Fake Product Detection Using Diverse Technologies
DOI:
https://doi.org/10.5281/zenodo.8068133Keywords:
RFID tags, Cryptography, AI, blockchain, NFT'sAbstract
The development of a new products always comes with the risk of Counterfeiting. Hence, it becomes really important to control the flow of these products as it directly affects companies revenue and goodwill and may also affect the consumer. In this paper, We Analysed about various technologies like RFID tags, Cryptography, Artificial Intelligence (AI), Blockchain and NFTs, that are used to detect the fake products how each technology works, it’s advantages and limitations by which customer can get some clarity to choose the Counterfeiting technology as per to their requirements.
References
Bali, A., Singh, A., & Gupta, S. Fake Product Detection System Using Blockchain.
Pathak, A., Velasco, C., & Calvert, G. A. (2019). Identifying counterfeit brand logos: On the importance of the first and last letters of a logotype. European Journal of Marketing, 53(10), 2109-2125.
Shaik, C. (2021). Preventing counterfeit products using cryptography, qr code and webservice. Computer Science & Engineering: An International Journal (CSEIJ), 11(1).
Daoud, E., Vu, D., Nguyen, H., & Gaedke, M. (2020). Improving fake product detection using ai‐based technology. In Proceedings of the 18th International Conference on E‐Society (ES 2020).
Nguyen, H. P., Retraint, F., Morain-Nicolier, F., & Delahaies, A. (2019). A watermarking technique to secure printed matrix barcode—Application for anti-counterfeit packaging. IEEE Access, 7, 131839-131850.
Babu, H. U., Stork, W., & Rauhe, H. (2010, December). Anti-counterfeiting using reflective micro structures-Based on random positioning of microstructures. In Advances in Optoelectronics and micro/nano-optics (pp. 1-5). IEEE.
Jadhav, R., Shaikh, A., Jawale, M. A., Pawar, A. B., & William, P. (2022, June). System for Identifying Fake Product using Blockchain Technology. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 851-854). IEEE.
Ahmed, S. T., Sandhya, M., & Sankar, S. (2019). An optimized RTSRV machine learning algorithm for biomedical signal transmission and regeneration for telemedicine environment. Procedia Computer Science, 152, 140-149.
Agrawal, N., Kushwaha, H., Shetty, S., & Lobo, V. B. (2022, June). A System to Detect Fake Products using Blockchain Technology. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 874-878). IEEE.
Singh, K. D., & Ahmed, S. T. (2020, July). Systematic Linear Word String Recognition and Evaluation Technique. In 2020 International Conference on Communication and Signal Processing (ICCSP) (pp. 0545-0548). IEEE.
Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedings (pp. 115-131). Springer Berlin Heidelberg.
Syed Thouheed Ahmed, Adarsha V S, B Vikas, Prommoth V M, & Punithan P. (2023). Detection of Inauthentic Accounts on Twitter. International Journal of Human Computations & Intelligence, 2(4), 176–183. https://doi.org/10.5281/zenodo.8026926
Zhao, Z. Q., Zheng, P., Xu, S. T., & Wu, X. (2019). Object detection with deep learning: A review. IEEE transactions on neural networks and learning systems, 30(11), 3212-3232.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 P Nikhitha Priya, B Gopi Reddy, J Sheik Mohamed
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.