Sarkar.
42
Download