Abstract
To ensure the fast and rapid development of smart cities, one of the foremost matter of concern is safety for women and children which has been a critical concern for the country. Even though many regulations, laws, devices and applications have been developed that do function to an extent, there hasn’t been any decrease in crime rate against women. It is sad that even though equal rights are there for both men and women, the latter are always in fear because of the former, especially in India where women are considered goddesses. We have come with an approach which makes the chances of saving the victim better. We have employed the use of a powerful Raspberry Pi for this. The Raspberry Pi can capture images and videos of the assaulter which would be safely uploaded to Google Drive or Cloud for later retrieval while producing evidence. A smart push button-based model is developed which makes the victim call for help through her fingertips. The button system along with a GPS/GSM Module helps in alerting the emergency contacts or the police by sending an alert message, the latitude and longitude coordinates, along with the location on Google Map. A shock gun model is also attached which helps the victim to sustain until help arrives. A buzzer system is also included which can alert nearby people, with a loud sound to gather their attention. The entire device would be encapsulated such that the button can be pressed from a regular usage handbag.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
In the 21stcentury, India has been labelled as one of the most unsafe places to live in for women and children. Throughout the two decades, we saw so many movements that empowered women, change in laws that should have instilled fear among the men. This means that not only do women require extra safety, but the oppressors who are 99.9% of the time men, need to be shown their place by bringing their patriarchal and animalistic ego down. Our project thrives on this major motivation to instill fear among the men who have been oppressing and committing heinous crimes for years, so that they wouldn’t even think to commit one and to supply such a safety system for women that will not only keep them away at risk, but also give them the bravery and upper hand to defend themselves in case of aggressive advancements by the assault. This can be fit in a handbag for women who are travelling. The Raspberry Pi also works with a powerful GPS GSM Module, that will effectively track the location of the person in trouble and send their location via a help message on Telegram, E-Mail and WhatsApp of the emergency contacts or police so that they can arrive to their help seeing the GPS coordinates along with its Google Map marker location. Meanwhile, the victim in trouble can make use of two self-defense mechanisms and flee from the location until help arrives. Not only is safety prioritized, but the entire evidence in the form of image detected and video captured by the Raspberry Pi will safely be backed up to a storage spot such as Database, Google Drive or Cloud which can be accessed later for verifying.
2 Literature Review
Bharathwaj [1] has proposed a method to get the location of the police station which is situated the nearest to the victim and alert them through a message when the women/victim is in shear distress, there are some flaws which needs to be clear, though this gets the location of the police station which is near to the victim there will be a minimum amount of delay that is occurring due to the official themselves. Viswanath [2] had built a device so compact that it can be worn on the feet of the victim which consists of a light blue bean microcontroller, when the sound is measured by the sensor about 4–5 times and conveys the message through message or email. In this paper, it was mentioned that the speed of the light blue bean is minimum. Monisha [3] had built a device using buttons for meeting the emergency by single/double pressing the buttons while, pressing the buttons during such situation is not at all possible.
VamsiPriya [4] had built a portable device and a professionally written code for the entire project that made Code readable and more professional on the contrary, the microcontroller chosen for the same is very primitive one that is the Arduino Uno that can’t do multitasking and the range of the same is mentioned to be 10 m that is very less. Rasool [5] was able to successfully implement a lot of test case real world situation with one single written Program. Also, they made use of common household bat as a self-defense mechanism but, the major disadvantage of the developed system is it leads to confusion when the person is severely suffering from a health issue and it has been explicitly mentioned that the circuitry is affected by weather. Krishnamurthy [6] had achieved in obtaining the GPS coordinates dynamically and updating the same every 30secs and it will be sent to the emergency helper numbers. Even if the women are safe, the device will be active state and conveys a false message to the registered helper which may lead to waste of time etc. and this whole thing fails if the device goes into aero plane mode or into a network less area.
Prashanth [7] developed an application with particular features for security and authentication purpose. The person will get access to it only if he is authenticated, he can use the app. Even though, it is a security application providing their credentials and authenticating will be tough at a distress situation. Mehta [8] built a device which upon shaking the device gets activated and the location is sent to register emergency contacts. The major flaw in this system is that it may lead to confusion when mobile trembles accidently. Verma [9] developed a device for tracking the pulse rate and the temperature of the body. If the sensor reading is in abnormal state, then it automatically sends a location police station. To protect themselves the person must press a buzzer and the location is sent to their contacts. The fact to be noted in the paper is only the people who are close to the victim can help the affected person.
Dandamudi [10] developed a CNN based system aerial image processing which classifies if the women are in distress or not and creates an alert message. The main disadvantage of the system this is very difficult to be employed in everyday life and it may lead to very costly livelihood. Ravisankar [11] built an Android based security and tracking system for children which involves having a mobile phone and an app has been developed to send messages and email to the helper but it is not possible to have mobile phone in every situation. Mohan [12] had developed a wearable gadget which track the location and sends to the helper but it has no other feature and the feature of instant recovery has not been planned. [13] and [14] gives a general idea on what women are facing these days and how the problem can be solved using IoT and provides a wide range of ideas and facts on the problem and an IoT solution for the same.
3 Hardware Components
The device is designed in a way that, when the button is pressed by the user, it would track the location where the system is located and would also capture the face of the person, who is assaulting detects their gender, save it as a video and is uploaded to GDrive. The location tracked is been sent to the user’s family/friends through telegram and Gmail. When the receiver wants to get location again after sometimes, he/she can send a specific keyword, so that the device can track the new location and send it again. The main hardware components used here are Raspberry Pi a GPS module, a camera module [15, 16].
3.1 Raspberry Pi and GPS Module
Raspberry Pi is a device which is like a mini computer with high computational capability. The main reason we need to use raspberry pi is because of the high computational need when using programs for face detection, gender detection and so on. The Python 3 programming language is used to code the program for this project. The GPS module is a module which uses Global Positioning Satellite to get the location of the device and sends many data such as the latitude, the longitude, timestamp of the satellite and few more data of the location where the device is present. In this project we require only latitude and longitude coordinates of the device, which is depicted in Figs. 1 and 2.
3.2 Camera Module and 555 Timer Based Buzzer System
The camera module is a module which is used to attach an external camera to the device. In this project the camera module is attached to raspberry pi and is placed in a location such that the camera is hidden and can capture the face of the assaulter. The camera module is used to get the face of the assaulter. This helps the victim to alert for help from nearby people is designed. This circuit consists of set and reset buttons, in which once the reset button is pressed the circuit becomes inactive, then once the set button is pressed, it becomes active by ringing the buzzer. The camera module and timer circuit are represented in Figs. 3 and 4.
3.3 Shock Circuit
This is for the self-defense of the victim before the help arrives which is very much necessary for the victim to survive. This circuit consists of a push button which once pressed, makes contact with the battery, thus charging the circuit. Once the shock circuit is done, it gets discharged and once again the button needs to be pressed to generate shock. In the circuit shown below, the circuit becomes complex if implemented on breadboard so we have soldered it together as shown in Fig. 5.
4 Software Algorithm
The main program of this project involves many fractions, in which each function performs a specific task. These specific tasks are: Location detector, Sending the location through telegram and mail, getting image from camera and detecting the face from it and saving it, detecting gender from the image saved, Uploading the continuously saved image as video to the cloud, Multitasking/multithreading to perform two tasks separately at the same time. The two tasks are: Finding and sending location, detecting face and saving it in cloud.
4.1 Location Detector
Serial, time, string, pynmea2 are the functions imported for this program into the raspberry pi. “Serial”. The location tracking is started with the code “dataout = pynmea2. NMEAStreamReader” And the data is uploaded with the code “newmsg = pynmea2. “
4.2 Sending Message
The message is sent through both mail and telegram. The message should contain “https://www.google.com/maps/#latitude,#longitude,14z”, where latitude and longitude coordinates are entered in place of #latitude# and #longitude. “Send_message.”.#text# is the message which is send.
4.3 Detecting Face
For detecting the face, OpenCV is mainly imported. Numpy is also imported for the program. The file “haarcascade_frontalface_default.xml” is downloaded and is imported to this program. With the function “cap = cv2.Video Capture (0)” The camera module is accessed and the image is captured. The image is converted into grayscale with the code “gray = cv2.cvtColor(img, cv2.COLOR_BGR2GRAY)”. The image is converted into grayscale so that the face can be detected easily than having colored images. With the function “faceCascade.detectMultiScale()”, the presence of face is detected and its coordinates in the image is marked and is saved as a video.
4.4 Saving in Cloud
Creating a backup storage forum in Google Drive, Cloud or Database for the image detected and video captured, in order to show evidence. One of the main aspects of this project comes down to providing evidence of the attacker’s presence or actions. For this purpose, the video captured and face detected by the Raspberry Pi, has to be stored in a safe place like a Database, Cloud or Google Drive. This can be accessed later by uploading the video and image directly to Google Drive using Python. The essentials for this are: Creating an OAuth Client ID and Secret Key along with an authorized URI using one’s google account, storing the key in the same directory as the python program, installing Pydrive package for connection to Google Drive.
4.5 Multitasking/Multithreading
When each task is within the same program and is done at the same time, then this type of multitasking is called multithreading. #FunctionName# is the name of the function which is processed separately aside from main program. Note that the main program is also a separate process which is independent of the newly created thread.
5 Experimental Results
When the push button is pressed the entire program gets implemented. When the program runs, the GPS/GSM will work simultaneously to gather the location and a google map link will be sent to the mail of the contacts registered by the user. If the helper doesn’t have a Gmail account to receive mail, the same can be obtained by the Telegram bot that we have built. The results are shown in Figs. 6, 7, 8, and 9.
6 Conclusion
Our women safety system aims to supply maximum support to the victim in the panic situation. Our shock gun system will help the victim in serving until the help arrives. The GPS system helps in sharing the location coordinates which makes up the main aim of this project. Unlike other similar works, we derive the GPS coordinates and display it on google maps. Buzzer system, camera model with drive backup are handy add ones to our project. With the technology growing every day there is a lot of future scope for this project to even reduce the time gap for the help to come. The implementation of individual circuits is big, because of which encapsulation of the entire circuit and making them into one small sized circuit is tedious. The programming is multi-fold and complex because of the usage of multiple concepts which needed different syntaxes. Unpredictable weather conditions might affect the circuitry. The Shock Circuit has a disadvantage that the law doesn’t legally allow its output voltage and licensing for a Stun Gun. In future work, with the help of VLSI technology, the circuits can be made much smaller and easily portable as a wearable device. Even though this project offers a good mechanism for safety and self-defense, the moral compass of the assaulter cannot be predicted. There are many possible situations of behavior of an assaulter, which must be taken in consideration for further development and to ensure 100% security. Further, this can also lead to creation of an interactive application on the mobile phone which will send help from the nearest police station to the women in trouble.
References
Bhardwaj N, Aggarwal N (2014) Design and development of – suraksha. IEEE Int J Inf Comput Technol 4. ISSN 0974–2239
Viswanath N, Pakyala NV, Muneeswari G (2016) Smart foot device for women safety. In: IEEE Conference. ISBN: 978-1-5090-0931-2
Monisha DG, Monisha M, Pavithra G, Subhashini R (2016) Women safety device and application – FEMME. Indian J Sci Technol. ISSN: 0974–5645
Priya NLV, Sai KB, Naveen PB, Manaswini GJ, Krishna DSR, Krishna BSG (2018) Self defense system for women safety with location tracking and SMS alerting through GPS & GSM networks. World Wide J Multidisc Res Dev. E-ISSN: 2454–6615
Rasool SM, Fatima SB, Farooqi SA, Hassan SS, Saber S (2020) Location tracking based women safety system with electric shock. IEEE Int J Inf Comput Technol. ISSN: 0950–0707
Krishnamurthy V, Saranya S, Srikanth S, Modi S (2017) M-WPS: mobile based women protection system. In: IEEE international conference on energy, communication, data analytics and soft computing. ISBN: 978-1-5386-1887-5
Prashanth DS, Patel G, Bharathi B (2018) Research and development of a mobile based women safety application with real- time database and data-stream network. In: IEEE international conference on ciruits power and computing technologies. ISBN 978-1-5090-4967-7,
Mehta S, Janawade S, Kittur V, Munnole S, Basannavar S (2017) An android based application or women safety. Int J Eng Sci Comput
Vemia PK, Sharma A, Varshney D, Zadoo M (2018) Women safety device with GPS, GSM and health monitoring system
Dandamudi AGB, Vasumithra G, Praveen G, Giriraja CV (2020) CNN based aerial image processing model for women security and smart surveillance. In: Paper presented at the proceedings of the 3rd international conference on smart systems and inventive technology, ICSSIT 2020, pp 1009–1017. https://doi.org/10.1109/ICSSIT48917.2020.9214143
Ravisankar K, Vanitha V (2018) Android-based security and tracking system for school children. https://doi.org/10.1007/978-981-10-8228-3_50
Mohan R, Raj CV, Aswathi P, Bhavani RR (2018) UAV based security system for prevention of harassment against woman. In: 2017 International conference on intelligent computing, instrumentation and control technologies, ICICICT 2017
Hemasagar K, Kumar RM, Manojna VS, Priya BK (2020) Ingenious bracelet for women safety and security using IoT. In: Sixth international conference on emerging research in computing, information, communication and applications, ERCICA 2020. Nitte Meenakshi Institute of Technology, Bangalore
Bavya MP, Raghunandan MV (2018) A study on problems faced by working women of BPO sector in Mysuru. Int J Mech Eng Technol 9(1):399–406
Venkatesh K, Parthiban S, Kumar PS, Kumar CV (2021) IoT based Unified approach for Women safety alert using GSM. In: 2021 third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE, pp 388–392
Tejesh BSS, Mohan Y, Kumar CA, Paul TP, Rishitha RS, Durga BP (2020) A smart women protection system using internet of things and open source technology. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE, pp 1–4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sankar, S.S., Sandeep, V., Viswesh, K.S., Vigneshwar, S., Rajesh, C.B. (2022). Design of an Efficient Mobile Communication and an Armament System for Women Safety. In: Majhi, S., Prado, R.P.d., Dasanapura Nanjundaiah, C. (eds) Distributed Computing and Optimization Techniques. Lecture Notes in Electrical Engineering, vol 903. Springer, Singapore. https://doi.org/10.1007/978-981-19-2281-7_30
Download citation
DOI: https://doi.org/10.1007/978-981-19-2281-7_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2280-0
Online ISBN: 978-981-19-2281-7
eBook Packages: Computer ScienceComputer Science (R0)