IJWMT Vol. 15, No. 2, 8 Apr. 2025
Cover page and Table of Contents: PDF (size: 726KB)
PDF (726KB), PP.26-40
Views: 0 Downloads: 0
Android Smartphones, Security Software, Facial Recognition, Android File Security
The use of Android devices has increased rapidly in recent years, increasing the chance of hacking and crime. Hackers target smartphones for various purposes, including getting sensitive information, financial fraud, identity theft, and other crimes. As a result, Android users must be aware of these possible dangers and take necessary measures to secure their smartphones. Because smartphones are the primary repository of personal sensitive information, smartphone designers must include security measures and encourage users to install freely available security software. Most studies have evaluated facial recognition as the most secure feature. This paper shows the uses of a facial recognition application to protect user files that contain sensitive information. The application uses machine-learning algorithms, specifically a Convolutional Neural Network (CNN) for face recognition that detects the user's face, tries to access the file, compares it with the basic image in the local file, and gives the result of whether to open the file or reject depending on the compared image. The application addresses critical concerns and improves file privacy features on Android devices, ensuring user file safety, and achieving success with 99% accuracy. It can also distinguish the faces of women wearing a shawl and people wearing glasses.
Marah Radi Hawa, Amani Yousef Owda, Majdi Owda, "Android Mobile Security and File Protection Using Face Recognition", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.2, pp. 26-40, 2025. DOI:10.5815/ijwmt.2025.02.03
[1]R. Stoleriu and M. Togan, “A Secure Screen and App Lock System for Android Smart Phones Using Face Recognition,” 2020 13th International Conference on Communications, COMM 2020 - Proceedings, pp. 133–138, Jun. 2020, doi: 10.1109/COMM48946.2020.9142008.
[2]“The Evolution of Smartphone Security.” Accessed: Aug. 01, 2024. [Online]. Available: https://alltopstartups.com/2017/06/20/the-evolution-of-smartphone-security/
[3]M. R. Srilekha and M. D. Jayakumar, “A Secure Screen Lock System for Android Smart Phones using Accelerometer Sensor,” IJSTE-International Journal of Science Technology & Engineering, vol. 1, no. 10, 2015, Accessed: Aug. 01, 2024. [Online]. Available: www.ijste.org
[4]“Android Statistics 2024 - By Market Share, Users and Revenue.” Accessed: Aug. 01, 2024. [Online]. Available: https://www.enterpriseappstoday.com/stats/android-statistics.html
[5]M. Ali Shah, A. Khan, M. Ahmed, and S. Arshad, “Android Malware Detection & Protection: A Survey,” Article in International Journal of Advanced Computer Science and Applications, vol. 7, no. 2, 2016, doi: 10.14569/IJACSA.2016.070262.
[6]V. Venkateswara Rao and A. S. N. Chakravarthy, “Analysis and bypassing of pattern lock in an android smartphone,” 2016 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2016, May 2017, doi: 10.1109/ICCIC.2016.7919555.
[7]T. Saad Mohamed and T. Saad Mohamed Lecturer, “Security of Multifactor Authentication Model to Improve Authentication Systems Information and Knowledge Management Security of Multifactor Authentication Model to Improve Authentication Systems,” vol. 4, no. 6, 2014, doi: 10.13140/RG.2.2.18515.53288.
[8]S. K. Datta, C. Bonnet, and N. Nikaein, “Android power management: Current and future trends,” 2012 the 1st IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things, ETSIoT 2012, pp. 48–53, 2012, doi: 10.1109/ETSIOT.2012.6311253.
[9]M. Shah, J. D. Deng, and B. J. Woodford, “Video background modeling: Recent approaches, issues, and our proposed techniques,” Mach Vis Appl, vol. 25, no. 5, pp. 1105–1119, Nov. 2014, doi: 10.1007/S00138-013-0552-7/METRICS.
[10]D. Van Bruggen, S. Liu, M. Kajzer, A. Striegel, C. R. Crowell, and J. D’Arcy, “Modifying smartphone user locking behavior,” SOUPS 2013 - Proceedings of the 9th Symposium on Usable Privacy and Security, 2013, doi: 10.1145/2501604.2501614.
[11]D. Hintze et al., “CORMORANT,” Proc ACM Interact Mob Wearable Ubiquitous Technol, vol. 3, no. 3, pp. 1–23, Sep. 2019, doi: 10.1145/3351243.
[12]A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, “The phone lock: Audio and haptic shoulder-surfing resistant pin entry methods for mobile devices,” Proceedings of the 5th International Conference on Tangible Embedded and Embodied Interaction, TEI’11, pp. 197–200, 2011, doi: 10.1145/1935701.1935740.
[13]“How to Protect Your Privacy on Android.” Accessed: Aug. 02, 2024. [Online]. Available: https://spreadprivacy.com/android-privacy-tips/
[14]D. Huang, C. Shan, M. Ardabilian, Y. Wang, & L. Chen, “Local Binary Patterns and Its Application to Facial Image Analysis: A Survey”. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 4, issue 6, pp.765–78. Accessed: Aug. 02, 2024. [Online]. Available: https://sci-hub.ru/10.1109/TSMCC.2011.2118750
[15]X. Chao, G. Dave, and K. Sriadibhatla, “Face Recognition in Mobile Phones”, Accessed: Aug. 02, 2024. [Online]. Available: https://www.researchgate.net/publication/228445783
[16]E. Vazquez-Fernandez, H. Garcia-Pardo, D. Gonzalez-Jimenez, and L. Perez-Freire, “Built-in face recognition for smart photo sharing in mobile devices,” Proc (IEEE Int Conf Multimed Expo), 2011, doi: 10.1109/ICME.2011.6012057.
[17]O. Dospinescu and I. Popa, “Face Detection and Face Recognition in Android Mobile Applications”, doi: 10.12948/issn14531305/20.1.2016.02.
[18]S. Chaudhry and R. Chandra, “Design of a Mobile Face Recognition System for Visually Impaired Persons,” Feb. 2015, Accessed: Aug. 02, 2024. [Online]. Available: https://arxiv.org/abs/1502.00756v2
[19]A. Salihbašic and T. Orehovacki, “Development of an android application for gender, age and face recognition using OpenCV,” 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2019 - Proceedings, pp. 1635–1640, May 2019, doi: 10.23919/MIPRO.2019.8756700.
[20]M. Harbach, A. De Luca, and S. Egelman, “The anatomy of smartphone unlocking a field study of android lock screens,” Conference on Human Factors in Computing Systems - Proceedings, pp. 4806–4817, May 2016, doi: 10.1145/2858036.2858267.
[21]A. L. A. Ramos, M. A. M. Anasao, D. B. Mercado, J. A. Villanueva, C. J. A. Ramos, A. A. T. Lara, &C. N. A. Margelino, “F-Locker: An Android Face Recognition Applocker Using Local Binary Pattern Histogram Algorithm”. International Journal of Computer Science and Information Security (IJCSIS), vol. 16, issue 2. pp. 129-135, 2018.
[22]X. Tan and B. Triggs, “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” IEEE Transactions on Image Processing, vol. 19, no. 6, pp. 1635–1650, Jun. 2010, doi: 10.1109/TIP.2010.2042645.
[23]R. Sutoyo, J. Harefa, Alexander, and A. Chowanda, “Unlock Screen Application Design Using Face Expression on Android Smartphone,” MATEC Web of Conferences, vol. 54, p. 05001, Apr. 2016, doi: 10.1051/MATECCONF/20165405001.
[24] “File Manager Plus.” Accessed: Aug. 02, 2024. [Online]. Available: https://www.alphainventor.com/file-manager-plus
[25]“Applock with Face – Apps on Google Play.” Accessed: Aug. 02, 2024. [Online]. Available: https://play.google.com/store/apps/details?id=com.sm.faceapplock
[26]“SuperX AppLock with Face ID – Apps on Google Play.” Accessed: Aug. 02, 2024. [Online]. Available: https://play.google.com/store/apps/details?id=com.gmcnt2.superlockapp
[27] “Smart Lock (App/Photo) – Apps on Google Play.” Accessed: Aug. 02, 2024. [Online]. Available: https://play.google.com/store/apps/details?id=ukzzang.android.app.protectorlite
[28]“[2212.13038] A Survey of Face Recognition.” Accessed: Nov. 07, 2024. [Online]. Available: https://ar5iv.labs.arxiv.org/html/2212.13038
[29]I. Adjabi, A. Ouahabi, A. Benzaoui, and A. Taleb-Ahmed, “Past, Present, and Future of Face Recognition: A Review,” Electronics 2020, Vol. 9, Page 1188, vol. 9, no. 8, p. 1188, Jul. 2020, doi: 10.3390/ELECTRONICS9081188.
[30]M. Wang, W. D.- Neurocomputing, and undefined 2021, “Deep face recognition: A survey,” ElsevierM Wang, W DengNeurocomputing, 2021•Elsevier, Accessed: Nov. 07, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0925231220316945
[31]K. He, X. Zhang, S. Ren, J. S.-P. of the IEEE, and undefined 2016, “Deep residual learning for image recognition,” openaccess.thecvf.comK He, X Zhang, S Ren, J SunProceedings of the IEEE conference on computer vision and, 2016•openaccess.thecvf.com, Accessed: Nov. 07, 2024. [Online]. Available: http://openaccess.thecvf.com/content_cvpr_2016/html/He_Deep_Residual_Learning_CVPR_2016_paper.html
[32]Y. Liu, J. Stehouwer, A. Jourabloo, and X. Liu, “Deep tree learning for zero-shot face anti-spoofing,” Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2019-June, pp. 4675–4684, Jun. 2019, doi: 10.1109/CVPR.2019.00481.0.
[33]N. Sharma and I. Ghosal, “How Machine Learning Algorithms Work in Face Recognition System? A Review and Comparative Study,” International Journal for Innovative Engineering & Management Research, vol. 12, issue. 3, pp. 250-262, 2023. [Online]. Available: https://papers.ssrn.com/abstract=4397531
[34]S. Lawrence, C. L. Giles, A. C. Tsoi, and A. D. Back, “Face recognition: A convolutional neural-network approach,” IEEE Trans Neural Netw, vol. 8, no. 1, pp. 98–113, 1997, doi: 10.1109/72.554195.