Back
 JIS  Vol.7 No.3 , April 2016
Camera and Voice Control Based Location Services and Information Security on Android
Abstract: Increasing popularity of Android is making its security issue more crucial nowadays. This paper focuses on one-stop solution to secure Android device against information security and theft. Proposed application protects Android device against theft and helps to control Android device by SMS or using internet connection. By this application once the user has configured the account for anti theft, user can remotely track, sound a loud siren, lock, secretly capture photo of an intruder who tries to break in, get randomly recorded voice of intruder, get thief identity using device web history and can able to wipe all your private data. This data and tracking information will be stored in one central web server database and one can access it anytime through login.
Cite this paper: Chouhan, J. , Singh, N. , Modi, P. , Jani, K. and Joshi, B. (2016) Camera and Voice Control Based Location Services and Information Security on Android. Journal of Information Security, 7, 195-205. doi: 10.4236/jis.2016.73015.
References

[1]   Victor, H. (2014) Android's Google Play Beats App Store with over 1 Million Apps, Now Officially Largest.
http://www.phonearena.com/news/Androids-Google-Play-beats-App-Store-with-over-1-million-apps-now-officially-largest_id45680

[2]   Llamas, R., et al. (2015) Smartphone OS Market Share, 2015 Q2. IDC Report August 2015.
http://www.idc.com/prodserv/smartphone-os-market-share.jsp

[3]   Warren, C. (2014) Android 4.1.1 Devices Are Vulnerable to Heartbleed.
http://mashable.com/2014/04/11/devices-running-Android-4-1-1-vulnerable-to-heartbleed/#_CIRNZ2wsgq

[4]   Chauhan, J.G. and Modi, P.S. (2015) A Novel Approach to Real Time Health Monitoring System. Journal of Multidisciplinary Research Studies, 1, 78-80.

[5]   Wu, L.F. and Du, X.J. (2014) Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones. IEEE Communications Magazine, 81, 80-87.
http://dx.doi.org/10.1109/mcom.2014.6766089

[6]   Park, J.-K. and Choi, S.-Y. (2015) Studying Security Weaknesses of Android System. International Journal of Security and Its Applications, 9, 7-12.
http://dx.doi.org/10.14257/ijsia.2015.9.3.02

[7]   Android (Operating System). Wikipedia.
https://en.wikipedia.org/wiki/Android_%28operating_system%29

[8]   XOLO Q2000L. (2012) XOLO—Premium Smartphones, Mobile Phones, Tablets [Online] Available from:
http://www.xolo.in/Q2000L

[9]   Cai, J.P., Wu, J.Z., Wu, M.H. and Huo, M.M. (2011) A Bluetooth Toy Car Control Realization by Android Equipment. Proceeding of International Conference on Transportation, Mechanical, and Eletrical Engneering (TMEE), 2429, 16-18.

 
 
Top