Fake Product Identification Using Blockchain Technology

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : July 17, 2024 at 3:30 pm | [if 1553 equals=””] Volume :14 [else] Volume :14[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : 26-35

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

Padma Bhogaraju, Venkata Lakshmi, Vinay Akash T, Sasi Vinay K, Santhi Krishna B

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Associate Professor, Student, student, Student, Student Department of CSE Gayatri Vidya Parishad College of Degree & PG Courses(A) Visakhapatnam, Department of CSE Gayatri Vidya Parishad College of Degree & PG Courses(A) Visakhapatnam, Department of CSE Gayatri Vidya Parishad College of Degree & PG Courses(A) Visakhapatnam, Department of CSE Gayatri Vidya Parishad College of Degree & PG Courses(A) Visakhapatnam, Department of CSE Gayatri Vidya Parishad College of Degree & PG Courses(A) Visakhapatnam Andhra Pradesh, Andhra Pradesh, Andhra Pradesh, Andhra Pradesh, Andhra Pradesh India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nBlockchain technology has founded to detect fakes fast and identify genuine products possible. Essentially, Block chain is a sort of digital ledger which stores business information in blocks across several lots of databases that are connected through chains. The reason why Block chain is secure lies in decentralization that prevents any unauthorized changes to saved facts. By leveraging Block chain technology, clients can guarantee the genuity of their items without intermediate agents. The main approach aimed at tackling fake commodities entails provision of individual QR codes for each product as contained within the Blockchain’s blocks. The Authentication of Manufacturer is carried by face Recognition, matching with Manufacturer ID and Manufacturer name. These product codes can be generated by manufacturers or sellers giving a unique QR for product. Whenever users check these QRs into the system, the Blockchain system verifies whether the product is authentic or not. In case there are differences identified, customers are immediately notified about possible whether it is genuine or not.

n

n

n

Keywords: Blockchain technology, distributed ledger, authentication, decentralization, fake

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Production Research & Management(joprm)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Production Research & Management(joprm)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Padma Bhogaraju, Venkata Lakshmi, Vinay Akash T, Sasi Vinay K, Santhi Krishna B. Fake Product Identification Using Blockchain Technology. Journal of Production Research & Management. July 17, 2024; 14(02):26-35.

n

How to cite this URL: Padma Bhogaraju, Venkata Lakshmi, Vinay Akash T, Sasi Vinay K, Santhi Krishna B. Fake Product Identification Using Blockchain Technology. Journal of Production Research & Management. July 17, 2024; 14(02):26-35. Available from: https://journals.stmjournals.com/joprm/article=July 17, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. ASPA, The state of counterfeiting in India 2021 (2021)
  2. Lu, Detection of Counterfeit products using Blockchain, Journal of Management Analytics 5, 1 (2018)
  3. Peck, Detection of Counterfeit products using Blockchain, IEEE Spectrum 54, 26 (2017).
  4. Idrees, M. Nowostawski, R. Jameel, A. Mourya, Security Aspects of Blockchain Technology Intended for Industrial Applications, Electronics 10, 951 (2021).
  5. Ma, S.Y. Lin, X. Chen, H.M. Sun, Y.C. Chen, H. Wang, A blockchain based application system for product anticounterfeiting, IEEE Access 8, 77642 (2020).
  6. J.L.I.N.M. J.M. Bohli, N. Gruschka, Detection of Counterfeit products using Blockchain, IEEE 10, 9 (2013).
  7. Shaik, Preventing Counterfeit Products using cryptography, QR code and web service, Computer Science & Engineering: An International Journal (CSEIJ) 11 (2021).
  8. A. Benatia, D. Baudry, A. Louis, Journal of Ambient Intelligence and Humanized Computing pp. 1–10 (2020).
  9. Khalil, R. Doss, M. Chowdhury, IEEE Access 8, 47952 (2020) [12] M.A. Habib, M.B. Sardar, S. Jabbar, C.N. Faisal, N. Mahmood, M. Ahmad, Blockchain-based supply chain for the automation of transaction.
  10. Liu, J., Yeoh, W., Qu, Y., & Gao, L. (2022). Blockchain-based digital twin for supply chain management: State-of-the-art review and future research directions. arXiv preprint arXiv:2202.03966.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Original Research

n

n

n

n

n

Journal of Production Research & Management

n

[if 344 not_equal=””]ISSN: 2249-4766[/if 344]

n

n

n

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 14
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received May 24, 2024
Accepted June 5, 2024
Published July 17, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]