0% found this document useful (0 votes)
21 views26 pages

BATCH 21 IPD DOC Final

Uploaded by

Rishita Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views26 pages

BATCH 21 IPD DOC Final

Uploaded by

Rishita Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Police Complaint Management System using Blockchain

Technology
INNOVATIVE PRODUCT DEVELOPMENT REPORT

Submitted by

T. Sai Sangeeta Rishita ganoliya N.Ashruja


22RH1A66J2 22RH1A66F6 22RH1A66C9

Under the Esteemed Guidance of

Dr. Shivani Bhasgi

Assistant Professor

in partial fulfillment of the Academic Requirements for the Degree of

BACHELOR OF TECHNOLOGY

CSE-AI & ML

MALLA REDDY ENGINEERING COLLEGE FOR WOMEN


(Autonomous Institution-UGC, Govt. of India)
Accredited by NAAC with ‘A+’ Grade, UGC, Govt. of India
Permanently Affiliated to JNTUH, Approved by AICTE, ISO 9001:2015 Certified Institution
Maisammaguda, Dhullapally, Secunderabad, Kompally-500100

November - 2024
MALLA REDDY ENGINEERING COLLEGE FOR WOMEN
(Autonomous Institution-UGC, Govt. of India)
Accredited by NAAC with ‘A+’ Grade, UGC, Govt. of India
Permanently Affiliated to JNTUH, Approved by AICTE, ISO 9001:2015 Certified Institution
Maisammaguda, Dhullapally, Secunderabad, Kompally-500100

DEPARTMENT OF CSE - AI &ML

CERTIFICATE

This is to certify that the This is to certify that the Innovative Product Development work entitled
Police Complaint management System usying Blockchain Technology is carried out by T Sai
Sangeetha(22RH1A66J2), Rishita ganoliya(22RH1A66F6), N .Ashruja(22RH1A66C9) in partial
fulfillment for the award of degree of BACHELOR OF TECHNOLOGY in CSE - AI & ML, Malla
Reddy Engineering College for Women, Hyderabad during the academic year 2023-2024.

Supervisor’s Signature Head of the Department

Dr. Shivani Bhasgi Dr.G.Kalpana


Asst. Professor Professor

External Examiner
MALLA REDDY ENGINEERING COLLEGE FOR WOMEN
(Autonomous Institution-UGC, Govt. of India)
Accredited by NAAC with A+ Grade
Permanently Affiliated to JNTUH, Approved by AICTE, ISO 9001:2015 Certified Institution
Maisammaguda , Dhullapally Secunderabad, Kompally-500100 sS

Department of CSE –AI &ML

DECLARATION

We hereby declare that the Innovative Product Development entitled Police Complaint
Management System using Blockchain Technology submitted to Malla Reddy Engineering
College For Women for the award of the Degree of Bachelor of Technology in CSE-AI & ML is a

result of original research work done by us. It is further declared that the Innovative Product
Development report or any part there of has not been previously submitted to any University or
Institute for the award of Degree.

T. Sai sangeetha(22RH1A66J2)

Rishita(22RH1A66F6)

N. Ashruja 22RH1A66F7)
ACKNOWLEDGEMENT

We feel ourselves honored and privileged to place our warm salutation to our college
Malla Reddy Engineering College for Women and Department of CSE-AI&ML which gave us
the opportunity to have expertise in engineering and profound technical knowledge.

We would like to deeply thank our Honorable MLA of Telangana State Sri.Ch. Malla
Reddy Garu, founder chairman MRGI, the largest cluster of institutions in the state of Telangana
for providing us with all the resources in the college to make our project success.

We wish to convey gratitude to our Principal Dr. Y. Madhavee Latha, for providing us
with the environment and mean to enrich our skills and motivating us in our endeavor and helping
us to realize our full potential.

We would like to thank Prof. A. Radha Rani, Director of Computer Science and
Engineering & Information Technology for encouraging us to take up a project on this subject and
motivating us towards the Project Work.

We express our sincere gratitude to Dr.G.Kalpana , Head of the Department of CSE–


AI&ML for inspiring us to take up a project on this subject and successfully guiding us towards its
completion.

We would like to thank our guide Dr.Shivani Bhasgi, Asst. Professor of CSE-AI&ML
Dept and all the Faculty members for their valuable guidance and encouragement towards the
completion of our project work.

With Regards and Gratitude

T. Sai Sanngeetha (22RH1A66J2)

Rishita ganoliya (22RH1A66F6)

N. Ashruja (22RH1A66C9)
ABSTRACT

The criminal activities in India are increasing at a rapid rate. Many of these activities go unreported.

Even after having an online portal for the police for storing FIRs and NCRs, most of the FIRs are

handwritten as a traditional practice. In most of the cases, the complainant has to be present in the

police station to file a cognizable offense. An effective system for e-governance was started in 2009

named Crime and Criminal Tracking Network and Systems (CCTNS) for the entire country. However,

it is a centralized system for a particular state. Thus, there is a need for a completely decentralized

system for assuring that there is no central point of failure in the system and complaints are managed

securely protected from unauthorized access. Our aim is to propose a blockchain-based solution to

manage complaints against both cognizable and non-cognizable offenses. The FIR filed by the police

will be encrypted, stored in the IPFS and hash is added to the blockchain network. If the police decide

not to file the FIR under pressure or deny receiving any complaint, then the complainant will have

strong proof against him/her as the complaint along with its timestamp was stored on the blockchain

network. Having all the records stored in an immutable database would remove any chances of the

FIR/NCR being tampered and going unnoticed.


INDEX

TITLE i
CERTIFICATE ii
DECLARATION iii
ACKNOWLEDGMENT iv
ABSTRACT v
1. INTRODUCTION 1
2. LITERATURE SURVEY 2
3.METHODOLOGY 3
4 SYSTEM ARCHITECTURE 4
5. IMPLEMENTATION 5
6. RESULTS 6-
10
7. CONCLUSION & FUTURE SCOPE 11
8. REFERENCES 12
MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 1
INTRODUCTION

PROJECT DEFINITION
Technology has touched many citizens living in India and abroad. Technology is in industry,
education, social interactions and preservation human relations, in sales, in agriculture and in
banking, communication, and just about any aspect of our life. This technology interference has
supported the work in many of these areas and has been helpful, saving time and effort. On the other
hand, the rising in crime rates all across the globe is one of the serious concerns for all the
governments. However, to tackle this problem, a vending teller machine-based FIR online registration
system is proposed in this research work. This will assuredly help people in registering the crimes and
will remove the fear of going to police station to lodge the complaint. Furthermore, this machine can
be installed at various public places for the ease of access.

PROJECT OVERVIEW
We propose a two-level blockchain system that separates digital evidence into hot and cold
blockchains. In the criminal investigation process, information that frequently changes is stored in the
hot blockchain, and unchanging data such as videos are stored in the cold blockchain. To evaluate the
system, we measured the storage and inquiry processing performance of digital crime evidence
videos according to the different capacities in the two-level blockchain system

SOFTWARE REQUIREMENTS:

• Operating system: Windows.


• Coding Language: Python.

HARDWARE REQUIREMENTS
• Processor : Intel i3
• Hard Disk : 500GB

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

1

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 2
LITERATURE SURVEY

Existing System:

In Earlier all criminal records were maintained in a register which can be easily manipulated and

time-consuming process to transfer register data from one police station to other station. To
overcome from above issue Online Criminal Tracking System was introduced which is managed by a
single centralized server, if this server is down then criminal tracking services will get disturbed and
internal employee of server management can be manipulated easily and those manipulation cannot
be detected easily

Proposed System:
The proposed system is a decentralized platform for managing complaints with the help of various
technologies like blockchain, IPFS, etc. The detailed architecture of the system is explained in the
form of modules followed by the implementation of the system Like Security Module, Blockchain
Module, Web/Mobile Interface and Implementation So by employing Blockchain technology we can
overcome from all disadvantages faces during single centralized servers.

Advantages :
- More Secure

Disadvantages:
- Less Secure

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

2

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 3
METHODOLOGY

SDLC (Umbrella Model):

The requirements gathering process takes as its input SDLC is nothing but Software Development
Life Cycle. It is a standard which is used by software industry to develop good software.

Stages in SDLC:

♦ Requirement Gathering
♦ Analysis
♦ Designing
♦ Coding
♦ Testing
♦ Maintenance

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

3


MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

Requirements Gathering stage:

the goals identified in the high-level requirements section of the project plan. Each goal will be
refined into a set of one or more requirements. These requirements define the major functions of the
intended application, define operational data areas and reference data areas, and define the initial data
entities. Major functions include critical processes to be managed, as well as mission critical inputs,
outputs and reports. A user class hierarchy is developed and associated with these major functions, data
areas, and data entities. Each of these definitions is termed a Requirement. Requirements are identified
by unique requirement identifiers and, at minimum, contain a requirement title and textual description.

Software Requirement Specification

Overall Description

A Software Requirements Specification (SRS) – a requirements specification for a software system is a


complete description of the behavior of a system to be developed. It includes a set of use cases that
describe all the interactions the users will have with the software. In addition to use cases, the SRS also
contains non-functional requirements. Nonfunctional requirements are requirements which impose
constraints on the design or implementation (such as performance engineering requirements, quality
standards, or design constraints).

• ECONOMIC FEASIBILITY

A system can be developed technically and that will be used if installed must still be a good investment
for the organization. In the economical feasibility, the development cost in creating the system is
evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or
exceed the costs.

• OPERATIONAL FEASIBILITY

Proposed projects are beneficial only if they can be turned out into information system. That will meet
the organization’s operating requirements. Operational feasibility aspects of the project are to be taken as
an important part of the project implementation. This system is targeted to be in accordance with the

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

4

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

above-mentioned issues. Beforehand, the management issues and user requirements have been taken into
consideration. So there is no question of resistance from the users that can undermine the possible
application benefits. The well-planned design would

• TECHNICAL FEASIBILITY

Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System’. The
current system developed is technically feasible. It is a web based user interface for audit workflow at
NIC-CSD. Thus it provides an easy access to .the users. The database’s purpose is to create, establish and
maintain a workflow among various entities in order to facilitate all concerned users in their various
capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it
provides the technical guarantee of accuracy, reliability and security.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

5

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 4
SYSTEM ARCHITECTURE

blockchain-based police complaint management system architecture would consist of several layers,

components, and modules to ensure secure, transparent, and efficient complaint processing. Here’s an

overview of its architecture:

1. User Interface Layer (UI/UX)

• Citizen Portal: Allows citizens to register complaints, track status, and access responses. This portal
can be web-based or mobile-app based, ensuring ease of access and usability.

• Police Dashboard: Used by law enforcement officers to view, assign, and update complaints. It
provides insights and analytics on complaints and case progress.

• Admin Panel: Allows system administrators to manage users, permissions, and overall system
maintenance.

2. Application Layer

• Complaint Registration Module: This module allows citizens to submit complaints, attaching
necessary documentation, photos, or videos.

• Case Assignment and Management Module: This enables law enforcement to assign complaints to
officers, update statuses, and add follow-up actions.

• Notification Module: Provides alerts and notifications to users about case updates and status changes.

3. Smart Contracts Layer

• Smart contracts define rules and conditions for complaint handling. They automate complaint
registration, case assignment, and escalation processes, ensuring that the workflow is followed
transparently and that updates are executed based on predefined conditions.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

6

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

4. Blockchain Layer

• Blockchain Network: A private or consortium blockchain network where all complaint transactions are
recorded. This network ensures data immutability, making each transaction permanent and verifiable.

• Transaction Ledger: Stores each complaint as a transaction. Any updates, status changes, and
responses are also logged here to ensure an unalterable audit trail.

• Consensus Mechanism: Determines how new transactions are validated and added to the blockchain,
maintaining integrity and security. A permissioned blockchain using consensus mechanisms like Proof
of Authority (PoA) or Practical Byzantine Fault Tolerance (PBFT) could be suitable.

5. Data Management Layer

• Distributed Database: Stores non-sensitive and public-facing data, such as complaint status and basic
metadata. Sensitive information can be encrypted and referenced via hashes stored on the blockchain.

• Encryption and Key Management: Ensures that sensitive data remains secure. Only authorized parties
have access to specific information through encryption keys, while the blockchain stores cryptographic
hashes for reference.

6. Integration Layer

• API Gateway: Manages communication between the blockchain network and external services,
enabling interoperability with other government databases like judicial and criminal records.

• Inter-Agency Access Control: Allows restricted access for external entities (courts, legal bodies) to
query complaint status, ensuring cross-agency transparency while maintaining data privacy.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

7

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

7. Analytics and Reporting Layer

• Provides data analysis on complaints, response times, and case outcomes to support decision-making
and performance reviews. Machine learning algorithms can also analyze complaint patterns and
predict potential hotspots or trends.

8. Security Layer

• Authentication and Authorization: Ensures that users are verified through multi-factor authentication,
and each role has appropriate access permissions.

• Audit Logs: Tracks every system activity, creating a comprehensive record of interactions to support
system security and accountability.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

8

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 5
IMPLEMENTATION

PYTHON

* One of the most popular languages is Python. Guido van Rossum released this language in 1991.
Python is available on the Mac, Windows, and Raspberry Pi operating systems. The syntax of Python is
simple and identical to that of English. When compared to Python, it was seen that the other language
requires a few extra lines.

Here are some key features and characteristics of Python:

• Readability: Python emphasizes code readability with its clean and intuitive syntax. It uses
indentation and whitespace to structure code blocks, making it easy to understand and maintain.

• Easy to Learn: Python's simplicity and readability make it an excellent choice for beginners. Its
straightforward syntax and extensive documentation make it accessible for newcomers to
programming.

History of Python:

Python is a fairly old language created by Guido Van Rossum. The design began in the late 1980s and

was first released in February 1991.

Why Python was created?

In late 1980s, Guido Van Rossum was working on the Amoeba distributed operating system group. He

wanted to use an interpreted language like ABC (ABC has simple easy-to-understand syntax) that

could access the Amoeba system calls. So, he decided to create a language that was extensible. This

led to design of a new language which was later named Python.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

9

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

Libraries in Python offer various advantages:

▪ Code Reusability:

▪ Efficiency:

▪ Collaboration

▪ Domain-Specific Functionality

▪ To use a Python library, you need to install it first

SOURCE CODE

rom django.shortcuts import render

from django.template import RequestContext

from django.contrib import messages

from django.http import HttpResponse

from django.core.files.storage import FileSystemStorage

import os

from datetime import date

import os

import json

from web3 import Web3, HTTPProvider

import ipfsApi

import os

from django.core.files.storage import FileSystemStorage

import pickle
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF
from datetime import date
10

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

def readDetails(contract_type):

global details

details = ""

print(contract_type+"======================")

blockchain_address = 'http://127.0.0.1:9545' #Blokchain connection IP

web3 = Web3(HTTPProvider(blockchain_address) details = contract.functions.getUsers().call()

if contract_type == 'complaints':

details = contract.functions.getComplaints().call()

if contract_type == 'investigations':

details = contract.functions.getInvestigation().call()

print(details)

def UpdateInvestigationsAction(request):

if request.method == 'POST':

global username

today = date.today()

complaint = request.POST.get('t1', False)

investigation = request.POST.get('t2', False)

output+='<th><font size=3 color=black>Complaint Details</font></th>'

output+='<th><font size=3 color=black>Complainer Name</font></th>'

output+='<th><font size=3 color=black>Complainer Contact No</font></th>'

output+='<th><font size=3 color=black>Address</font></th>'

'
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

‘ 11

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

output+='<th><font size=3 color=black>Contact No</font></th>'

output+='<th><font size=3 color=black>Address</font></th>'

output+='<th><font size=3 color=black>Case Type</font></th>

output+='<tr><td><font size=3 color=black>'+arr[0]+'</font></td>'

output+='<td><font size=3 color=black>'+arr[1]+'</font></td>'

output+='<td><font size=3 color=black>'+arr[2]+'</font></td>'

output+='<td><font size=3 color=black>'+arr[3]+'</font></td>'

output+='<td><font size=3 color=black>'+arr[4]+'</font></td>'

output+='<td><font size=3 color=black>'+arr[5]+'</font

for k in range(len(investigations)):

ar = investigations[k].split("#")

if ar[0] == arr[0]:

invest += ar[2]+"\n"

output+='<td><font size=3 color=black>'+invest+'</font></td>'

output+='<td><a href=\'DownloadAction?file='+arr[0]+'\'><font size=3 color=black>Click Here</font></a></td></


tr>'

output += "</table><br/><br/><br/><br/>"

context= {'data': output}

return render(request, 'AdminScreen.html', context)

def AddFirAction(request):

if request.method == 'POST':

global username

today = date.today()

complaint = request.POST.get('t1', False)

complainer_name = request.POST.get('t2', False)

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

12

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

complainer_contact = request.POST.get('t3', False)

complainer_address = request.POST.get('t4', False)

criminal_name = request.POST.get('t5', False)

filename = request.FILES['t10'].name

filedata = encrypt(filedata)

complaint_id = 0

readDetails("complaints")

rows = details.split("\n")

if len(rows) == 0:

complaint_id = 1

else:

complaint_id = len(rows)

filedata = pickle.dumps(filedata)

def DownloadAction(request):

if request.method == 'GET':

global username

complaint = request.GET['file']

fileName = ""

hashcode = ""

readDetails("complaints")

rows = details.split("\n")

for i in range(len(rows)-1):

arr = rows[i].split("#")

if arr[0] == complaint:
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

13

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

hashcode = arr[10]

break

content = api.get_pyobj(hashcode)

content = pickle.loads(content)

content = decrypt(content)

response = HttpResponse(content,content_type="application/octet-stream")

response['Content-Disposition'] = "attachment; filename=%s" % fileName

return response

def ViewPolice(request):

if request.method == 'GET':

global username

output = '<table border=1 align=center>'

output+='<tr><th><font size=3 color=black>Username</font></th>'

output+='<th><font size=3 color=black>Passwor</font></th>'

output+='<th><font size=3 color=black>Police Station Contact No</font></th>'

output+='<th><font size=3 color=black>E-Mail ID</font></th>'

output+='<th><font size=3 color=black>Address</font></th></tr>'

readDetails("addusers")

rows = details.split("\n")

for i in range(len(rows)-1):

arr = rows[i].split("#")

context= {'data': output}

return render(request, 'AdminScreen.html', context)

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

14

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 6
OUTPUT RESULTS

In above screen IPFS server started and now double click on ‘run.bat’ to start python WEB SERVER and
get below page

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

15



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

16



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

In above
screen admin can click on ‘Add New Police Users’ link to get below page

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

17



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

In above screen police personnel is login and after login will get below page

In above screen police can click on ‘Add FIR/NCR/Charge sheet’ link to add FIR

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

18



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

CHAPTER 7
CONCLUSION AND FUTURE SCOPE

CONCLUSION

Indian Police Services are a crucial part of our country. On a yearly basis, more than 50 lakh
complaints against cognizable crimes are filed. Even after having systems to manage complaints
online, there is still a burden on the police officers for filing handwritten reports and fear of filing
a complaint in the mind of society. Managing Police Complaints in an efficient and secure way is
very crucial because it contains sensitive data. The proposed system will provide transparency
while also ensuring the confidentiality of the data stored. It will also motivate people to come
forward and file their complaints knowing that it cannot be ignored by the police. It will also
benefit the police officers by simplifying the tedious work of filing reports such as FIRs. The
decentralized network does not rely on the trust factor of the stakeholders. We proposed a system
that will protect against corrupt police activities and provide justice at the very beginning.

FUTURE SCOPE

A police complaint management system built on blockchain holds vast potential to transform
law enforcement processes by ensuring transparency, security, and efficiency. Using
blockchain’s immutability, complaints are recorded permanently, preventing any tampering or
deletion, which builds public trust. This decentralization enables seamless sharing of data
across police departments and courts, fostering collaboration and reducing duplication.
Blockchain’s encryption adds an additional layer of security to protect sensitive information,
while smart contracts can automate complaint updates and follow-up actions, ensuring timely
responses. Furthermore, citizens can track the status of their complaints in real-time,
increasing accountability within the system. The data’s interoperability with other
governmental systems, such as criminal and judicial databases, helps create a streamlined and
unified approach to legal procedures. By ensuring data accuracy and simplifying audits,
blockchain-based complaint systems can drive efficiency and reliability, paving the way for
modernized and transparent policing.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

19

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML

REFERENCES

1.K. Akhila, and K. R. Ahmed. Firearm Detection Using Deep Learning. Intelligent Systems and
Applications: (2022).

2. Ahmed, S.; Bhatti, M.T.; Khan, M.G.; Lövström, B.; Shahid, M. Development and Optimization of
Deep Learning Models for Weapon Detection in Surveillance Videos. Appl. Sci. 2022.

3. Ahmed S, Bhatti MT, Khan MG, Lövström B, Shahid M. Development and Optimization of Deep
Learning Models for Weapon Detection in Surveillance Videos. 2022.

4. Ahmed, Soban, Muhammad Tahir Bhatti, Muhammad Gufran Khan, Benny Lövström, and
Muhammad Shahid. 2022. "Development and Optimization of Deep Learning Models for Weapon
Detection in Surveillance Videos. 5.

Ratcliffe, J. Video Surveillance of Public Places. US Department of Justice, Office of Community


Oriented Policing Services: Washington, DC, USA, 2006.

6. Cohen, N.; Gattuso, J.; MacLennan-Brown, K. CCTV Operational Requirements Manual 2009. Home
Office Scientific Development Branch: St. Albans, UK, 2009.

7. Murthy, C.B.; Hashmi, M.F.; Bokde, N.D.; Geem, Z.W. Investigations of Object Detection in Images/
Videos Using Various Deep Learning Techniques and Embedded Platforms—A Comprehensive Review.
Appl. Sci. 2020

1.

MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF

20

You might also like