BATCH 21 IPD DOC Final
BATCH 21 IPD DOC Final
Technology
INNOVATIVE PRODUCT DEVELOPMENT REPORT
Submitted by
Assistant Professor
BACHELOR OF TECHNOLOGY
CSE-AI & ML
November - 2024
MALLA REDDY ENGINEERING COLLEGE FOR WOMEN
(Autonomous Institution-UGC, Govt. of India)
Accredited by NAAC with ‘A+’ Grade, UGC, Govt. of India
Permanently Affiliated to JNTUH, Approved by AICTE, ISO 9001:2015 Certified Institution
Maisammaguda, Dhullapally, Secunderabad, Kompally-500100
CERTIFICATE
This is to certify that the This is to certify that the Innovative Product Development work entitled
Police Complaint management System usying Blockchain Technology is carried out by T Sai
Sangeetha(22RH1A66J2), Rishita ganoliya(22RH1A66F6), N .Ashruja(22RH1A66C9) in partial
fulfillment for the award of degree of BACHELOR OF TECHNOLOGY in CSE - AI & ML, Malla
Reddy Engineering College for Women, Hyderabad during the academic year 2023-2024.
External Examiner
MALLA REDDY ENGINEERING COLLEGE FOR WOMEN
(Autonomous Institution-UGC, Govt. of India)
Accredited by NAAC with A+ Grade
Permanently Affiliated to JNTUH, Approved by AICTE, ISO 9001:2015 Certified Institution
Maisammaguda , Dhullapally Secunderabad, Kompally-500100 sS
DECLARATION
We hereby declare that the Innovative Product Development entitled Police Complaint
Management System using Blockchain Technology submitted to Malla Reddy Engineering
College For Women for the award of the Degree of Bachelor of Technology in CSE-AI & ML is a
result of original research work done by us. It is further declared that the Innovative Product
Development report or any part there of has not been previously submitted to any University or
Institute for the award of Degree.
T. Sai sangeetha(22RH1A66J2)
Rishita(22RH1A66F6)
N. Ashruja 22RH1A66F7)
ACKNOWLEDGEMENT
We feel ourselves honored and privileged to place our warm salutation to our college
Malla Reddy Engineering College for Women and Department of CSE-AI&ML which gave us
the opportunity to have expertise in engineering and profound technical knowledge.
We would like to deeply thank our Honorable MLA of Telangana State Sri.Ch. Malla
Reddy Garu, founder chairman MRGI, the largest cluster of institutions in the state of Telangana
for providing us with all the resources in the college to make our project success.
We wish to convey gratitude to our Principal Dr. Y. Madhavee Latha, for providing us
with the environment and mean to enrich our skills and motivating us in our endeavor and helping
us to realize our full potential.
We would like to thank Prof. A. Radha Rani, Director of Computer Science and
Engineering & Information Technology for encouraging us to take up a project on this subject and
motivating us towards the Project Work.
We would like to thank our guide Dr.Shivani Bhasgi, Asst. Professor of CSE-AI&ML
Dept and all the Faculty members for their valuable guidance and encouragement towards the
completion of our project work.
N. Ashruja (22RH1A66C9)
ABSTRACT
The criminal activities in India are increasing at a rapid rate. Many of these activities go unreported.
Even after having an online portal for the police for storing FIRs and NCRs, most of the FIRs are
handwritten as a traditional practice. In most of the cases, the complainant has to be present in the
police station to file a cognizable offense. An effective system for e-governance was started in 2009
named Crime and Criminal Tracking Network and Systems (CCTNS) for the entire country. However,
it is a centralized system for a particular state. Thus, there is a need for a completely decentralized
system for assuring that there is no central point of failure in the system and complaints are managed
securely protected from unauthorized access. Our aim is to propose a blockchain-based solution to
manage complaints against both cognizable and non-cognizable offenses. The FIR filed by the police
will be encrypted, stored in the IPFS and hash is added to the blockchain network. If the police decide
not to file the FIR under pressure or deny receiving any complaint, then the complainant will have
strong proof against him/her as the complaint along with its timestamp was stored on the blockchain
network. Having all the records stored in an immutable database would remove any chances of the
TITLE i
CERTIFICATE ii
DECLARATION iii
ACKNOWLEDGMENT iv
ABSTRACT v
1. INTRODUCTION 1
2. LITERATURE SURVEY 2
3.METHODOLOGY 3
4 SYSTEM ARCHITECTURE 4
5. IMPLEMENTATION 5
6. RESULTS 6-
10
7. CONCLUSION & FUTURE SCOPE 11
8. REFERENCES 12
MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 1
INTRODUCTION
PROJECT DEFINITION
Technology has touched many citizens living in India and abroad. Technology is in industry,
education, social interactions and preservation human relations, in sales, in agriculture and in
banking, communication, and just about any aspect of our life. This technology interference has
supported the work in many of these areas and has been helpful, saving time and effort. On the other
hand, the rising in crime rates all across the globe is one of the serious concerns for all the
governments. However, to tackle this problem, a vending teller machine-based FIR online registration
system is proposed in this research work. This will assuredly help people in registering the crimes and
will remove the fear of going to police station to lodge the complaint. Furthermore, this machine can
be installed at various public places for the ease of access.
PROJECT OVERVIEW
We propose a two-level blockchain system that separates digital evidence into hot and cold
blockchains. In the criminal investigation process, information that frequently changes is stored in the
hot blockchain, and unchanging data such as videos are stored in the cold blockchain. To evaluate the
system, we measured the storage and inquiry processing performance of digital crime evidence
videos according to the different capacities in the two-level blockchain system
SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS
• Processor : Intel i3
• Hard Disk : 500GB
1

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 2
LITERATURE SURVEY
Existing System:
In Earlier all criminal records were maintained in a register which can be easily manipulated and
time-consuming process to transfer register data from one police station to other station. To
overcome from above issue Online Criminal Tracking System was introduced which is managed by a
single centralized server, if this server is down then criminal tracking services will get disturbed and
internal employee of server management can be manipulated easily and those manipulation cannot
be detected easily
Proposed System:
The proposed system is a decentralized platform for managing complaints with the help of various
technologies like blockchain, IPFS, etc. The detailed architecture of the system is explained in the
form of modules followed by the implementation of the system Like Security Module, Blockchain
Module, Web/Mobile Interface and Implementation So by employing Blockchain technology we can
overcome from all disadvantages faces during single centralized servers.
Advantages :
- More Secure
Disadvantages:
- Less Secure
2

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 3
METHODOLOGY
The requirements gathering process takes as its input SDLC is nothing but Software Development
Life Cycle. It is a standard which is used by software industry to develop good software.
Stages in SDLC:
♦ Requirement Gathering
♦ Analysis
♦ Designing
♦ Coding
♦ Testing
♦ Maintenance
3


MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
the goals identified in the high-level requirements section of the project plan. Each goal will be
refined into a set of one or more requirements. These requirements define the major functions of the
intended application, define operational data areas and reference data areas, and define the initial data
entities. Major functions include critical processes to be managed, as well as mission critical inputs,
outputs and reports. A user class hierarchy is developed and associated with these major functions, data
areas, and data entities. Each of these definitions is termed a Requirement. Requirements are identified
by unique requirement identifiers and, at minimum, contain a requirement title and textual description.
Overall Description
• ECONOMIC FEASIBILITY
A system can be developed technically and that will be used if installed must still be a good investment
for the organization. In the economical feasibility, the development cost in creating the system is
evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or
exceed the costs.
• OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned out into information system. That will meet
the organization’s operating requirements. Operational feasibility aspects of the project are to be taken as
an important part of the project implementation. This system is targeted to be in accordance with the
4

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
above-mentioned issues. Beforehand, the management issues and user requirements have been taken into
consideration. So there is no question of resistance from the users that can undermine the possible
application benefits. The well-planned design would
• TECHNICAL FEASIBILITY
Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System’. The
current system developed is technically feasible. It is a web based user interface for audit workflow at
NIC-CSD. Thus it provides an easy access to .the users. The database’s purpose is to create, establish and
maintain a workflow among various entities in order to facilitate all concerned users in their various
capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it
provides the technical guarantee of accuracy, reliability and security.
5

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 4
SYSTEM ARCHITECTURE
blockchain-based police complaint management system architecture would consist of several layers,
components, and modules to ensure secure, transparent, and efficient complaint processing. Here’s an
• Citizen Portal: Allows citizens to register complaints, track status, and access responses. This portal
can be web-based or mobile-app based, ensuring ease of access and usability.
• Police Dashboard: Used by law enforcement officers to view, assign, and update complaints. It
provides insights and analytics on complaints and case progress.
• Admin Panel: Allows system administrators to manage users, permissions, and overall system
maintenance.
2. Application Layer
• Complaint Registration Module: This module allows citizens to submit complaints, attaching
necessary documentation, photos, or videos.
• Case Assignment and Management Module: This enables law enforcement to assign complaints to
officers, update statuses, and add follow-up actions.
• Notification Module: Provides alerts and notifications to users about case updates and status changes.
• Smart contracts define rules and conditions for complaint handling. They automate complaint
registration, case assignment, and escalation processes, ensuring that the workflow is followed
transparently and that updates are executed based on predefined conditions.
6

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
4. Blockchain Layer
• Blockchain Network: A private or consortium blockchain network where all complaint transactions are
recorded. This network ensures data immutability, making each transaction permanent and verifiable.
• Transaction Ledger: Stores each complaint as a transaction. Any updates, status changes, and
responses are also logged here to ensure an unalterable audit trail.
• Consensus Mechanism: Determines how new transactions are validated and added to the blockchain,
maintaining integrity and security. A permissioned blockchain using consensus mechanisms like Proof
of Authority (PoA) or Practical Byzantine Fault Tolerance (PBFT) could be suitable.
• Distributed Database: Stores non-sensitive and public-facing data, such as complaint status and basic
metadata. Sensitive information can be encrypted and referenced via hashes stored on the blockchain.
• Encryption and Key Management: Ensures that sensitive data remains secure. Only authorized parties
have access to specific information through encryption keys, while the blockchain stores cryptographic
hashes for reference.
6. Integration Layer
• API Gateway: Manages communication between the blockchain network and external services,
enabling interoperability with other government databases like judicial and criminal records.
• Inter-Agency Access Control: Allows restricted access for external entities (courts, legal bodies) to
query complaint status, ensuring cross-agency transparency while maintaining data privacy.
7

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
• Provides data analysis on complaints, response times, and case outcomes to support decision-making
and performance reviews. Machine learning algorithms can also analyze complaint patterns and
predict potential hotspots or trends.
8. Security Layer
• Authentication and Authorization: Ensures that users are verified through multi-factor authentication,
and each role has appropriate access permissions.
• Audit Logs: Tracks every system activity, creating a comprehensive record of interactions to support
system security and accountability.
8

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 5
IMPLEMENTATION
PYTHON
* One of the most popular languages is Python. Guido van Rossum released this language in 1991.
Python is available on the Mac, Windows, and Raspberry Pi operating systems. The syntax of Python is
simple and identical to that of English. When compared to Python, it was seen that the other language
requires a few extra lines.
• Readability: Python emphasizes code readability with its clean and intuitive syntax. It uses
indentation and whitespace to structure code blocks, making it easy to understand and maintain.
• Easy to Learn: Python's simplicity and readability make it an excellent choice for beginners. Its
straightforward syntax and extensive documentation make it accessible for newcomers to
programming.
History of Python:
Python is a fairly old language created by Guido Van Rossum. The design began in the late 1980s and
In late 1980s, Guido Van Rossum was working on the Amoeba distributed operating system group. He
wanted to use an interpreted language like ABC (ABC has simple easy-to-understand syntax) that
could access the Amoeba system calls. So, he decided to create a language that was extensible. This
9

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
▪ Code Reusability:
▪ Efficiency:
▪ Collaboration
▪ Domain-Specific Functionality
SOURCE CODE
import os
import os
import json
import ipfsApi
import os
import pickle
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF
from datetime import date
10

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
def readDetails(contract_type):
global details
details = ""
print(contract_type+"======================")
if contract_type == 'complaints':
details = contract.functions.getComplaints().call()
if contract_type == 'investigations':
details = contract.functions.getInvestigation().call()
print(details)
def UpdateInvestigationsAction(request):
if request.method == 'POST':
global username
today = date.today()
'
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF
‘ 11

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
for k in range(len(investigations)):
ar = investigations[k].split("#")
if ar[0] == arr[0]:
invest += ar[2]+"\n"
output += "</table><br/><br/><br/><br/>"
def AddFirAction(request):
if request.method == 'POST':
global username
today = date.today()
12

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
filename = request.FILES['t10'].name
filedata = encrypt(filedata)
complaint_id = 0
readDetails("complaints")
rows = details.split("\n")
if len(rows) == 0:
complaint_id = 1
else:
complaint_id = len(rows)
filedata = pickle.dumps(filedata)
def DownloadAction(request):
if request.method == 'GET':
global username
complaint = request.GET['file']
fileName = ""
hashcode = ""
readDetails("complaints")
rows = details.split("\n")
for i in range(len(rows)-1):
arr = rows[i].split("#")
if arr[0] == complaint:
MALLAREDDY ENGINEERING COLLEGE FOR WOMEN, AUTONOMOUS INSTITUTION, UGC, GOVT OF
13

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
hashcode = arr[10]
break
content = api.get_pyobj(hashcode)
content = pickle.loads(content)
content = decrypt(content)
response = HttpResponse(content,content_type="application/octet-stream")
return response
def ViewPolice(request):
if request.method == 'GET':
global username
readDetails("addusers")
rows = details.split("\n")
for i in range(len(rows)-1):
arr = rows[i].split("#")
14

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 6
OUTPUT RESULTS
In above screen IPFS server started and now double click on ‘run.bat’ to start python WEB SERVER and
get below page
15



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
16



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
In above
screen admin can click on ‘Add New Police Users’ link to get below page
17



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
In above screen police personnel is login and after login will get below page
In above screen police can click on ‘Add FIR/NCR/Charge sheet’ link to add FIR
18



MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
CHAPTER 7
CONCLUSION AND FUTURE SCOPE
CONCLUSION
Indian Police Services are a crucial part of our country. On a yearly basis, more than 50 lakh
complaints against cognizable crimes are filed. Even after having systems to manage complaints
online, there is still a burden on the police officers for filing handwritten reports and fear of filing
a complaint in the mind of society. Managing Police Complaints in an efficient and secure way is
very crucial because it contains sensitive data. The proposed system will provide transparency
while also ensuring the confidentiality of the data stored. It will also motivate people to come
forward and file their complaints knowing that it cannot be ignored by the police. It will also
benefit the police officers by simplifying the tedious work of filing reports such as FIRs. The
decentralized network does not rely on the trust factor of the stakeholders. We proposed a system
that will protect against corrupt police activities and provide justice at the very beginning.
FUTURE SCOPE
A police complaint management system built on blockchain holds vast potential to transform
law enforcement processes by ensuring transparency, security, and efficiency. Using
blockchain’s immutability, complaints are recorded permanently, preventing any tampering or
deletion, which builds public trust. This decentralization enables seamless sharing of data
across police departments and courts, fostering collaboration and reducing duplication.
Blockchain’s encryption adds an additional layer of security to protect sensitive information,
while smart contracts can automate complaint updates and follow-up actions, ensuring timely
responses. Furthermore, citizens can track the status of their complaints in real-time,
increasing accountability within the system. The data’s interoperability with other
governmental systems, such as criminal and judicial databases, helps create a streamlined and
unified approach to legal procedures. By ensuring data accuracy and simplifying audits,
blockchain-based complaint systems can drive efficiency and reliability, paving the way for
modernized and transparent policing.
19

MEDICAL IMAGE ENCRYPTION BY CONTENT-AWARE DNA COMPUTING FOR SECURITY HEALTHCARE DEPT. OF CSE-AIML
REFERENCES
1.K. Akhila, and K. R. Ahmed. Firearm Detection Using Deep Learning. Intelligent Systems and
Applications: (2022).
2. Ahmed, S.; Bhatti, M.T.; Khan, M.G.; Lövström, B.; Shahid, M. Development and Optimization of
Deep Learning Models for Weapon Detection in Surveillance Videos. Appl. Sci. 2022.
3. Ahmed S, Bhatti MT, Khan MG, Lövström B, Shahid M. Development and Optimization of Deep
Learning Models for Weapon Detection in Surveillance Videos. 2022.
4. Ahmed, Soban, Muhammad Tahir Bhatti, Muhammad Gufran Khan, Benny Lövström, and
Muhammad Shahid. 2022. "Development and Optimization of Deep Learning Models for Weapon
Detection in Surveillance Videos. 5.
6. Cohen, N.; Gattuso, J.; MacLennan-Brown, K. CCTV Operational Requirements Manual 2009. Home
Office Scientific Development Branch: St. Albans, UK, 2009.
7. Murthy, C.B.; Hashmi, M.F.; Bokde, N.D.; Geem, Z.W. Investigations of Object Detection in Images/
Videos Using Various Deep Learning Techniques and Embedded Platforms—A Comprehensive Review.
Appl. Sci. 2020
1.
20