Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Simple Face-based Mobile Security System Design for Android Phone Protection

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Alabi A. A., Ogundoyin I. K.

Alabi A A. and Ogundoyin I K.. A Simple Face-based Mobile Security System Design for Android Phone Protection. International Journal of Computer Applications 161(11):17-23, March 2017. BibTeX

	author = {Alabi A. A. and Ogundoyin I. K.},
	title = {A Simple Face-based Mobile Security System Design for Android Phone Protection},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {11},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {17-23},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2017913233},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The advent and use of mobile phones have added a lot to the world’s social lives as technology keeps evolving on a daily basis but also face a bit of challenges such as info theft, misrepresentation, impersonation etc. with a view to causing mayhem; a scenario that calls for a more secured mode of phone access for protection sake. A unit of functionality provided by the system was demonstrated with the aid of a Use-Case diagram and the procedural flow of control between the various class objects involved was illustrated using the Activity diagram. The code was written in JAVA on a platform called “Android Visual Studio” and the required tools and Texts were built with the aid of the Android In-built Controls; which generate their own codes when utilized thus providing the needed field for entering E-mail and some other required parameters. The design was made in such a way that security info was sent to a designated Email for necessary action whenever an illegal attempt is noticed on the mobile phone. The expected intruder’s face captured and the registered phone location due to the provision of incorrect security codes (while attempting to log in on the phone) were sent to the phone’s rightful owner inform of alert via a preset Email. This research guaranteed privacy in addition to exposing intruders no matter their motives. It also educates the masses with the basic knowledge of privacy, protection from unauthorized access and the core importance of mobile phones security.


  1. A. Elfasakhany, J. Hernandez, C. Garcia, M. Reyes and F. Martell, “Design And Implementation Of A House-Mobile Security System”, Scientific Research. http:// (2011).
  2. C. Franklin, “6 Top Programming Languages ForMobile Development”, InformationWeek, Interop.Las Vegas, (2015).
  3. C. Franklin, “9 Java Programming Myths Busted”InformationWeek, Interop, Las Vegas, (2016).
  4. Brewis. “How To Secure Android: 14 Tips For Securing Your Android Phone or Tablet”,, (2016).
  5. L. Peruso, K. Michael and M. Michael , “Location-Based Services and The Privacy-SecuritymDichotomy”, School of Information Technology and computer Science Faulty of Informatics,University of Wollongong, Northfields Avenue,Wollongong, NSW, 2500, Australia, 2006).
  6. G. Anjaneyulu, M. Gayathri and G. Gopinath, “Analysis of Advanced Issues In Mobile Security In Android Operating Systems “Archives Of Applied Science Research 7(2), India, (2015).
  7. G. David, “Research Reveals That Android is Least Secure Mobile Phone Operating System”,, (2012).
  8. J. Bangali and A. Shaligram, “Design and Implementation of Security Systems For Smart Home Based On GSM Technology” International Journal Of Smart Home. Vol 7, No, 6, (2013).
  9. N. Carey, “A Window Into Mobile Device Security”, Symantec Security Response, USA, (2011).
  10. M. Ontang, S. McLaughlin, W. Enck and P.McDaniel, “Semantically Rich Application-Centric Security In Android” Security and Communication Network, Volume 5, Issue 6 Pages 658-678, (2012).
  11. S. Heuser, W. Enck, A. Nadkami and A. Sadeghi,“ASM: A Programmable Interface For Extending Android Security”, In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA , USA, (2014).
  12. W. Yang, X. Xiao, B. Andow, S. Li, T. Xin and W Enck, “AppContext: Differentiating Malicious and Benign Mobile App Behaviours Using Contex”, International Conference on Software Engineering, Austin, TX, (2015)
  13. A. Nadkarni, B. Andow, W. Enck and S. Jha, “Practical DIFC Enforcement on Android”, In Proceeding of the 25th USENIX Symposium, Austin, TX, USA, (2016)
  14. F. Ben and E. Kathering, “The Right Of Privacy In Florida In The Of Technology And The Twenty-First Century: ANeed For Protection From Private And Commercial Intrusion”, Florida State University Law Review. Vol. 25:25, (1997).
  15. A. Alabi, “A Modified Principal ComponentAnalysis Technique For Recognizing African Bust” The International Journal Of Engineering And Science, Volume (2), Issue (9), Pages (116-129) SSN (e): 2319 – 1813ISSN (p): 2319 –1805 , (2013)


Security, Face, Mobile Applications, Android Phones, Java Programming