Camguard: Preventing unauthorised camera access for women’s saftey

Saranya, S. and K., Priyadharsan and K., Yadavamuthiah and Li, G. and Subramaniam, U. and Sekar, M. (2024) Camguard: Preventing unauthorised camera access for women’s saftey. E3S Web of Conferences, 491. 02013. ISSN 2267-1242

[thumbnail of Camguard_Preventing_unauthorised_camera_access_for.pdf] Archive
Camguard_Preventing_unauthorised_camera_access_for.pdf

Download (1MB)

Abstract

Camguard: Preventing unauthorised camera access for women’s saftey S. Saranya Priyadharsan K. Yadavamuthiah K. G. Li U. Subramaniam M. Sekar

Online harassment is a serious problem that can have significant negative impacts on the mental health and well-being of its victims. To address this issue, an Android app has been developed that is accessible to a wide range of users worldwide. The app is built on a script backend process, providing a stable and efficient environment for data management and request processing. The app's API is integrated into the script backend process, ensuring seamless and efficient operation.During the installation process, the app requires users to go through a verification process that includes providing their Google Account, mobile number, and an OTP. This ensures that only legitimate users have access to the app's features and functions. The app also requires users to create a strong master password, which is directly connected to the Google bot, enhancing its security. Biometrics are recommended to protect the master password, ensuring that only authorized users can access their data.The app's security measures are crucial in ensuring the privacy and protection of user data. The use of biometrics and direct connection to the Google bot enhances security, and the app's API provides access to relevant information and enhances the user experience. Users can change their password securely, ensuring that only authorized users can access their data.Overall, the app is a reliable and efficient solution for managing and protecting user data. Its compatibility with a wide range of devices and seamless integration of API make it accessible to a large percentage of Android users worldwide. The app's verification process, use of biometrics, and direct connection to the Google bot enhance its security, ensuring that only authorized users have access to the app's functionalities. The development of this app is a critical step in addressing the issue of online harassment and protecting the privacy and well-being of its users.
02 21 2024 2024 02013 e3sconf_icecs2024_02013 https://creativecommons.org/licenses/by/4.0/ 10.1051/e3sconf/202449102013 https://www.e3s-conferences.org/10.1051/e3sconf/202449102013 https://www.e3s-conferences.org/10.1051/e3sconf/202449102013/pdf IEEE Transactions on Mobile Computing Sharma 20 3 1234 2021 Garcia G., Smith E., and Chen J., “Gender Bias in Online Assessments: Understanding the Challenges Faced by Women,” in Proceedings of the 2022 IEEE International Conference on Human-Computer Interaction (HCI), New York, NY, USA, 2022, pp. 123-128. IEEE Consumer Electronics Magazine Patel 8 2 78 2021 IEEE Access Singh 9 56789 2021 IEEE Internet of Things Journal Kumar 8 5 4099 2021 IEEE Transactions on Dependable and Secure Computing Gupta 18 1 230 2022 IEEE Transactions on Information Forensics and Security Mishra 17 4 876 2022 IEEE Sensors Journal Sharma 22 3 1234 2023 IEEE Transactions on Emerging Topics in Computing Jain 11 2 345 2023 IEEE Transactions on Cloud Computing Verma 10 1 123 2023 IEEE Transactions on Pattern Analysis and Machine Intelligence Gupta 45 7 1890 2023 Kumar S. and Singh R., “A Survey on Privacy Concerns in Women Safety Applications on Mobiles,” in IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 1456-1479, Second Quarter 2023. IEEE Transactions on Mobile Computing Sharma 22 3 567 2023 IEEE Transactions on Intelligent Transportation Systems Patel 24 5 1234 2023 Singh S. and Sharma K., “A Blockchain-Based Framework for Ensuring Data Integrity in Women Safety Applications,” in IEEE Transactions on Dependable and Secure Computing, vol. 20

Item Type: Article
Subjects: Computer Science Engineering > Optimization Techniques
Divisions: Computer Science Engineering
Depositing User: Mr IR Admin
Date Deposited: 05 Oct 2024 05:00
Last Modified: 05 Oct 2024 05:00
URI: https://ir.vistas.ac.in/id/eprint/8634

Actions (login required)

View Item
View Item