Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Authentication System for Android Smartphones

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 5
Year of Publication: 2014
Swapnil Waghmare
Madhumita Chatterjee
Satish L. Varma

Swapnil Waghmare, Madhumita Chatterjee and Satish L Varma. Article: Authentication System for Android Smartphones. International Journal of Computer Applications 87(5):19-24, February 2014. Full text available. BibTeX

	author = {Swapnil Waghmare and Madhumita Chatterjee and Satish L. Varma},
	title = {Article: Authentication System for Android Smartphones},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {5},
	pages = {19-24},
	month = {February},
	note = {Full text available}


The dawn of the personal computer era gave birth to a new type of criminal, the hacker. Today there is a new even more attractive target for hackers to exploit, the Android smartphones. These devices allow us to use internet, camera, GPS tracking, and more features. Smartphones also contain detailed records of our contacts and SMS. The hacker then uses these records for committing identity theft. Hence to provide security to Android smartphone we have developed a circular screen locking application. This application provides various features like unlock phone using random number, taking system backup via email, receive notification of SIM change via message, track incoming calls and messages when our smartphone is lost or stolen. This helps user to know who is calling and sending messages on their device. Hence this application satisfies the need of today's users & applications.


  • Kwang Il Shin, Ji Soo Park, Jae Yong Lee, Jong Hyuk Park "Design and Implementation of Improved Authentication System for Android Smartphone Users",26th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2012.
  • Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa "How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms",IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012.
  • Takayuki Matsudo, Eiichiro Kodama, Jiahong Wang, and Toyoo Takata "A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS",15th IEEE International Conference on Network-Based Information Systems (NBiS), 2012.
  • Te-en wei, Albert b. Jeng, Hahn-ming lee, Chih-how chen, Chin-wei tien"Android privacy",IEEE International Conference on Machine Learning and Cybernetics (ICMLC), 2012.
  • Yi Guo, Lei Yang, Xuan Ding, Jinsong Han, Yunhao Liu "OpenSesame: Unlocking Smart Phone through Handshaking Biometrics",IEEE INFOCOM 2013
  • Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song" Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication",IEEE Transaction On Information Forensics and Security, Vol. 8, No. 1, January 2013.
  • Ananda Kanagaraj S, Arjun G, Shahina A "Cheeka : A mobile application for personal safety",9th IEEE International Conference On Collaborative Computing : Networking, Applications and Worksharing 2013.