Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2023

01-12-2023

Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

Author: N. N. Shenets

Published in: Automatic Control and Computer Sciences | Issue 8/2023

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor authentication, secret sharing, visual cryptography, and steganography; and it also uses the built-in security features of the operating system. It ensures the confidentiality of personal data even if both the mobile device and the related remote storage (server) are compromised.
Literature
7.
go back to reference Shenets, N.N., On information level of modular circuits of sharing a secret, Dokl. Nats. Akad. Nauk Belarusi, 2010, vol. 54, no. 6, pp. 9–12.MathSciNet Shenets, N.N., On information level of modular circuits of sharing a secret, Dokl. Nats. Akad. Nauk Belarusi, 2010, vol. 54, no. 6, pp. 9–12.MathSciNet
10.
go back to reference Nimmy, K. and Sethumadhavan, M., Novel mutual authentication protocol for cloud computing using secret sharing and steganography, The Fifth Int. Conf. on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Chennai, India, 2014, IEEE, 2014, pp. 101–106. https://doi.org/10.1109/icadiwt.2014.6814685 Nimmy, K. and Sethumadhavan, M., Novel mutual authentication protocol for cloud computing using secret sharing and steganography, The Fifth Int. Conf. on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Chennai, India, 2014, IEEE, 2014, pp. 101–106. https://​doi.​org/​10.​1109/​icadiwt.​2014.​6814685
11.
go back to reference Mavlonov, O.N., Yusupov, R.Z., and Turdibekov, B.B., Steganography: Methods for hiding data, Int. J. Contemp. Sci. Tech. Res., 2022, vol. 1, no. 2, pp. 56–58. doi https://zenodo.org/doi/10.5281/zenodo.7304213 Mavlonov, O.N., Yusupov, R.Z., and Turdibekov, B.B., Steganography: Methods for hiding data, Int. J. Contemp. Sci. Tech. Res., 2022, vol. 1, no. 2, pp. 56–58. doi https://​zenodo.​org/​doi/​10.​5281/​zenodo.​7304213
13.
go back to reference Nosrati, M., Karimi, R., and Hariri, M., An introduction to steganography methods, World Appl. Program., 2011, vol. 1, no. 3, pp. 191–195. Nosrati, M., Karimi, R., and Hariri, M., An introduction to steganography methods, World Appl. Program., 2011, vol. 1, no. 3, pp. 191–195.
17.
go back to reference Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, Wales, 2018, New York: Association for Computing Machinery, 2018, p. 7. https://doi.org/10.1145/3264437.3264476 Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, Wales, 2018, New York: Association for Computing Machinery, 2018, p. 7. https://​doi.​org/​10.​1145/​3264437.​3264476
18.
go back to reference Trusty TEE | Android Open Source Project. https://source.android.com/docs/security/features/trusty. Cited January 10, 2023. Trusty TEE | Android Open Source Project. https://​source.​android.​com/​docs/​security/​features/​trusty.​ Cited January 10, 2023.
19.
go back to reference KeyStore | Android Developers. https://developer.android.com/reference/java/security/KeyStore. Cited January 10, 2023. KeyStore | Android Developers. https://​developer.​android.​com/​reference/​java/​security/​KeyStore.​ Cited January 10, 2023.
20.
go back to reference Biometrics | Android Open Source Project. https://source.android.com/docs/security/features/biometric. Cited January 10, 2023. Biometrics | Android Open Source Project. https://​source.​android.​com/​docs/​security/​features/​biometric.​ Cited January 10, 2023.
Metadata
Title
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
Author
N. N. Shenets
Publication date
01-12-2023
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2023
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623080291

Other articles of this Issue 8/2023

Automatic Control and Computer Sciences 8/2023 Go to the issue