Skip to main content

Tackling Counterfeit Medicine Through an Automated System Integrated with QR Code

  • Conference paper
  • First Online:
Intelligent Data Communication Technologies and Internet of Things

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 57))

  • 961 Accesses

Abstract

Adulteration and the introduction of counterfeit medicine in the pharmaceutical market is an increasing problem in our country. Official reports from WHO states that nearly 35% of the fake drugs in the world are being imported from India making up to a 4000 crore drug mafia market. The main reason is human intervention at every stage of the stringent process in the current system. This induces inevitable human error which is taken advantage of. The absence of an automated system is the main and the biggest drawback fof the currently implemented system. The paper proposes an automated system that provides a unique recognition mechanism by generating machine-readable code for each entity. This generation of the machine-readable code is backed up by encryption and hashing and hence cannot be replicated by a third party.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Czuszynski K, Ruminski J (2014) Interaction with medical data using QR-codes. In: 2014 7th ınternational conference on human system ınteractions (HSI), Costa da Caparica, pp 182–187. https://doi.org/10.1109/HSI.2014.6860471

  2. Singh M (2015) Study on cloud computing and cloud database. In: International conference on computing, communication and automation, Noida, pp 708–713. https://doi.org/10.1109/CCAA.2015.7148468

  3. Zhang J, Li D, Jia J, Sun W, Zhai G (2019) Protection and hiding algorithm of QR code based on multi-channel visual masking. In: 2019 IEEE visual communications and ımage processing (VCIP). Sydney, Australia, pp 1–4.https://doi.org/10.1109/VCIP47243.2019.8966044

  4. Palshikar MN, Mane PS, Dhore AS, Kalegore BP, Shinde S (2017) QR code based healthcare system 4(12). e-ISSN: 2348-4470, print-ISSN: 2348-6406

    Google Scholar 

  5. Abdulhakeem W, Dugga S (2014) Enhancing user experience using mobile QR-code application. Int J Comput Inf Technol

    Google Scholar 

  6. Balaji S, Pughazendi N, Praveenkumar SE, Vishal V, Vignesh R (2018) E-medical application using QR code with OTP generation 05(04)

    Google Scholar 

  7. Tychalas D, Kakarountas A (2010) Planning and development of an electronic health record client based on the android platform. In: 14th Panhellenic conference on ınformatics, pp 3–6

    Google Scholar 

  8. Jagodić D, Vujičić D, Ranđić S (2015) Android system for identification of objects based on QR code. In: 2015 23rd telecommunications forum telfor (TELFOR). Belgrade, pp 922–925. https://doi.org/10.1109/TELFOR.2015.7377616

  9. Mukherjee S (2019) Benefits of AWS in modern cloud. https://doi.org/10.5281/zenodo.2587217; Kulkarni G, Sutar R, Gambhir J Cloud computıng-Infrastructure as servıce amazon EC2. Int J Eng Res Appl (IJERA) 2(1):117–125

  10. Ahmed ST, Chandrashekhar AM, Rahul N (2015) Analysis of security threats to database storage systems. Int J Adv Res Data Min Cloud Comput (IJARDC) 3(5)

    Google Scholar 

  11. Chandrasekhar AM, Revapgol J, Pattanashetti V (2016) Security ıssues of big data in networking. Int J Sci Res Sci Eng Technol (IJSRSET) 2(1)

    Google Scholar 

  12. Koushik P, Takkalakaki J, Chandrashekhar AM (2015) Information security threats, awareness and coginizance. Int J Tech Res Eng (IJTRE) 2(9)

    Google Scholar 

  13. Chandy A (2019) A review on iot based medical imaging technology for healthcare applications. J Innov Image Process (JIIP) 1(01):51–60

    Article  Google Scholar 

  14. Deepika P, Sushanth B, Kumar T, Vignesh M Emergency ınformation access using QR code technology in medical field 1(1). ISSN: 2456-3307

    Google Scholar 

  15. Patel J, Bhat A, Chavada K A review paper on QR code based android app for healthcare. Int Res J Eng Technol (IRJET) 02(07)

    Google Scholar 

  16. Arpitha NG, Chandrashekhar AM (2016) Efficient data accessibility in cloud with privacy and authenticity using key aggregation cryptosystem. Int J Technol Res Eng (IJTRE) 3(5)

    Google Scholar 

  17. Prashanth GM, Chandrashekhar AM, Bulla A (2015) Secured infrastructure for multiple group communication. Int J Adv Res Inf Commun Eng (IJARICE) 3(5)

    Google Scholar 

  18. Dube S, Ndlovu S, Nyathi T, Sibanda K QR code based patient medical health records transmission: zimbabwean case. National University of Science and Technology, Bulawayo, Bulawayo Province, Zimbabwe

    Google Scholar 

  19. Chandrashekhar AM, Sahana K, Yashaswini K (2016) Securing cloud environment using firewall and VPN. Int J Adv Res Comput Sci Softw Eng (IJARCSSE) 6(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Naveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chandrashekhar, A.M., Naveen, J., Chethana, S., Charith, S. (2021). Tackling Counterfeit Medicine Through an Automated System Integrated with QR Code. In: Hemanth, J., Bestak, R., Chen, J.IZ. (eds) Intelligent Data Communication Technologies and Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol 57. Springer, Singapore. https://doi.org/10.1007/978-981-15-9509-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9509-7_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9508-0

  • Online ISBN: 978-981-15-9509-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics