Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (4): 1309-1317.DOI: 10.11772/j.issn.1001-9081.2022040546
Special Issue: 前沿与综合应用
• Frontier and comprehensive applications • Previous Articles Next Articles
					
						                                                                                                                                                                                                                    Yihan WANG, Chen TANG, Lan ZHANG( )
)
												  
						
						
						
					
				
Received:2022-04-24
															
							
																	Revised:2022-06-09
															
							
																	Accepted:2022-06-13
															
							
							
																	Online:2022-07-26
															
							
																	Published:2023-04-10
															
							
						Contact:
								Lan ZHANG   
													About author:WANG Yihan, born in 1998, M. S. candidate. Her research interests include right confirmation and traceability of data, blockchain application.Supported by:通讯作者:
					张兰
							作者简介:王亦涵(1998—),女,四川广元人,硕士研究生,主要研究方向:数据确权追溯、区块链应用;基金资助:CLC Number:
Yihan WANG, Chen TANG, Lan ZHANG. Anti-fraud and anti-tampering online trading mechanism for bulk stock[J]. Journal of Computer Applications, 2023, 43(4): 1309-1317.
王亦涵, 唐晨, 张兰. 大宗商品防欺诈抗篡改线上交易机制[J]. 《计算机应用》唯一官方网站, 2023, 43(4): 1309-1317.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022040546
| 欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 | 
|---|---|---|---|
| 商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 | 
| 商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 | 
| 商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 | 
Tab. 1 Details of frauds
| 欺诈方 | 商品提供者 | 商品购买者 | 商品运输者 | 
|---|---|---|---|
| 商品 提供者 | 用劣质商品代替原商品发货,获得更高的利润 | 无欺诈动机 | 用劣质商品替换收到的商品,退还劣质商品, 一方获得更好的商品,一方得到串通费 | 
| 商品 购买者 | 无欺诈动机 | 用劣质商品替换收到的商品, 退还劣质商品,获得更好的商品 | 用劣质商品代替原商品发货,获得更高的 利润/串通费 | 
| 商品 运输者 | 用劣质商品替换收到的商品,并退还劣质商品, 一方获得更好的商品,一方得到串通费 | 用劣质商品替换原商品发货, 获得更高的利润/串通费 | 将运输的商品用劣质商品代替, 使得商品购买者收到假货,获得更好的商品 | 
| 交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 | 
|---|---|---|---|---|
| 购买者下单 | ① | √ | ||
| ② | √ | |||
| 提供者发货 | ① | √ | ||
| ② | √ | |||
| 运输者运输 | ① | √ | √ | |
| ② | √ | |||
| 购买者收货 | ① | √ | √ | |
| ② | 
Tab. 2 Stages and types of fraud
| 交易阶段 | 欺诈类型 | 商品购买者 | 商品运输者 | 商品提供者 | 
|---|---|---|---|---|
| 购买者下单 | ① | √ | ||
| ② | √ | |||
| 提供者发货 | ① | √ | ||
| ② | √ | |||
| 运输者运输 | ① | √ | √ | |
| ② | √ | |||
| 购买者收货 | ① | √ | √ | |
| ② | 
| 偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% | 
|---|---|---|---|---|---|
| 0.1 | 0.2 | 242 | 120 | 120 | 100.00 | 
| 0.5 | 1.0 | 44 | 120 | 120 | 100.00 | 
| 1.0 | 2.0 | 22 | 120 | 116 | 96.70 | 
| 2.0 | 4.0 | 11 | 75 | 24 | 32.00 | 
| 3.0 | 6.0 | 6 | 100 | 0 | 0.00 | 
Tab. 3 Test results of angle correction
| 偏差角度/(°) | 旋转角度/(°) | 旋转次数 | 匹配数 | 成功数 | 准确率/% | 
|---|---|---|---|---|---|
| 0.1 | 0.2 | 242 | 120 | 120 | 100.00 | 
| 0.5 | 1.0 | 44 | 120 | 120 | 100.00 | 
| 1.0 | 2.0 | 22 | 120 | 116 | 96.70 | 
| 2.0 | 4.0 | 11 | 75 | 24 | 32.00 | 
| 3.0 | 6.0 | 6 | 100 | 0 | 0.00 | 
| 组别 | 尺度 | 匹配数 | 成功数 | 准确率/% | 
|---|---|---|---|---|
| 1 | 300 | 257 | 85.67 | |
| 2 | 300 | 283 | 94.30 | |
| 3 | 300 | 230 | 76.67 | 
Tab. 4 Test results of different scales
| 组别 | 尺度 | 匹配数 | 成功数 | 准确率/% | 
|---|---|---|---|---|
| 1 | 300 | 257 | 85.67 | |
| 2 | 300 | 283 | 94.30 | |
| 3 | 300 | 230 | 76.67 | 
| 阶段 | 运行时间 | 
|---|---|
| 链下商品外观指纹提取 | 0.1 | 
| 商品外观指纹核验合约 | 1.2 | 
| 链下商品外观指纹比对 | 5.0 | 
| 请求信息记录合约 | 2.0 | 
| 用户可信度查询合约 | 0.3 | 
Tab. 5 Running time of different stage
| 阶段 | 运行时间 | 
|---|---|
| 链下商品外观指纹提取 | 0.1 | 
| 商品外观指纹核验合约 | 1.2 | 
| 链下商品外观指纹比对 | 5.0 | 
| 请求信息记录合约 | 2.0 | 
| 用户可信度查询合约 | 0.3 | 
| 1 | 杨璇. 我国大宗商品价格波动溢出效应研究——基于DAG和网络拓扑方法[D]. 广州:暨南大学, 2020:1. | 
| YANG X. Volatility spillover effects of commodity sectors in China — on DAG and network topologic analysis methods[D]. Guangzhou: Jinan University, 2020:1. | |
| 2 | 中国物流与采购联合会. 大宗商品电子交易规范: [S]. 北京: 中国标准出版社, 2003:1-16. (China Federation of Logistics & Purchasing. Bulk stock electronic transaction specification: [S]. Beijing: Standards Press of China, 2003:1-16) | 
| 3 | 张武斌. ZC物流公司大宗商品物流服务质量提升策略研究[D]. 郑州:河南财经政法大学, 2020:2. | 
| ZHANG W B. Research on the strategy of ZC logistics company’s bulk commodity logistics service quality improvement[D]. Zhengzhou: Henan University of Economics and Law, 2020:2. | |
| 4 | LI X, HUANG G L, LI Q, et al. Detection and analysis of diamond fingerprinting feature and its application[J]. Journal of Physics: Conference Series, 2011, 277: No.012018. 10.1088/1742-6596/277/1/012018 | 
| 5 | MOREIRA D, BHARATI A, BROGAN J, et al. Image provenance analysis at scale[J]. IEEE Transactions on Image Processing, 2018, 27(12): 6109-6123. 10.1109/tip.2018.2865674 | 
| 6 | ARJOVSKY M, CHINTALA S, BOTTOU L. Wasserstein generative adversarial networks[C]// Proceedings of the 34th International Conference on Machine Learning. New York: JMLR.org, 2017: 214-223. | 
| 7 | ALZAHRANI N, BULUSU N. Block-supply chain: a new anti-counterfeiting supply chain using NFC and block-chain[C]// Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. New York: ACM, 2018: 30-35. 10.1145/3211933.3211939 | 
| 8 | CAO Y, JIA F, MANOGARAN G. Efficient traceability systems of steel products using blockchain-based industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9): 6004-6012. 10.1109/tii.2019.2942211 | 
| 9 | TSAI Y S, CHEN R S, CHEN Y C, et al. An RFID-based manufacture process control and supply chain management in the semiconductor industry[J]. International Journal of Information Technology and Management, 2013, 12(1/2): 85-105. 10.1504/ijitm.2013.051633 | 
| 10 | VUKATANA K, SEVRANI K, HOXHA E. Wine traceability: a data model and prototype in Albanian context[J]. Foods, 2016, 5(1): No.11. 10.3390/foods5010011 | 
| 11 | 叶云,胡月明,赵小娟,等. 基于改进动态扩展和位置服务的农产品追溯系统优化[J]. 农业工程学报, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 | 
| YE Y, HU Y M, ZHAO X J, et al. Optimization for agricultural product traceability system based on dynamic expansion improvement and location based service[J]. Transaction of the Chinese Society of Agricultural Engineering, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039 | |
| 12 | DENG J K, GUO J, XUE N N, et al. ArcFace: additive angular margin loss for deep face recognition[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 4685-4694. 10.1109/cvpr.2019.00482 | 
| 13 | NG P C, HENIKOFF S. SIFT: predicting amino acid changes that affect protein function[J]. Nucleic Acids Research, 2003, 31(13): 3812-3814. 10.1093/nar/gkg509 | 
| 14 | FENET S, RICHARD G, GRENIER Y. A scalable audio fingerprint method with robustness to pitch-shifting[C]// Proceedings of the 12th International Society for Music Information Retrieval Conference. [S.l.]: ISMIR, 2011:121-126. 10.1162/comj_r_00058 | 
| 15 | LEE S, YOO C D. Robust video fingerprinting for content-based video identification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(7): 983-988. 10.1109/tcsvt.2008.920739 | 
| 16 | HARRIS C, STEPHENS M. A combined corner and edge detector[C]// Proceedings of the 1988 Alvey Vision Conference. [S.l.]: Alvety Vision Club, 1988: No.23. 10.5244/c.2.23 | 
| 17 | BAY H, TUYTELAARS T, van GOOL L. SURF: speeded up robust features[C]// Proceedings of the 2006 European Conference on Computer Vision, LNCS 3951. Berlin: Springer, 2006: 404-417. | 
| 18 | GAO S H, CHENG M M, ZHAO K, et al. Res2Net: a new multi-scale backbone architecture[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 43(2): 652-662. 10.1109/tpami.2019.2938758 | 
| 19 | DOSOVITSKIY A, BEYER L, KOLESNIKOV A, et al. An image is worth 16x16 words: Transformers for image recognition at scale[EB/OL]. (2021-06-03) [2022-03-22].. | 
| 20 | BOCHKOVSKIY A, WANG C Y, LIAO H Y M. YOLOv4: optimal speed and accuracy of object detection[EB/OL]. (2020-04-23) [2022-03-20].. | 
| 21 | LI Y J, CHEN Y C, JI X Y, et al. ScreenID: enhancing QRCode security by fingerprinting screens[C]// Proceedings of the 2021 IEEE Conference on Computer Communications. Piscataway: IEEE, 2021: 1-10. 10.1109/infocom42981.2021.9488859 | 
| 22 | JING H, PINCHIN J, HILL C, et al. Wi-Fi fingerprinting based on collaborative confidence level training[J]. Pervasive and Mobile Computing, 2016, 30: 32-44. 10.1016/j.pmcj.2015.10.005 | 
| 23 | PEI L, LIU J B, CHEN Y W, et al. Evaluation of fingerprinting-based WiFi indoor localization coexisted with Bluetooth[J]. The Journal of Global Positioning Systems, 2017, 15: No.3. 10.1186/s41445-017-0008-x | 
| 24 | WU Y, AbdALMAGEED W, NATARAJAN P. ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 9535-9544. 10.1109/cvpr.2019.00977 | 
| 25 | GKITSAS V, ZIOULIS N, ÁLVAREZ F, et al. Deep lighting environment map estimation from spherical panoramas[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2020: 2719-2728. 10.1109/cvprw50498.2020.00328 | 
| [1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. | 
| [2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. | 
| [3] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. | 
| [4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. | 
| [5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. | 
| [6] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. | 
| [7] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. | 
| [8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. | 
| [9] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. | 
| [10] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. | 
| [11] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. | 
| [12] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. | 
| [13] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. | 
| [14] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. | 
| [15] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||