Skip to main content

Preventing and Detecting Molestation using Twitter

Crime on women has been increasing on an alarming rate especially cases of Molestation.We tried to do something that can actually make people aware about where they are and know about their surroundings. So, we took one of the most popular social media platforms i.e. Twitter to extract tweets regarding molestation. Domain – India


The main purpose was to extract locations (location of incidence) out of the tweets that we collected and flag those locations into 3 categories.

       Most Prone to Molestation: More than 800 cases per year.

         Relatively Less Prone but quite a few incidents have been reported.

        Relatively very safe - Very few or no incidents have been reported

Methodology :

1) Extracted more than 10K Tweets using HashTags.

#sexualabuse , etc

Challenge : Most of the tweets are not geo tagged .

We came up with a solution. We tried to explore the metadata of the tweets i.e. when
people use hashtags of in the tweet they sometimes mention the location like


We did some pre-processing on the tweet text and the metadata to extract locations
out of it. The preprocessed text which are supposed to be locations are passed to geocoderAPI and we got the latitude and longitude. Still Our Problem Is not Solved. This technique returned 1/5th of the tweets with locations in it. Hmmmm……..

Since most of the tweets contain images, news cutting etc. We used the technique OCR(Optical Character Recognition) for extracting text out of those images and extracting locations out of it.
Image is given Below 

The red circles indicate the locations. We got news clippings from the timeline of police handles and news handles in twitter.
Additionally we used web scraping on the news website to extract locations of certain incidents.We also used a google add on – > Twitter Archiver to actually extract tweets based on our hashtags and filtered location.

And here we are ---------------------------------

The 30 Km Radius shows around you , the place is quite unsafe. You can drag the purple marker to any place you want , and you can see whether you are
safe within the 30 Km radius.

Purple Marker denotes your current location .....

Improvements : Accuracy is low.  Many locations we retrieved suggests certain incidents did not occur at that place.  So to check manually all the posts is impossible . So we need to automate this thing.

Secondly , one thing that can be extended in this. If we can get street level data  precisely , we can provide an alternative walking/driving route to the user given the crime rate of a location. 

Thirdly, if we can find the time of the day when these incidents are occurring then it becomes more effective. 

Poster :

Us :  


Ritaban Basu
Mayur Shingote
Saquib Mohd
Ronak Kumar


Images : -- google.


Popular posts from this blog

White or Blue, the Whale gets its Vengeance: A Social Media Analysis of the Blue Whale Challenge

The Blue Whale Challenge - a set of tasks that must be completed in a duration of 50 days - is an online social media rage. The tasks of the “game” cause both physical and mental harm to the players; the final task is to take his/her own life. The tasks include waking up at odd hours, listening to psychedelic music, watching scary videos, inflicting cuts and wounds on their bodies and the final task is to commit suicide. The game is supposedly administered by people called “curators” who incite others to take the challenge, brainwash them to cause self harm and ultimately commit suicide. Most conversations between curators and players are suspected to take place via direct message but, in order to find curators, the players need a public platform where they can express their desire to play the game - knowingly or unknowingly. Online social media serves as this platform as people post about not just their desire to be a part of the game but also details and pictures of the various task…

Identifying Tinder Profiles on Facebook

Identifying Tinder Profiles on Facebook
In the online world, everything that you ever put is linked and connected. You might think that you’ve put some information on one platform and that’s it, you’re good to go. But you, my friend, are sadly mistaken. With this thought in mind and the privacy concerns linked with Online Social Media, we would like to introduce you to our problem statement: Identifying Facebook Profiles from Tinder Profiles. Given a tinder profile, our aim is to identify the corresponding Facebook profile of that person. We are addressing the linkability issue here and trying to highlight how more information than what you’ve mentioned on Tinder can be picked up from your Facebook profile. For those who don’t know, Tinder is a Dating Platform available for a Mobile Application and a Web App. It shows the geographically close profiles around you and you have an option to right swipe(Like) or left swipe(Dislike) them. When two people right swipe each other then it’s a m…

Privacy Concerns on Tinder

Mobile dating apps have become a popular means to meet potential partners. Mobile dating application such as Tinder have exploded in popularity in recent years. Most users on Tinder use/have used Facebook as their primary way to sign up. By doing this, Tinder automatically takes user information directly from Facebook, thus saving the need to authenticate the user and user details.  In this project we aim to identify a Tinder profile on Facebook using the information that tinder obtains from Facebook. Below is the information that Tinder takes from a user when they log in for the first time.