0% found this document useful (0 votes)
14 views43 pages

Final Final Report

The project report presents a counterfeit product detection system utilizing blockchain technology to enhance product authenticity verification. It aims to address the challenges posed by counterfeit goods across various industries, ensuring consumer safety and brand integrity through a decentralized and tamper-proof platform. The system integrates AngularJS for administrative management and Flutter for user experience, promoting transparency and trust in the marketplace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views43 pages

Final Final Report

The project report presents a counterfeit product detection system utilizing blockchain technology to enhance product authenticity verification. It aims to address the challenges posed by counterfeit goods across various industries, ensuring consumer safety and brand integrity through a decentralized and tamper-proof platform. The system integrates AngularJS for administrative management and Flutter for user experience, promoting transparency and trust in the marketplace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

A PROJECT REPORT

ON

COUNTERFEIT PRODUCT DETECTION USING BLOCKCHAIN

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING
IN
ELECTRONICS AND TELECOMMUNICATION

BY

Abhimanyu Tambade Exam No. B400360449


Manas Talware Exam No. B400360448
Shaina Choudhary Exam No. B400360182

UNDER THE GUIDANCE OF

Mrs. T.A.Mate

DEPARTMENT OF ELECTRONICS AND TELECOMMUNICATION ENGG.


STES’S
SMT. KASHIBAI NAVALE COLLEGE OF ENGINEERING
VADGAON BK., OFF.SINHGAD ROAD
PUNE 411041
2024– 2025
CERTIFICATE

This is to certify that the Project report entitled

“COUNTERFEIT PRODUCT DETECTION USING BLOCKCHAIN”

Submitted by

Abhimanyu Tambade Exam No. B400360449


Manas Talware Exam No. B400360448
Shaina Choudhary Exam No. B400360182

is a bonafide work carried out by them under the supervision of Mrs. Trupti Mate and it is approved for
the partial fulfillment of the requirement of Savitribai Phule Pune University for the award of the Degree
of Bachelor of Engineering (Electronics and Telecommunication Engineering).
This project report has not been earlier submitted to any other Institute or University for the award of any
degree.

Mrs. T.A.Mate Mr. P. S. Kokare /Ms. M.M. Sonkhaskar


Project Guide Project Coordinators
Department of E&TC SKNCOE, Pune
SKNCOE, Pune

Dr. P.S. Raskar Dr. A.V. Deshpande


Program Coordinator (HOD) Principal
SKNCOE, Pune SKNCOE, Pune

Place: Pune
Date: 07/05/2025
1
ACKNOWLEDGEMENT

Acknowledgment plays a crucial role in recognizing the contributions of individuals and entities involved
in the development of the web-based student management portal. We extend our heartfelt gratitude to
Smt. Kashibai Navale College of Engineering, Pune.
To provide the necessary resources and support for this project. We are immensely thankful to our HOD
Dr. P. S. Raskar, our project coordinators Mr. P. S. Kokare and Ms. M.M. Sonkhaskar also our project
guide Mrs. T. A. Mate ma’am for their invaluable guidance, expertise, and encouragement throughout the
development process. We also express our appreciation to the faculty members and administrative staff
who provided valuable insights and feedback during the testing phase.
Additionally, we acknowledge the dedication and hard work of the Testing team members who
contributed to give suggestions of the design, coding, and testing of the portal. Lastly, we extend our
gratitude to all the users who participated in the testing and provided valuable feedback for improving the
portal's functionality and usability. This project would not have been possible without the collective
efforts of everyone involved, and we are sincerely grateful for their contributions

2
ABSTRACT

The proliferation of counterfeit products across various industries has emerged as a grave concern, posing
significant threats to consumer safety, brand integrity, and market stability. In response to this pressing
issue, this project endeavours to design and implement an innovative Fake Product Detection System,
harnessing the power of blockchain technology, while integrating AngularJS for the administrative
interface and employing Flutter for an intuitive user experience. This comprehensive system aspires to
provide a robust, tamper-proof platform for the verification of product authenticity and registration.
Leveraging blockchain's decentralized ledger technology, the system will record every legitimate
product's unique identifier and transaction history, making it virtually impossible for counterfeit products
to infiltrate the market undetected. AngularJS will ensure a seamless administrative experience for
managing and monitoring product registrations, while Flutter will deliver an intuitive and user-friendly
interface for consumers to easily verify the authenticity of their purchased items. By combining
blockchain's security and transparency with the user-friendly interfaces of AngularJS and Flutter, this
project aims to significantly enhance consumer confidence, protect brand integrity, and foster market
stability by effectively combating the counterfeit product epidemic. In doing so, it addresses a critical
issue that impacts both businesses and consumers, contributing to a safer and more trustworthy
marketplace.

Keywords: Angular JS, Blockchain technology, Flutter, Firebase, Android Studio

3
CONTENTS

CERTIFICATE i
ACKNOWLEDGEMENT ii
ABSTRACT iii
INDEX iv
LIST OF FIGURES v

INDEX

CHAPTER TITLE PAGE NO.

1.
INTRODUCTION 1-3
1.1 BACKGROUND 2
1.2 RELEVANCE 2
1.3 SUMMARY 3

2. LITERATURE SURVEY 4-9


2.1 INTRODUCTION 5
2.2 SUMMARY 8

3. DESIGN AND DRAWING 10-17


3.1 INTRODUCTION 11
3.2 BLOCK DIAGRAM 11
3.3 BLOCK DIAGRAM DESCRIPTION 12
3.4 SUMMARY 16

4. IMPLEMENTATION 18-25
4.1 INTRODUCTION 19
4.2 FLOWCHART OF PROPOSED SYSTEM 19
4.3 DESCRIPTION OF FLOWCHART 20
4.4 TECHNOLOGY INTEGRATION 21

5. EXPERIMENTATION 26-32
5.1 INTRODUCTION 27

6. RESULTS AND DISCUSSION 33-41


6.1 INTRODUCTION 34
6.2 DESCRIPTION OF CODE 34

7. CONCLUSION 43

REFERENCES 44

4
List of Figures
Figure No. Figure Name Page No.

3.2 Block Diagram of proposed system 11

4.2 Flowchart of Proposed system 20

5.2 Admin home Code 29

5.3 Login Page Code 30

5.4 Update Page Components 31

5.5 App Routing Module 31


5.6 App Component Code 32

6.3 Login Page 36

6.4 Admin Home 36

6.5 Generated QR Code 37

6.6 Status of the Product 37

6.7 User Home 38

6.8 Unregistered Product 39

6.9 Scanned Product 40

6.10 Registered Product 41

5
Introduction

In the realm of product development, inherent risk factors such as counterfeiting and duplication always
loom ominously, casting a shadow over a company's name, reputation, revenue, and customer satisfaction.
The proliferation of counterfeit products in today's markets has been nothing short of alarming, posing a
growing threat to businesses and consumers alike. To tackle this pressing issue and ensure the
identification and tracking of counterfeit goods, we propose the implementation of a fully functional
blockchain system. This innovative approach offers a lifeline to companies, requiring minimal effort on
their part while relieving them of the constant worry regarding counterfeit products tarnishing their
brand's integrity. Counterfeit products inflict substantial damage on manufacturers, not just in terms of
revenue losses but also in the erosion of their company's reputation. Customers, believing these
counterfeits to be genuine products, often leave reviews based on the false premise, further compounding
the damage. To surmount this challenge, the adoption of a blockchain-based system emerges as a
compelling solution. Blockchain technology operates on a distributed, decentralized model, where data is
stored in blocks within a secure database, each block intricately connected to the previous one in a chain-
like fashion. Importantly, once data is added to the blockchain, it becomes immutable; no user can alter or
erase it. This inherent security feature ensures the protection and integrity of data. Blockchain, with its
tamper-proof nature and robust data protection mechanisms, offers a promising avenue for combatting the
scourge of counterfeit products. By leveraging the blockchain's architecture, we can create an unassailable
barrier against counterfeiting, providing companies and consumers with the confidence that every
product's authenticity can be verified with utmost certainty.

1.1 BACKGROUND:

This transformative approach not only promises to safeguard businesses from reputational damage but
also ensures consumers can trust the products they purchase, fostering a more secure and trustworthy
marketplace for all. In essence, blockchain emerges as the key to alleviating the persistent problem of
counterfeit products, heralding a new era of transparency and security in the world of commerce.
Counterfeit products have become a pervasive issue in today’s globalized economy, affecting industries
ranging from pharmaceuticals to luxury goods. These fake products not only lead to significant revenue
losses for legitimate companies but also pose serious risks to consumer health and safety. Traditional
methods of authentication and supply chain management have struggled to keep up with the scale and
sophistication of counterfeiting operations.

Blockchain technology offers a promising solution to combat counterfeiting through its ability to provide
secure, transparent, and tamper-resistant records. By implementing blockchain for product tracking and
verification, it becomes possible to create a reliable, decentralized system where every stage of a product’s
journey can be traced. This ensures that consumers and businesses can verify the authenticity of products
with confidence.

The rise in counterfeit products across global markets has become a critical challenge for industries and
consumers alike. Counterfeit goods permeate sectors such as pharmaceuticals, electronics, fashion, and
automotive parts, resulting in annual losses amounting to billions of dollars. Beyond the financial impacts,
counterfeit products can pose serious safety risks, especially in cases involving medicines, safety-critical
automotive parts, and electronic devices. As a result, protecting supply chains from counterfeits and
ensuring product authenticity has become a priority for businesses and regulators worldwide.

6
1.2 RELEVANCE:

Traditional methods of tracking and verifying product authenticity, such as serial numbers, barcodes, and
holograms, have proven inadequate in combating the increasingly sophisticated counterfeiting techniques.
These conventional systems are often centralized, making them vulnerable to tampering and difficult to
scale across global, multi-step supply chains. Additionally, without a transparent way to track and verify
products from manufacturing through to the end consumer, there are limited ways for stakeholders to
ensure that items are genuine.

Blockchain technology offers a transformative approach to address these challenges by creating a


decentralized, transparent, and tamper-proof ledger. Blockchain’s ability to store records in an immutable,
distributed ledger can be harnessed to track products at each stage of their life cycle, from production to
end-user purchase. Each transaction or movement of a product can be recorded on the blockchain, creating
an audit trail that is highly resistant to manipulation. With blockchain, stakeholders across the supply
chain—manufacturers, distributors, retailers, and consumers—can access a trusted record of a product’s
history, enabling quick and easy verification of its authenticity.

This report explores how blockchain technology can be utilized for effective counterfeit product detection.
It examines the mechanics of blockchain, its benefits for supply chain transparency, and the specific ways
it can disrupt counterfeit practices. Through case studies and analysis, this report aims to demonstrate the
potential of blockchain to transform product authenticity verification, offering a robust solution to one of
the most challenging problems in commerce today.

1.3 SUMMARY:

Counterfeit products pose significant challenges across various industries, causing financial losses,
damaging brand reputations, and endangering consumer safety. Traditional detection methods, such as
barcodes and RFID tags, lack the transparency and security needed to effectively combat counterfeiting in
today’s complex supply chains.

Blockchain technology offers a revolutionary solution by providing a decentralized, immutable, and


transparent system for tracking products throughout their lifecycle. Each transaction or movement of a
product is securely recorded, creating a tamper-proof audit trail that enhances product authenticity and
trust. This technology not only empowers businesses to detect counterfeit goods but also allows
consumers to independently verify product authenticity.

The study explores the application of blockchain in counterfeit detection, emphasizing its potential to
improve supply chain transparency, ensure regulatory compliance, and build consumer trust. This
innovative approach is crucial in addressing the growing global threat of counterfeit products and
fostering a more secure marketplace.

7
Literature Review

2.1 Introduction:

Counterfeiting has long been a critical issue, affecting various industries and economies worldwide. Over
the years, researchers and industry experts have explored different methods to detect and prevent
counterfeit products. Traditional approaches, such as manual inspections, barcodes, and RFID systems,
have shown varying levels of effectiveness. However, these methods often struggle with issues like
scalability, data security, and real-time verification, especially in complex supply chains.With the advent
of blockchain technology, there has been a growing interest in leveraging its features for counterfeit
detection. Blockchain’s decentralized, immutable, and transparent ledger system offers a promising
solution for enhancing product traceability and authenticity. This literature survey reviews existing
research on counterfeit detection, focusing on traditional methods and the emerging role of blockchain
technology. It also highlights the strengths and limitations of these approaches and identifies gaps in
current research.By analyzing past studies, this survey aims to provide a comprehensive understanding of
the technological advancements in counterfeit detection, setting the foundation for developing more robust
and efficient solutions.

Eduard Daoud et al [1] In this paper titled "Enhancing Fake Product Detection Using Deep Learning
Object Detection Models", address a profoundly significant issue that continues to plague economies
worldwide—counterfeit products. The authors underscore the gravity of the situation, citing alarming
statistics that reveal trillions of dollars in losses attributed to counterfeit goods. Despite the commendable
efforts of regulatory bodies and authorities, it becomes evident that the magnitude of this problem
outpaces the efficacy of existing solutions. In light of this, the paper puts forth a compelling argument for
harnessing the power of consumer engagement in the fight against counterfeit products. Recognizing the
limitations of traditional approaches, the authors propose a cutting-edge solution grounded in machine
learning. Their innovative system combines image recognition, text recognition, and classification
techniques, culminating in a user-friendly platform designed to empower consumers to detect counterfeit
products with both ease and precision. This endeavor is characterized by a convergence of key
technological elements, underscored by the keywords encapsulating its essence: anti-counterfeiting, deep
learning, image recognition, object classification, and transfer learning. Through these keywords, the
paper not only articulates its primary focus on combating counterfeit products but also emphasizes its
commitment to leveraging advanced technology to address this pressing issue. The implications of this
work extend beyond mere academic interest, as it carries the potential to significantly impact the broader
socioeconomic landscape by mitigating the rampant proliferation of counterfeit goods.

Joni Salminen et al [2] Joni Salminen and his fellow researchers, in their paper titled "Creating and
Detecting Fake Reviews of Online Products" [2], delve into a critical and increasingly prevalent issue
within the realm of e-commerce – the proliferation of fake product reviews. This issue strikes at the heart
of consumer trust and the integrity of competition in online marketplaces. With a comprehensive
approach, the authors examine the dual facets of this problem, encompassing both human-generated and
machine-generated fake reviews. The paper takes a profound step by exploring the capabilities of text
generation algorithms, she
dding light on their potential to craft persuasive and deceptive fake reviews. This revelation raises
concerns about the ease with which technology, including generative language models, can contribute to
the creation of convincing yet disingenuous product feedback. In doing so, the study underscores the
8
urgency of developing and implementing robust mechanisms for fake review detection. The authors
extend their

investigation to the effectiveness of machine classifiers in the detection of fake reviews, and they make a
significant comparison with human raters. By bridging the gap between human and automated assessment,
the research elucidates the strengths and limitations of both approaches. This comparative analysis
enriches our understanding of the practical implications and potential shortcomings of current detection
methods, thus guiding future research and policy development. This research serves as an invaluable
contribution to the understanding of the multifaceted challenges posed by fake reviews in the dynamic
digital marketing landscape. It underscores the need for vigilant safeguards to protect consumers from
misleading information and to maintain the credibility and fairness of online marketplaces, making it an
essential reference for anyone engaged in e-commerce, digital marketing, or consumer protection efforts.

Kunal Wasnik et al [3] In the paper titled "Detection of Counterfeit Products using Blockchain," authored
by Kunal Wasnik and his colleagues [3], a critical issue that has significant implications for supply chains,
economics, and consumer well-being is rigorously examined. The focus of this study centers on the
pervasive problem of product counterfeiting, which has been a persistent thorn in the side of industries
around the world. In response to this challenge, the authors present a solution rooted in the innovative
technology of blockchain. Their proposal revolves around the utilization of blockchain's unique features to
enhance the detection of counterfeit products. Notably, the paper highlights the transformative power of
blockchain in facilitating the comprehensive tracking of a product's supply chain history. By employing
blockchain's decentralized and secure architecture, the authors construct a tamper-resistant and transparent
system. What sets this solution apart is its capacity to be accessed by multiple stakeholders concurrently,
which contributes to heightened transparency and accountability within the supply chain. The paper is a
resounding reminder of the substantial repercussions associated with counterfeit goods, extending well
beyond the realms of economics. The authors underscore that the ramifications encompass consumer
safety and the reputational integrity of brands. The blockchain-based system they introduce is positioned
as a promising avenue to effectively address and mitigate these multifaceted challenges. The research
encapsulated in this paper by Kunal Wasnik et al. is a testament to the transformative potential of
blockchain technology in combating counterfeit products. By offering a solution that simultaneously
bolsters supply chain integrity and safeguards consumer interests, the paper underscores the pivotal role
that innovative technology can play in addressing and rectifying issues of substantial consequence within
the global marketplace.

Tian [4] – Enhancing Agricultural Supply Chain Transparency through Blockchain


Tian's study delves into the application of blockchain technology to bolster transparency within
agricultural supply chains. By leveraging blockchain's inherent characteristics—immutability,
decentralization, and time-stamped records—the research illustrates how agricultural products can be
tracked from their origin to the end consumer. This traceability ensures that each transaction and
movement within the supply chain is recorded, making it exceedingly difficult for counterfeit products to
infiltrate the system. The study emphasizes the importance of verifying product origins, which is crucial
for maintaining authenticity and fostering consumer trust, especially in sectors where product quality and
safety are paramount.
Purpose: To demonstrate how blockchain can be utilized to improve traceability and transparency in
agricultural supply chains, thereby mitigating the risk of counterfeit products and enhancing consumer
confidence.

Chen et al. [5] – Blockchain Applications in Anti-Counterfeit Solutions Across Industries


Chen and colleagues explore the versatility of blockchain technology in combating counterfeiting across
various industries. Their research focuses on the decentralized nature of blockchain ledgers, which allows

9
for the verification of product authenticity at each distribution stage. By employing cryptographic security
features, blockchain reduces the risk of data tampering, ensuring that product information remains
unaltered throughout its lifecycle. The study highlights how these features can be applied across different
sectors,

from pharmaceuticals to luxury goods, demonstrating blockchain's adaptability as a robust anti-counterfeit


solution.
Purpose: To investigate the application of blockchain's decentralized and secure ledger system in verifying
product authenticity across multiple industries, thereby providing a scalable solution to counterfeiting.

Kshetri [6] – Verifying Authenticity in the Luxury Goods Market via Blockchain
Kshetri's research examines the implementation of blockchain technology in the luxury goods sector to
verify product authenticity. The study discusses how unique identifiers, when linked to blockchain, can
establish a trustworthy provenance trail for luxury items. This digital trail enables both retailers and
consumers to verify the authenticity of products, thereby protecting brand reputation and enhancing
consumer trust. The research underscores the potential of consumer-facing blockchain applications in
providing transparency and combating the proliferation of counterfeit luxury goods.
Purpose: To analyze how blockchain can be employed to create verifiable provenance trails for luxury
goods, thus ensuring authenticity and safeguarding brand integrity.

Mackey and Nayyar [7] – Implementing Blockchain in Pharmaceutical Supply Chains


Mackey and Nayyar focus on the critical issue of counterfeit drugs within pharmaceutical supply chains
and propose blockchain as a solution. Their study highlights blockchain's capabilities in providing
traceability and immutability, which are essential for tracking pharmaceuticals from production to end-
user delivery. By ensuring that each transaction is securely recorded and unalterable, blockchain enhances
safety and compliance within the pharmaceutical sector, thereby reducing the risks associated with
counterfeit medications.
Purpose: To explore the application of blockchain technology in pharmaceutical supply chains to enhance
drug traceability, ensure compliance, and mitigate the risks posed by counterfeit drugs.

Casino, Dasaklis, and Patsakis [8] – Utilizing Smart Contracts for Counterfeit Detection
The study by Casino and colleagues investigates the use of blockchain-enabled smart contracts as a tool
for anti-counterfeiting. Smart contracts can automatically enforce authenticity checks and trigger alerts
when discrepancies are detected. The research illustrates how these self-executing contracts provide real-
time monitoring capabilities, adding efficiency and security to counterfeit detection systems. By
automating verification processes, smart contracts reduce the reliance on manual checks and enhance the
overall integrity of supply chains.
Purpose: To examine how blockchain-based smart contracts can be implemented to automate authenticity
verification and improve the efficiency of counterfeit detection mechanisms.

Rane and Narvel [9] – Preventing Counterfeit Parts in the Automotive Industry with Blockchain
Rane and Narvel explore the application of blockchain technology to prevent the infiltration of counterfeit
parts in the automotive industry. Their study explains how blockchain can track each component
throughout the supply chain, ensuring that genuine parts are not replaced with counterfeit ones. By
maintaining a transparent and immutable record of each part's journey, automotive companies can uphold
product safety standards and protect their brand integrity against the threats posed by counterfeit
components.
Purpose: To investigate the potential of blockchain in tracking automotive parts throughout the supply
chain, thereby preventing the introduction of counterfeit components and ensuring product integrity.

10
Wang et al. [10] – Building Consumer Trust through Blockchain-Based Anti-Counterfeiting
Wang and colleagues examine how blockchain technology can be leveraged to build consumer trust in
product authenticity. Their research reveals that blockchain's transparency allows consumers to access a
product's entire lifecycle, increasing confidence in its authenticity. By providing verifiable information
about a product's origin and journey, brands can effectively combat counterfeiting while fostering long-
term

customer loyalty and trust. The study underscores the importance of transparency in enhancing consumer
relationships and brand reputation.
Purpose: To explore how blockchain's transparent and immutable records can be utilized to provide
consumers with verifiable product information, thereby enhancing trust and combating counterfeiting.

2.2 Summary:

Counterfeiting has long been a critical issue, affecting various industries and economies worldwide. Over
the years, researchers and industry experts have explored different methods to detect and prevent
counterfeit products. Traditional approaches, such as manual inspections, barcodes, and RFID systems,
have shown varying levels of effectiveness. However, these methods often struggle with issues like
scalability, data security, and real-time verification, especially in complex supply chains.

With the advent of blockchain technology, there has been a growing interest in leveraging its features for
counterfeit detection. Blockchain’s decentralized, immutable, and transparent ledger system offers a
promising solution for enhancing product traceability and authenticity. This literature survey reviews
existing research on counterfeit detection, focusing on traditional methods and the emerging role of
blockchain technology. It also highlights the strengths and limitations of these approaches and identifies
gaps in current research.

By analyzing past studies, this survey aims to provide a comprehensive understanding of the technological
advancements in counterfeit detection, setting the foundation for developing more robust and efficient
solutions.

Counterfeiting has long posed a critical challenge for industries across the globe, affecting sectors such as
pharmaceuticals, agriculture, automotive, electronics, luxury goods, and more. It not only results in
significant financial losses but also endangers public health and safety, undermines consumer trust, and
disrupts fair market competition. According to global estimates, counterfeit goods account for hundreds of
billions of dollars in annual losses. These issues are further amplified in today’s globalized and complex
supply chains, where products pass through numerous intermediaries and logistical stages before reaching
the end consumer.

Over the years, various methods and technologies have been developed to detect and prevent counterfeit
products. Traditional anti-counterfeiting measures include manual inspections, watermarks, holograms,
serialized barcodes, and RFID (Radio Frequency Identification) systems. These tools have been effective
to some extent, particularly in sectors where counterfeiting patterns are predictable or localized. For
instance, RFID and barcode scanning allow for the basic tracking of products within supply chains.
However, these systems face several limitations in practice. Manual inspections are labor-intensive, prone
to human error, and often not feasible at scale. Barcodes and RFID tags, while helpful, can be replicated,
tampered with, or corrupted. Moreover, these systems often operate in silos without interoperability,
making it difficult to create a unified and transparent traceability system across the entire supply chain.

11
Another major drawback of traditional systems lies in their reliance on centralized data storage, which
introduces security vulnerabilities and risks of data manipulation. As counterfeiters evolve and adopt more
sophisticated tactics, traditional methods struggle to keep pace. Additionally, many conventional
approaches lack real-time verification capabilities, which are essential for proactive and immediate
counterfeit detection, especially in high-stakes industries such as pharmaceuticals and aviation.

The emergence of blockchain technology in recent years has generated significant interest among
researchers, technologists, and industry stakeholders for its potential to transform the landscape of
counterfeit detection. Blockchain is a decentralized, distributed ledger system that records transactions
across a network of computers in an immutable and transparent manner. Each record on a blockchain is
cryptographically secured and time-stamped, ensuring that once data is entered, it cannot be altered or
deleted without consensus from the network. These core attributes—decentralization, immutability,
transparency, and security—make blockchain an ideal candidate for establishing trust in environments
where product authenticity and traceability are paramount.

In the context of supply chains and counterfeit detection, blockchain offers several advantages. It enables
end-to-end product traceability by logging every transaction and transfer of ownership on a shared ledger.
Each product can be assigned a unique digital identity or token that follows it throughout its lifecycle.
Stakeholders—including manufacturers, distributors, retailers, and consumers—can verify the authenticity
and history of a product at any stage, using blockchain-based platforms or smart contracts. This level of
transparency significantly reduces the opportunity for counterfeit goods to enter the supply chain
undetected. Furthermore, integrating blockchain with technologies such as IoT (Internet of Things), QR
codes, and digital twins enhances automation and real-time verification, creating a multi-layered defense
against counterfeiting.

This literature survey aims to explore and synthesize existing research efforts that have investigated both
traditional and blockchain-based methods for counterfeit detection. It provides an in-depth analysis of key
studies that focus on different application domains—ranging from agriculture and luxury goods to
pharmaceuticals and automotive parts. The survey evaluates the effectiveness of various technological
interventions, compares their advantages and limitations, and highlights emerging trends in the field.
Moreover, this review identifies existing gaps in current research, such as the need for standardized
blockchain protocols, interoperability with legacy systems, cost-efficiency for small and medium
enterprises, and user-friendly consumer-facing applications. Understanding these gaps is essential for
guiding future innovations and for designing more robust, scalable, and inclusive anti-counterfeiting
solutions.

By analyzing both foundational and cutting-edge studies, this literature survey sets the groundwork for
future research and development in the field of counterfeit detection. It underscores the potential of
blockchain as a transformative technology that can complement or even surpass traditional methods,
paving the way for a more secure, trustworthy, and transparent global supply chain ecosystem.

12
3.1 Introduction:

The block diagram illustrates a blockchain-based counterfeit product detection system, designed to ensure
product authenticity and transparency across the supply chain. The system is divided into two main
components: the Manufacturer Side and the User Side, both interconnected via a secure blockchain
network. On the Manufacturer Side, products are registered and authenticated through a multi-step
process, including product entry, order management, and the generation of unique QR codes. These QR
codes act as digital fingerprints, securely stored on the blockchain to prevent tampering. On the User Side,
customers can scan the QR codes to access detailed product information, verify authenticity, and view the
entire transaction history of the product. Additionally, users can provide feedback, enhancing transparency
and accountability. By leveraging the decentralized and immutable nature of blockchain, this system
provides a robust and tamper-proof solution to combat counterfeiting, fostering trust between
manufacturers and consumers

3.2 Block Diagram

13
Fig 3.2: Block Diagram of the proposed system

3.3 Block Diagram Description:

Manufacturer Side:

On the manufacturer’s side, the Fake Product Detection system begins by assigning a unique identity to
each product at the time of production. The manufacturer collects essential product data such as serial
number, batch ID, manufacturing date, and location. This data is securely stored on the blockchain
network through a smart contract or API integration, ensuring it cannot be altered later. After registering
the product on the blockchain, a unique QR code is generated and printed onto the product packaging.
This QR code links directly to the product’s blockchain record. The manufacturer may also log initial
distribution or shipment information into the blockchain to begin traceability. This process not only
secures product data at the source but also enables real-time verification throughout the supply chain. By
implementing this system, manufacturers can effectively combat counterfeiting, protect brand integrity,
and build trust with distributors and end consumers.

Manufacture-

The manufacturer is the starting point of the fake product detection process. At this stage, every product is
assigned a unique digital identity recorded on the blockchain. This identity includes critical information
such as product serial number, batch details, manufacturing date, and origin. The manufacturer generates a
unique QR code linked to this blockchain record and prints it on the product packaging. This ensures the
product can be verified at any stage in the supply chain. By uploading trusted data onto an immutable
blockchain ledger, manufacturers create a secure, tamper-proof record that helps prevent counterfeit goods
from entering the market. Additionally, manufacturers can track product movement and monitor
distribution through blockchain entries, improving supply chain transparency and consumer confidence.

Registration-

Registration is the initial process where each product is uniquely identified and recorded in the system. At
the time of manufacturing, the product’s key details—such as serial number, batch number, manufacturing
date, and origin—are collected. This information is then registered onto the blockchain network to create
an immutable and tamper-proof digital record. During registration, a unique product ID is generated and
linked to these details. This ID is encoded into a QR code that will be printed on the product packaging.
The blockchain registration ensures transparency and traceability, enabling stakeholders to verify the
product’s authenticity at any point in the supply chain. This secure digital record prevents counterfeiters
from duplicating or altering product information, thereby enhancing trust among manufacturers,
distributors, and consumers.

Login-

14
The login process provides secure access to the Fake Product Detection system for authorized users such
as manufacturers, distributors, or administrators. Users authenticate themselves using credentials like a
username and password or through more advanced methods such as multi-factor authentication (MFA).
Once logged in, users can perform tasks like registering new products, updating shipment information, or
accessing verification reports. Secure login ensures that only verified personnel can add or modify product
data on the blockchain, maintaining the integrity and trustworthiness of the system. Additionally, login
sessions are often protected with encryption protocols (e.g., HTTPS) to safeguard sensitive information
during transmission.

Add Product-

The Add Product step allows authorized users, typically manufacturers or administrators, to register new
products into the system. During this process, essential product information such as the unique serial
number, batch ID, manufacturing date, and other relevant details are entered into the system. This data is
then securely stored on the blockchain, ensuring that it remains immutable and tamper-proof. After
successful registration, a unique QR code is generated for the product, linking the physical item to its
blockchain record. This QR code is printed and attached to the product packaging. The Add Product
functionality is crucial for establishing a trusted digital identity for each product, enabling reliable
authentication and traceability throughout the supply chain and for end consumers.

Show Order-

The Show Order feature enables users—such as manufacturers, distributors, or retailers—to view detailed
information about product orders within the supply chain. This includes data like order ID, product details,
quantity, shipment status, and delivery timelines. By integrating order information with blockchain
records, the system ensures that all order data is transparent, accurate, and tamper-proof. Users can track
the movement of goods, verify the authenticity of products associated with each order, and identify any
discrepancies or suspicious activities. This feature enhances supply chain visibility, helping stakeholders
maintain product integrity and promptly address issues related to counterfeit or misplaced products.

Generate QR Code-

generating a QR code is a crucial step for linking physical products to their digital identity stored on the
blockchain. When a product is manufactured, it is assigned a unique product ID containing essential
metadata such as the manufacturer name, batch number, and production date. This information is encoded
into a QR code using a QR generation tool or library . The QR code is then printed and attached to the
product’s packaging. Once scanned, the QR code triggers a blockchain query to fetch and verify the
product’s authenticity. The use of QR codes ensures ease of access, portability, and real-time validation.
Since each code is unique and linked to immutable blockchain data, it becomes extremely difficult for
counterfeiters to duplicate or forge it. This helps safeguard the supply chain and empowers consumers to
verify the originality of products instantly.

Blockchain Network:

The Blockchain Network is the core backbone of the Fake Product Detection system, providing a secure
and transparent platform to store and verify product data. Each product is registered on the blockchain
with a unique identifier and detailed metadata, such as the manufacturer name, batch number, and
production date. As the product moves through the supply chain, every transaction or handoff is recorded
15
as a new block, creating an unalterable history. The decentralized nature of blockchain eliminates single
points of failure and prevents data manipulation. By using cryptographic hashing, smart contracts, and
consensus mechanisms, the network ensures that all product information remains accurate, tamper-proof,
and traceable. When a user scans a QR code on a product, the system queries the blockchain to validate its
authenticity in real-time. This approach builds trust among consumers and manufacturers by reducing
fraud, enhancing transparency, and ensuring the integrity of every product on the market.

Data Storage and Integrity-

data storage and integrity play a critical role in ensuring the authenticity and trustworthiness of product
information. Each product is assigned a unique identity and its associated data—such as manufacturing
details, batch number, and ownership history—is securely stored on a blockchain network. Blockchain
ensures data immutability, meaning once the data is recorded, it cannot be altered or deleted. This
prevents tampering and helps maintain a reliable product trail across the supply chain. Cryptographic
hashing and digital signatures further enhance data security by verifying the origin and integrity of the
information. When a user scans a product's QR code, the system retrieves and verifies its data from the
blockchain, allowing for real-time authentication. This transparent and decentralized approach ensures
that consumers, manufacturers, and distributors can trust the information, significantly reducing the
chances of counterfeit goods entering the market.

Decentralization-

Decentralization refers to distributing data and control across multiple independent nodes rather than
relying on a single central authority. In the Fake Product Detection system, decentralization is achieved
through blockchain technology, where product information is stored on a network of distributed
computers (nodes). This means no single party can alter or manipulate the data, enhancing security and
trust. Decentralization ensures that product records are transparent and accessible to all authorized
participants—manufacturers, distributors, retailers, and consumers—while making it extremely difficult
for counterfeiters to tamper with product histories. It also eliminates single points of failure, improving
system reliability and resilience. By adopting decentralization, the system fosters a trustworthy ecosystem
for verifying product authenticity across the entire supply chain.

Transparency and Traceability-

Transparency in the Fake Product Detection system means that all product-related data—such as
manufacturing details, shipment history, and ownership transfers—are openly recorded on the blockchain
and accessible to authorized participants. This openness ensures that every stakeholder, from
manufacturers to consumers, can verify the authenticity of products at any stage.

Traceability refers to the system’s ability to track and record the entire lifecycle of a product, from
production to the point of sale. Each transaction or movement is securely logged on the blockchain,
creating a permanent and tamper-proof history. This end-to-end traceability helps quickly identify
counterfeit products and pinpoint where in the supply chain any discrepancies occurred.

Together, transparency and traceability build consumer trust, deter fraud, and improve accountability
throughout the supply chain.
16
Smart Contracts-

Smart contracts are self-executing programs stored on the blockchain that automatically enforce and
verify the terms of an agreement without the need for intermediaries. In the Fake Product Detection
system, smart contracts manage the registration, verification, and transfer of product ownership. When a
product is added, a smart contract records its details on the blockchain. During supply chain movements or
QR code scans, the smart contract automatically validates transactions based on predefined rules—such as
verifying authenticity or updating ownership status

User Side (End-Consumer Interaction):

The user module ensures that end-users can independently verify the authenticity of products before
making a purchase, improving consumer confidence and discouraging counterfeit practices.

User Interaction-

User interaction is the interface and process through which different users—such as manufacturers,
distributors, retailers, and consumers—engage with the Fake Product Detection system. This typically
involves user-friendly applications like mobile apps or web portals that allow users to scan product QR
codes, verify authenticity, register products, or update shipment details.

 Consumers scan QR codes on products to instantly verify authenticity and access product history.
 Manufacturers and distributors log in securely to add new products, update shipment status, and
track product movement.
 The system provides real-time feedback and clear status messages to ensure users easily
understand verification results or required actions.

Scan QR Code-

The QR code on the product is scanned using a smartphone camera or QR code scanner. This action
triggers a request to the blockchain to retrieve the corresponding product information. This is the first and
crucial step in verifying a product’s authenticity. Every genuine product is assigned a unique QR code at
the time of manufacturing. This QR code is stored on a secure blockchain ledger, ensuring immutability
and traceability.

How It Works:

1. Scanning the QR Code:


o The user (consumer or distributor) uses a smartphone camera or a dedicated QR code
scanner to scan the code printed on the product packaging.
o The scan captures the encoded unique product ID, which acts as a key to fetch its
verification data.
2. Triggering a Blockchain Query:
o Once scanned, the application (mobile or web-based) sends a secure API request to the
blockchain network.
o This request queries the product’s record associated with the scanned ID.
3. Blockchain Verification:

17
oBecause blockchain is tamper-proof, any alteration in the data would be detectable, making
it highly reliable for authenticity checks.
4. User Display:
o The application shows a "Verified" message if the scanned QR code matches a valid
blockchain record.
o If the code is not found or shows mismatched data (e.g., wrong location, duplicate ID), it
flags the product as potentially fake.

Show Product Details-

The Show Product Details feature provides users with comprehensive information about a specific product
by retrieving data stored on the blockchain. When a product’s QR code is scanned or its unique ID is
entered, the system displays details such as the product name, manufacturer, batch number, manufacturing
date, and supply chain history. This transparency allows consumers and stakeholders to verify the
authenticity and trace the product’s journey from production to sale. Displaying accurate and up-to-date
product details helps build trust, ensures accountability, and aids in identifying counterfeit or tampered
products quickly.

View History-

The View History feature allows users to access the complete chronological record of a product’s lifecycle
stored on the blockchain. This includes detailed logs of manufacturing, ownership transfers, shipment
milestones, and any verification scans performed. By viewing this immutable history, stakeholders—such
as consumers, manufacturers, and distributors—can trace the product’s journey from creation to the point
of sale. This transparency helps identify any irregularities or tampering attempts, ensuring the product’s
authenticity. The View History feature strengthens trust in the supply chain by providing full traceability
and accountability for each product.

3.4 Summary:

The block diagram serves as a comprehensive representation of a blockchain-based system designed for
counterfeit product detection and prevention. This architecture facilitates a secure, end-to-end solution by
integrating all stakeholders in a product’s lifecycle — from manufacturers to end-users — into a
transparent and tamper-proof blockchain network.

Manufacturer Side Workflow:

On the manufacturer side, the process begins with the production of goods. Each manufactured item is
assigned a unique product identity, such as a serial number or batch ID. Once a product is created, the
manufacturer proceeds to register the product on the blockchain network using a dedicated software
interface. During this registration process, detailed metadata about the product is uploaded, including the
manufacturing date, material source, batch information, product category, and the location of production.

The manufacturer then logs into the system using secure credentials to ensure that only authorized
personnel can enter or manage product data. After authentication, the manufacturer uses the system

18
interface to add the product to the blockchain. This action records the product’s details as a blockchain
transaction, ensuring immutability and timestamping for future verification.

Following this, a QR code is generated for the product. This QR code is a visual representation of the
digital identity stored on the blockchain. It can be printed and affixed to the product’s packaging or
embedded into the product itself via tamper-evident labels. The QR code serves as a gateway for
downstream users to verify the product's authenticity at any stage.

The manufacturer also has access to a dashboard to view and manage orders, track the movement of
goods, and monitor product verification analytics in real-time. This improves supply chain coordination
and helps identify any suspicious activity that may indicate counterfeiting attempts.

Blockchain Network:

At the heart of this system lies the blockchain network, which acts as a decentralized ledger that securely
stores all product data across multiple distributed nodes. Each node can belong to a manufacturer,
distributor, logistics provider, or retailer. The network’s immutability ensures that once a product record is
created, it cannot be altered or deleted without consensus.

This provides an auditable, time-stamped trail of every transaction associated with a product, from
manufacturing to sale. Additionally, smart contracts can be integrated into the network to automate
product authentication, shipment validation, and alert generation if any anomalies are detected (e.g., an
invalid QR code scan or duplicate registration attempt).

User Side Workflow:

On the user side, the system is designed to offer a simple yet powerful tool for verifying product
authenticity. Customers, retailers, or third-party verifiers interact with the system primarily through a QR
code scanning interface, available via a mobile app or web portal.

When a user scans the QR code, the system immediately queries the blockchain to fetch the corresponding
product data. This includes manufacturer name, date of production, product specifications, and
distribution history. The product details are then displayed to the user, allowing them to confirm whether
the item they have purchased is genuine.

Furthermore, users can view the complete lifecycle history of the product, including timestamps of each
transaction (manufacture, shipment, retail entry). This end-to-end traceability enhances transparency and
builds consumer confidence.

Users are also encouraged to provide feedback or report anomalies via the platform. For instance, if a user
suspects a product to be counterfeit despite verification, they can flag it for further investigation. Such
feedback can be valuable for manufacturers to detect and address counterfeit patterns in real time.

System Benefits and Impact:

This architecture offers several compelling benefits. First, it significantly reduces the risk of counterfeit
products entering the market by ensuring each product’s journey is transparently recorded and publicly
verifiable. Second, it enhances consumer trust, as end-users are empowered to verify the authenticity of
19
the products they purchase. Third, it aids manufacturers and retailers in maintaining brand reputation and
regulatory compliance, especially in industries like pharmaceuticals, luxury goods, electronics, and
automotive parts.

By leveraging the core strengths of blockchain technology—decentralization, immutability, transparency,


and traceability—the system addresses long-standing challenges associated with product authentication
and counterfeit prevention. It represents a modern, scalable, and secure approach to ensuring product
integrity across complex, global supply chains.

4.1Introduction:

The implementation of a blockchain-based counterfeit product detection system involves the meticulous
design, development, and integration of various interrelated components that together form a secure,
transparent, and tamper-proof infrastructure. The core objective of this system is to empower every
stakeholder—ranging from manufacturers and logistics providers to retailers and consumers—with the
ability to verify the authenticity and traceability of products at every stage of the supply chain.

At the heart of this system lies blockchain technology, a decentralized and distributed ledger that ensures
immutability, transparency, and data integrity. Every transaction, from the creation of a product to its final
delivery to the consumer, is permanently recorded on the blockchain. These records are cryptographically
secured and time-stamped, making them resistant to tampering and unauthorized alterations. This
characteristic is crucial for industries suffering from the widespread infiltration of counterfeit goods,
including pharmaceuticals, luxury fashion, electronics, and food and beverages.

The process initiates at the manufacturer's end, where each product is registered into the blockchain with a
set of unique identifiers and metadata, including but not limited to the product name, serial or batch
number, manufacturing date, location, and certifications. Upon registration, the system generates a unique
QR code or NFC tag for every unit, which acts as a digital fingerprint uniquely tied to the corresponding
blockchain entry. These identifiers are physically embedded, printed, or affixed to the product packaging.

Once the product enters the supply chain, every checkpoint interaction (e.g., warehousing, transportation,
customs, retail stocking) is recorded as a new transaction linked to the original blockchain entry. This
builds a comprehensive traceability trail, where each participant updates the blockchain with relevant
event data. These interactions are handled via user roles defined in smart contracts, which automate
permissions, data entry, and verifications without relying on centralized oversight.

To access the blockchain record of a product, users—including consumers, regulators, or distributors—


scan the QR code using a mobile application or web-based interface. The system, via secure APIs,
retrieves data directly from the blockchain, ensuring that what the user sees is the verified and unaltered
transaction history of the product. The interface is designed to be user-friendly and intuitive, supporting
real-time verification, lifecycle tracking, and visualization of the product journey. Additional features such
as geolocation tagging, timestamp validation, and visual proof of condition (via images) can also be
integrated.
20
An essential aspect of this system is the feedback and reporting mechanism. Consumers are encouraged to
report anomalies such as damaged goods, unrecognized packaging, or suspicion of counterfeit items.
These reports are logged onto the blockchain, promoting community-based validation and contributing to
a decentralized watchdog network that enhances the system’s reliability and responsiveness.

From a technical architecture standpoint, the backend logic is typically built using scalable and performant
technologies such as Node.js, Python (Django/Flask), or Go, which handle business logic, QR code
generation, and database interactions. For the blockchain layer, platforms like Ethereum (using Solidity
smart contracts) or Hyperledger Fabric (for permissioned enterprise solutions) are employed. The system
incorporates cryptographic techniques such as SHA-256 hashing and asymmetric encryption to ensure
secure communication, user authentication, and data confidentiality.

Fig 4.2: Flowchart of proposed system


4.3 Description of Flowchart:

1. Define Product Identification System

Use unique identifiers for each product (e.g., QR codes, RFID tags, or serial numbers).

These identifiers will serve as the link between physical products and their digital representation on the
blockchain.

2. Choose a Blockchain Platform

Select an appropriate blockchain platform such as Ethereum, Hyperledger, or a private blockchain.

21
Configure the blockchain network, determining consensus mechanisms, transaction fees, and privacy
settings as needed.

3. Design a Smart Contract for Product Tracking

Create smart contracts that will record each product’s lifecycle stages on the blockchain.

Each smart contract should include functions to register a product, update status, and verify authenticity.

4. Integrate Supply Chain Participants

Include all relevant stakeholders (e.g., manufacturers, suppliers, distributors, and retailers) in the
blockchain network.

Assign roles and permissions to each participant for transparency and data integrity.

5. Data Recording and Updating

As products move through the supply chain, each participant records information on the blockchain.

For example, manufacturers can record production details, while distributors add information on shipment
and storage.

6. Verification and Authentication

Develop a verification mechanism for consumers, allowing them to scan product identifiers (e.g., QR
code) to check authenticity.

Consumers can view the entire product history on the blockchain, ensuring that the product is genuine.

7. Deployment and Testing

Deploy the blockchain network and smart contracts.

Test the system for functionality, security, and scalability by simulating the movement of products
through the supply chain.

8. User Interface Development

Develop a user-friendly application or website where participants and consumers can interact with the
blockchain to verify authenticity and track products.

4.4 Technology Integrated:

AngularJS

22
In this project, AngularJS is used as the core frontend framework for building dynamic, single-page web
applications (SPAs) that are both responsive and user-friendly. AngularJS provides the structure necessary
to create a seamless and interactive user interface, enabling users such as manufacturers and consumers to
interact with the blockchain system in real-time. It helps in managing views like login, registration,
product addition, QR code scanning interface, and product verification history display.

AngularJS's two-way data binding ensures that the model and view remain synchronized, making the UI
more reactive to user inputs and blockchain data changes. This is especially beneficial when displaying
real-time product information fetched from the blockchain after scanning a QR code. The framework's
modular architecture also aids in better code organization, maintainability, and scalability.

Additionally, AngularJS communicates with the backend via RESTful APIs built using Node.js or Python.
These APIs interact with the blockchain network to fetch or write data. With features like routing,
directives, and built-in services, AngularJS helps streamline the development of the web-based interface
for the

counterfeit detection system, ensuring users can authenticate products effortlessly through an intuitive
platform.

Blockchain Technology

Blockchain is the backbone of the counterfeit detection system, serving as a decentralized and immutable
ledger for all product-related transactions. Its core purpose in the project is to securely store and verify
product lifecycle data, ensuring transparency and preventing unauthorized tampering. From the moment a
product is manufactured, every transaction or movement it undergoes is recorded on the blockchain.

Each product is assigned a unique digital identity, which is linked to a QR code. This QR code can be
scanned by stakeholders and consumers to trace the product’s journey through the supply chain.
Blockchain’s cryptographic algorithms and consensus mechanisms ensure that all records are authentic,
validated, and cannot be modified retroactively.

Smart contracts, deployed on platforms like Ethereum, automate various tasks such as product
registration, validation, ownership transfer, and feedback collection. These contracts are written in
Solidity and operate independently to maintain trust without needing intermediaries.

By using blockchain, the project significantly enhances product authenticity verification, fosters consumer
trust, and ensures compliance across the supply chain. It creates a transparent ecosystem where each
stakeholder can contribute to and verify the integrity of product data.

Flutter

Flutter is used in this project to develop the mobile application that allows users to interact with the
blockchain system on the go. Developed by Google, Flutter is a cross-platform UI toolkit that enables the
creation of natively compiled applications for Android and iOS from a single codebase. This dramatically
reduces development time and ensures consistency in performance and UI/UX across platforms.

23
The Flutter app in this project includes features like login/registration, QR code scanning, product
verification, and viewing product history. Using the ZXing library or Flutter’s built-in plugins, QR codes
can be scanned instantly, and the corresponding blockchain records are retrieved via secure API calls.

The app communicates with Firebase for user authentication and with backend services written in Python
or Node.js to fetch blockchain data. The rich UI elements and reactive widgets in Flutter ensure a smooth
and engaging user experience, even during data-intensive operations like viewing a product's entire
lifecycle.

Flutter’s capability to integrate with blockchain APIs and display real-time data efficiently makes it an
essential part of this project, enabling mobile-based interaction and verification for end users.

Firebase

Firebase serves as a vital backend-as-a-service (BaaS) platform in this project, primarily handling user
authentication, real-time database updates, and cloud messaging functionalities. It plays a key role in
supporting the frontend applications (both web and mobile) with seamless, scalable, and secure backend
services.

Firebase Authentication is used to manage users—both manufacturers and consumers—by providing


secure login mechanisms through email/password, phone number, or social logins. This ensures that only
verified users can add or access product data.

While the blockchain stores critical product-related information, Firebase complements this by managing
non-critical or off-chain data like user feedback, application logs, and notification triggers. Firebase
Realtime Database or Firestore is used to store and sync user activities or product scan events instantly
across all devices.

Moreover, Firebase Cloud Messaging (FCM) is integrated to send notifications to users in case counterfeit
products are detected or when verification results are available. Firebase Hosting also offers the potential
to host the AngularJS frontend.

By integrating Firebase, the project benefits from faster deployment, real-time capabilities, and secure
user management, making it a powerful companion to the blockchain infrastructure.

Android Studio

Android Studio is the official Integrated Development Environment (IDE) for developing the Android
version of the mobile application using Flutter. It is used extensively throughout the project for designing,
debugging, testing, and deploying the Android app that enables product verification through QR code
scanning.

The IDE supports Flutter and Dart natively with plugins that enhance development productivity. It
provides tools for emulation, performance profiling, and version control, ensuring that the app is
optimized and bug-free before release. The layout editor, widget inspector, and device emulator help
developers test how the app behaves under various conditions.

24
In this project, Android Studio is used to configure the Flutter environment, manage dependencies, and
connect the app to Firebase and backend APIs. Features such as QR code scanning, user authentication,
product history viewing, and feedback submission are developed and tested within Android Studio before
being deployed.

Android Studio also allows easy APK generation and deployment to physical devices, which is essential
for real-world testing and demonstration of the counterfeit detection system. It is an indispensable tool for
building a robust, scalable, and functional mobile app that communicates effectively with the blockchain
and cloud infrastructure.

Python

Python plays a significant role in backend development and data processing in this blockchain-based
counterfeit detection system. Known for its simplicity and versatility, Python is used to write server-side
scripts, manage database interactions, and connect with the blockchain via APIs.

In this project, Python handles operations such as product registration, user authentication, QR code
generation, and blockchain interaction. It communicates with smart contracts using web3.py (a Python
library for Ethereum), allowing seamless integration between the application layer and the blockchain
layer.

Python also interacts with MongoDB or Firebase for storing and retrieving off-chain data such as user
feedback or product scan logs. Additionally, Python’s robust libraries make it suitable for developing
administrative dashboards, automating tasks, and generating reports.

Security is a critical component in this system, and Python’s ability to implement encryption, token-based
authentication, and secure data transfer mechanisms adds a strong layer of protection. The use of Python
ensures that the system remains modular, maintainable, and scalable, making it easier to adapt to future
requirements.

HTML

HTML (Hyper Text Markup Language) is the foundational language for building the user interface of
your system’s web or mobile applications. It structures the content users interact with, such as forms,
product details, scan results, and history logs.

Display Product Details: HTML elements like tables, lists, and divs organize product info (name, batch,
manufacture date) for clear viewing.

View History: Chronological records are shown using HTML tables or timelines, allowing users to easily
read and navigate past events.

User Input Forms: Registration, login, and add product pages use HTML forms to capture data securely
from manufacturers or admins.

QR Code Scanning Interfaces: HTML integrates with JavaScript APIs to trigger camera access for
scanning QR codes.

25
Responsive Design: Using HTML along with CSS, the interface adapts to different devices—
smartphones, tablets, desktops—ensuring accessibility.

CSS

CSS is responsible for the visual styling and layout of your web application, making the user interface
attractive, intuitive, and user-friendly. While HTML structures the content, CSS controls how it looks and
behaves across devices.

Styling Product Details & History: CSS styles tables, lists, and text to improve readability and highlight
important information like product status or verification results.

Responsive Design: CSS media queries ensure that the interface adjusts smoothly to different screen sizes
— smartphones, tablets, and desktops — providing a seamless user experience.

User Forms: CSS enhances input fields, buttons, and error messages for better usability during product
registration, login, and scanning.

Visual Feedback: Color codes, animations, and hover effects guided by CSS help users quickly understand
statuses (e.g., green for verified, red for counterfeit).

Layout Management: Flexbox or Grid systems organize page content logically, maintaining consistent
spacing, alignment, and flow.

Javascript

JavaScript is a key language for adding interactivity, logic, and dynamic content to the frontend of your
Fake Product Detection system. It enables users to interact with the application smoothly and
communicates with backend services and blockchain nodes.

QR Code Scanning and Generation: JavaScript libraries like qrcode.js or html5-qrcode handle generating
QR codes dynamically and accessing the device camera to scan codes.

Fetching Blockchain Data: JavaScript (often with frameworks like React or Angular) makes API calls to
query product data stored on the blockchain and displays it in real time.

Form Validation: It validates user inputs (like product registration details or login credentials) before
sending data to the server, improving user experience and reducing errors.

Dynamic UI Updates: JavaScript updates the product status, history logs, and verification results on the
page without needing to reload it, making the interface fast and responsive.

Integration with Smart Contracts: Using libraries like Web3.js or Ethers.js, JavaScript connects the
frontend with smart contracts deployed on the blockchain, allowing transactions and data queries.

26
Experimentation

5.1 Introduction:
The experimentation phase of the blockchain-based counterfeit product detection system focuses on
evaluating the system’s functionality, performance, and effectiveness in real-world scenarios. This
involves testing both the Manufacturer Side and User Side operations to ensure seamless integration with
the blockchain network. On the Manufacturer Side, processes such as product registration, QR code
generation, and data storage on the blockchain are tested for accuracy and security. The ability of the
system to handle multiple product entries and maintain an immutable record is a critical aspect of this
phase.On the User Side, experiments are conducted to assess the ease and reliability of product
verification through QR code scanning. This includes testing the retrieval of product details, verification
accuracy, and transaction history display. The feedback mechanism is also evaluated to ensure user inputs
are securely stored and accessible. The experimentation aims to identify any potential system
vulnerabilities, measure the system’s scalability, and validate its effectiveness in detecting counterfeit
products. The results of these experiments provide valuable insights for optimizing the system and
ensuring its robustness in real-world applications.

1. Objective of Experimentation

The main objective is to design and test a blockchain-based system that ensures the authenticity of
products throughout the supply chain, enabling stakeholders and consumers to verify product details at
any stage.

2. System Architecture and Implementation

The proposed blockchain-based counterfeit detection system is structured around modern web
technologies, decentralized ledger frameworks, and user-friendly interfaces to ensure security, scalability,
27
and transparency across the entire supply chain. At its core, the system leverages a blockchain platform
such as Ethereum or Hyperledger to implement a distributed ledger where product data and transactional
histories are stored immutably. Smart contracts, written in Solidity (for Ethereum) or Go (for
Hyperledger), are utilized to automate product registration, validation, and tracking processes without the
need for centralized control. For managing off-chain data such as product metadata and user profiles, a
NoSQL database like MongoDB is employed to ensure fast and scalable storage solutions.

On the frontend, frameworks like React.js or Angular are used to design responsive user interfaces that
support functions such as login, registration, product entry, and verification. To integrate real-world
products with their digital blockchain entries, the system incorporates QR code technology using APIs
like Google Charts for generating QR codes and ZXing for scanning. The backend logic and application
services are developed using versatile programming languages such as Python, JavaScript, or Node.js,
ensuring seamless communication between the frontend, database, and blockchain components. For smart
contract development and deployment, tools like Remix IDE and Truffle Suite are used to simulate, test,
and deploy code in a secure and efficient manner.

The system setup begins with the deployment of a private or test blockchain network using Ethereum or
Hyperledger. Multiple nodes are configured to represent key stakeholders in the supply chain:
Manufacturer, Distributor, Retailer, and Consumer. Each stakeholder interacts with the system through
role-based access,

contributing to the product lifecycle at their respective touchpoints. Once the network is active, smart
contracts are deployed to manage operations like registering new products, recording transactions, and
verifying authenticity at various stages. Each product registered by the manufacturer is assigned a unique
product ID and a corresponding QR code, which is linked directly to its blockchain entry. This QR code is
printed and physically attached to the product packaging, allowing downstream entities and end-users to
access the product’s digital history by simply scanning it.

The experimentation process begins with product registration, where manufacturers log into the system
and input details such as batch number, product name, manufacturing date, and other metadata. Upon
submission, the data is stored on the blockchain and a unique QR code is generated. As the product moves
through the supply chain, stakeholders such as distributors and retailers scan the QR code at each
checkpoint to update the product's transaction record on the blockchain. This ensures real-time traceability
and transparent monitoring of product movement.

At the final stage, end consumers can verify the product’s authenticity by scanning the QR code using a
mobile application or a web interface. The system fetches the corresponding blockchain record and
displays all relevant product details, including its origin, ownership transfers, and handling history. If the
blockchain record is incomplete, altered, or missing, the system flags the product as potentially
counterfeit. Consumers are notified accordingly and advised not to proceed with the purchase. This
process acts as a powerful deterrent against counterfeit circulation while empowering consumers with
verifiable trust.

To ensure the reliability of the system, rigorous testing and validation procedures are carried out.
Performance testing is conducted to evaluate the speed and efficiency of blockchain transactions under
varying network loads. Accuracy testing verifies the correctness of the data stored and retrieved from the
28
blockchain. Security testing assesses the system’s resilience to hacking attempts and confirms the
immutability of blockchain records. Usability testing is also conducted to ensure that stakeholders—
ranging from manufacturers to consumers—can interact with the system intuitively and effectively.

The results from experimentation affirm that the blockchain system reliably maintains the authenticity of
products throughout the supply chain. QR codes serve as a secure and efficient method of linking physical
products to their digital records. Most importantly, the system demonstrates strong capabilities in
detecting and preventing the circulation of counterfeit goods, providing a comprehensive, decentralized
solution for supply chain integrity and consumer trust.

3. Conclusion

The experimentation and development of the blockchain-based counterfeit detection system effectively
demonstrate the feasibility, security, and efficiency of leveraging decentralized technologies to combat
one of the most persistent challenges in global supply chains—product counterfeiting. By utilizing the
immutable and transparent nature of blockchain, the system successfully records every transaction and
movement of a product from its point of origin to the end consumer, thereby providing an uninterrupted
and tamper-proof audit trail.The implementation highlights how trust can be reestablished among various
stakeholders—including manufacturers, distributors, retailers, and consumers—by ensuring verifiable
authenticity of products at every stage. Each product’s lifecycle is permanently etched into the blockchain,
and real-time QR code verification allows end users to access genuine product details instantly. This
process not only deters counterfeiters but also enhances consumer confidence, which is critical for brand
reputation and long-term business sustainability.

29
Fig 5.2 Admin home code

Fig 5.3 Login page code

30
Fig 5.4 Update page components

Fig 5.5 App routing module

31
Fig 5.6 App Component Code

32
Result and discussion

6.1 Introduction:

The results section of the blockchain-based counterfeit product detection system provides an in-depth
analysis of the system's performance and effectiveness during the experimentation phase. This involves
evaluating how well the system achieves its objectives of ensuring product authenticity, enhancing
transparency, and preventing counterfeit products from entering the supply chain. Key metrics such as the
accuracy of product verification, the efficiency of QR code scanning, the speed of data retrieval from the
blockchain, and user feedback collection are analyzed.The results demonstrate the system’s capability to
provide secure, real-time product verification, highlighting its robustness in storing and retrieving
immutable product information. Additionally, the outcomes showcase the system’s ability to scale
effectively and maintain high performance under varying conditions. This section also identifies any
limitations observed during testing, offering insights for future improvements. Overall, the results validate
the effectiveness of blockchain technology in building a reliable and transparent counterfeit detection
system.

6.2 Description of Code:

1. Login Page Code:-

The code presented corresponds to the login page component of an Angular application. It appears to be
part of the frontend logic where user authentication is handled. Although the code is partially visible, it
likely includes imports such as Form Group, Form Builder, and other reactive form utilities from
Angular's forms module. This structure indicates that the developer is using Reactive Forms for handling
login input fields such as username and password.

Purpose:
The purpose of this code is to create a functional and user-friendly login interface where users can
securely enter their credentials. It serves as the entry point for the application, allowing only authenticated
users to access protected areas such as the admin dashboard or other internal components. Proper
validation and user feedback mechanisms ensure a robust authentication process that supports a secure
web application architecture.

2. Admin Home Code:-

This code presented appears to represent the Admin Home component of the Angular application. The
structure typically contains layout elements and logic meant for administrative users. This component
might display dynamic content such as dashboards, data tables, or statistics relevant to admin-level
operations. Based on standard practices, the component likely uses lifecycle hooks like ngOnInit() to fetch
data upon loading. It could also include Angular Material components or Bootstrap elements to structure
the UI neatly. Though code details are limited in the screenshot, it's reasonable to assume that routing and
service interactions (e.g., API calls for fetching user data or system status) are handled here.

Purpose:
The Admin Home component functions as the central control panel for administrators of the application. It
aggregates and presents essential system-level information, management tools, or quick links to features
33
like user management, data updates, or reports. Its role is crucial in supporting the administrative
workflow and maintaining the application’s back-end functions through a dedicated interface.

3. Update Page Components:-

This code presented showcases code related to the update page, which may be responsible for modifying
user data, item details, or records within a database-driven Angular application. Although only a portion
of the component is visible, the code most likely contains reactive form elements for capturing update
information and service methods that send PUT or PATCH HTTP requests to a backend server. This
component may also include route parameter fetching via Angular’s ActivatedRoute to identify which
item is being updated, and FormGroup bindings to populate existing data into the form fields for editing.

Purpose:
The update page serves the vital function of allowing users or administrators to edit existing records. It
provides a dynamic form interface that preloads the current values of an item and allows the user to make
modifications, ensuring data integrity and up-to-date information within the application. This component
is a key element in applications requiring CRUD (Create, Read, Update, Delete) functionalities.

4. App Routing Module:-

This screenshot likely contains the contents of the app-routing.module.ts file, which plays a central role in
Angular’s routing mechanism. Even if partially shown, this file typically includes an array of route objects
that define the mapping between URL paths and their corresponding components, such as { path: 'login',
component: LoginComponent }. The presence of route guards, wildcard routes (e.g., path: '**'), and child
routes may also be seen in a full version of this file. Routing modules are vital for creating a single-page
application (SPA) experience, where navigation between components does not require full-page reloads.

Purpose:
The App Routing Module is responsible for defining and managing the navigation structure of the
Angular application. By linking specific URL paths to Angular components, it enables seamless routing
across pages such as login, dashboard, update forms, and error pages. This promotes modularity and
improves user experience by providing consistent navigation and route-based component loading.

5. App Component Code:-

The code presented is of the App Component, typically the root component of an Angular application. It is
usually defined in app.component.ts along with its HTML and CSS counterparts. This file acts as the entry
container where Angular bootstraps the application. The visible code may include lifecycle hooks such as
ngOnInit(), simple logic to render components conditionally, or service injections for global behaviors
like authentication checks. The template might include a <router-outlet> directive which is essential for
loading routed components dynamically.

Purpose:
The App Component acts as the root of the Angular component tree. It initializes the application, renders
common elements like the navigation bar or footer, and contains the <router-outlet> that facilitates
dynamic component rendering based on the current route. Its primary role is to provide a structural base
for the entire application while integrating routing and global functionalities like user session checks or
layout theming.
34
Fig 6.3 Login Page

Fig 6.4 Admin Home

35
Fig. 6.5 Generated QR Code

Fig. 6.6 Status Of The Product

36
Fig. 6.7 User Home Page

37
Fig. 6.8 Unregistered Product

38
Fig. 6.9 Scanned Product

39
Fig. 6.10 Registered Product

40
Conclusion

Counterfeit products are a global issue impacting industries, economies, and consumers' trust. In this
report, we explored how blockchain technology can be a transformative solution for counterfeit product
detection. By implementing blockchain, we ensure an immutable and transparent record of the entire
product lifecycle—from manufacturing to the end consumer. Each transaction is securely stored,
traceable, and accessible to stakeholders, minimizing the risks associated with traditional verification
methods. Our study demonstrates that blockchain enhances product authenticity verification through
decentralized, tamper-proof records. This approach not only protects brands but also empowers consumers
to make informed purchasing decisions, effectively reducing the prevalence of counterfeit products.
However, challenges such as integration costs, regulatory considerations, and scalability remain,
suggesting a need for further research and refinement. Ultimately, blockchain-based solutions offer a
promising path toward a more secure and transparent supply chain, paving the way for a counterfeit-free
marketplace.

41
References
[1] Shah, D., Isah, H. and Zulkernine, F., 2019. Stock market analysis: A review and taxonomy of
prediction techniques. International Journal of Financial Studies, 7(2), p.26.

[2] Bustos, O. and Pomares-Quimbaya, A., 2020. Stock market movement forecast: A Systematic Review.
Expert Systems with Applications, 156, p.113464.

[3] Jose, J., Mana, S. and Samhitha, B.K., 2019. An efficient system to predict and analyse stock data
using Hadoop techniques. International Journal of Recent Technology and Engineering (IJRTE), 8(2),
pp.2277-3878.

[4] Hu, Z., Zhao, Y. and Khushi, M., 2021. A survey of forex and stock price prediction using deep
learning. Applied System Innovation, 4(1), p.9.

[5] Obthong, M., Tantisantiwong, N., Jeamwatthanachai, W. and Wills, G., 2020. A survey on machine
learning for stock price prediction: algorithms and techniques.

[6] Yadav, A. and Vishwakarma, D.K., 2020. Sentiment analysis using deep learning architectures: a
review. Artificial Intelligence Review, 53(6), pp.4335-4385.

[7] Sulandari, W., Suhartono, Subanar and Rodrigues, P.C., 2021. Exponential Smoothing on Modeling
and Forecasting Multiple Seasonal Time Series: An Overview. Fluctuation and Noise Letters, p.2130003.

[8] Kumar, I., Dogra, K., Utreja, C. and Yadav, P., 2018, April. A comparative study of supervised
machine learning algorithms for stock market trend prediction. In 2018 Second International Conference
on Inventive Communication and Computational Technologies (ICICCT) (pp. 1003- 1007). IEEE.

[9] Ingle, V. and Deshmukh, S., 2016, August. Hidden Markov model implementation for prediction of
stock prices with TF-IDF features. In Proceedings of the International Conference on Advances in
Information Communication Technology & Computing (pp. 1-6).

[10] Singh, Sukhman, Tarun Kumar Madan, J. Kumar and A. Singh. “Stock Market Forecasting using
Machine Learning: Today and Tomorrow.” 2019 2nd International Conference on Intelligent Computing,
Instrumentation and Control Technologies (ICICICT) 1 (2019): 738-745.

42

You might also like