Skip to content
AppVault
en

FILE G2 / ANDROID PRIVACY GUIDE

How to Hide Photos on Android — Built-In Tools, OEM Features, and Vault Apps

Android offers more ways to hide photos than any other mobile OS. Samsung has Secure Folder. Xiaomi has a private gallery. OnePlus has a lockbox. Even stock Android has a built-in hide toggle. But these methods vary wildly in security, and most leave your hidden files accessible to anyone with physical access and five minutes of patience.

Cover illustration for: How to Hide Photos on Android — Built-In Tools, OEM Features, and Vault Apps
FILE COVER · / GUIDES / HOW-TO-HIDE-PHOTOS-ANDROID /

UPDATED · 2026-05-16 · REVIEWED BY APPVAULT

TL;DR

Android offers multiple ways to hide photos — built-in gallery hide, OEM secure folders, and third-party vault apps. Samsung Secure Folder is hardware-backed. Xiaomi and OnePlus use software-only encryption. Stock Android's hide toggle is trivial to reverse. Dedicated vault apps like AppVault provide the strongest protection through AES-256-GCM encryption and Secure Enclave key wrapping, but iOS-only at launch.

Android gives you at least five ways to hide photos, and they are not the same thing. One method is a cosmetic toggle that offers zero security. Another wraps your files in hardware-backed encryption that a forensic lab cannot break. Most users pick the first option they find and assume their pictures are safe. That assumption is often wrong.

This guide covers every method for hiding pictures on Android: the built-in gallery hide, OEM-specific features from Samsung, Xiaomi, OnePlus, and others, and third-party vault apps. Each method gets a clear security rating and a frank assessment of its weaknesses.

The Stock Android Hide Toggle — Convenient, Not Secure

Every Android phone ships with some form of hide feature in the default gallery app. On Google Pixel phones running stock Android, open the Photos app, select a photo, tap the three-dot menu, and choose “Move to Locked Folder.” On Samsung’s Gallery app, the path is three-dot menu, Settings, Hide albums.

These features do one thing: they remove photos from the default gallery view. They do not encrypt them.

The mechanism is a .nomedia file. Android’s MediaStore scanner skips any folder that contains a .nomedia file. The photos remain on disk in plain view. Any file manager that enables “Show hidden files” can browse directly to the folder and access every image.

Security rating: 1/10. Protects against a casual glance. Defeated by anyone who knows what a file manager is.

This method is fine for hiding a birthday gift photo from a family member who borrows your phone to make a call. It is not fine for anything you would not want a customs officer, a forensic tool, or a determined friend to see.

Samsung Secure Folder — The Gold Standard for OEM Solutions

Samsung’s Secure Folder is the most mature OEM photo-hiding feature on Android. It is built on Samsung Knox, a hardware-backed security platform that includes a physically isolated processor and dedicated memory.

Secure Folder creates an encrypted container on the device. Photos moved into Secure Folder are encrypted with AES-256. The encryption key is generated and stored inside the Knox hardware module. The main Android OS cannot read the container contents, even with root access.

To set it up: open Settings, tap Security and privacy, then Secure Folder. Authenticate with your Samsung account. You can use a separate PIN, pattern, or biometric that differs from your phone unlock method. Once inside, tap the plus icon to add photos from the gallery. You can also set the Secure Folder shortcut to be invisible from the app drawer.

Limitations. Secure Folder requires a Samsung account. The encryption key is recoverable through Samsung’s cloud if you forget your PIN — this is a convenience feature that creates a backdoor. A forensic examiner with Samsung’s cooperation could potentially recover the container. Secure Folder also does not protect against a compromised Samsung account.

Security rating: 8/10. Strong hardware-backed encryption. Weakened by cloud recovery and Samsung account dependency.

Xiaomi phones running MIUI or HyperOS include a Private Gallery feature. Open the Gallery app, tap the three-line menu, and select “Hide albums” or “Private album.” You authenticate with your Mi Account password.

Xiaomi encrypts photos moved into the Private album using software-based AES. The encryption key is derived from your Mi Account credentials and stored in the device’s Trusted Execution Environment (TEE) on newer models. On older models, the key is stored in software.

Critical weakness. Xiaomi’s Private album is tied to your Mi Account. If you sign out of your Mi Account, the Private album becomes inaccessible. If Xiaomi’s servers are unreachable, you may not be able to authenticate. The encryption is software-only on most devices — a forensic tool with physical access can extract the key from the TEE on some chipsets.

Security rating: 5/10. Encrypted, but cloud-dependent and software-bound on most devices.

OnePlus Lockbox — Simple, Hardware-Weak

OnePlus phones running OxygenOS include a Lockbox feature in the Gallery app. Open Gallery, tap the three-dot menu, select Lockbox, and authenticate with your device PIN, pattern, or fingerprint. Tap Add to select photos from the gallery.

OnePlus uses AES-128 encryption for Lockbox contents. The encryption key is tied to the device unlock credential. There is no separate hardware key storage.

Weaknesses. AES-128 is weaker than AES-256, though still computationally expensive to brute-force. The key’s dependency on the device unlock credential means a weak phone PIN weakens the Lockbox encryption. OnePlus does not publish the full cryptographic architecture for Lockbox, making independent verification impossible.

Security rating: 4/10. Encrypted, but weak key derivation and no hardware binding.

Other OEM Solutions — Vivo, Oppo, Realme, Huawei

Chinese OEMs universally include photo-hiding features. The implementation quality varies.

Vivo uses a “Hidden Album” in the iManager app. Photos are encrypted with a device-specific key stored in software. No hardware binding. Security rating: 3/10.

Oppo and Realme (ColorOS) include a “Private Safe” accessible from Settings > Security. Files are encrypted with AES-128, key stored in software. Security rating: 3/10.

Huawei (EMUI/HarmonyOS) has a “PrivateSpace” feature that creates a completely separate user profile. Switching to PrivateSpace requires a different PIN or fingerprint. Photos in PrivateSpace are encrypted with the device’s hardware encryption engine. Security rating: 7/10. Close to Samsung’s implementation.

Third-Party Vault Apps — Wide Quality Range

The Google Play Store lists hundreds of apps claiming to hide photos. Most are ad-supported, many collect telemetry, and some have been caught uploading encryption keys to remote servers.

What to look for in a vault app:

  • AES-256-GCM encryption. Not AES-128, not “proprietary encryption.”
  • Hardware-backed key storage. The encryption key should never leave a dedicated security chip.
  • Zero network calls. The app should work offline with no account requirement.
  • Published cryptography stack. The developer should cite NIST standards and explain the key derivation.
  • No third-party SDKs. Ad SDKs and analytics SDKs leak usage patterns.

What most Android vault apps actually do:

  • Use AES-128 or software-only encryption.
  • Require an account for setup.
  • Bundle advertising SDKs that send device identifiers to ad networks.
  • Store encryption keys on the developer’s server.

Security rating: 1-6/10. Depends entirely on the app. Most are not worth installing.

The .nomedia File Method — Deep Dive

The .nomedia method deserves its own section because it is the most commonly recommended “trick” on forums and YouTube, and it is dangerously misleading.

Create a folder named .hiddenphotos in the internal storage. Move photos into it. Android’s MediaStore scanner skips the folder. The photos disappear from the gallery. Success, right?

No. The .nomedia file is a text file with no content. Delete it, and the folder reappears in the gallery. Rename the folder to remove the dot prefix, and the folder reappears. Any file manager that enables “Show hidden files” can browse the folder and view every photo. USB debugging enabled? adb shell ls -la /sdcard/.hiddenphotos lists everything. Connect the phone to a computer via MTP and enable hidden files in the file explorer — the folder is visible.

Security rating: 0/10. This is not security. It is window dressing.

What Android Cannot Do That iPhone Can

Android’s fragmented hardware ecosystem makes hardware-backed encryption inconsistent. Samsung’s Knox is excellent. Xiaomi’s TEE implementation is weaker. OnePlus does not use hardware key storage at all. The user has no way to verify which implementation their phone uses.

On iPhone, the Secure Enclave is a single, consistent hardware security module across all devices. Every iPhone with a Secure Enclave — iPhone 5s and later — uses the same hardware-backed key storage architecture. AppVault takes advantage of this by wrapping its PBKDF2-SHA256 output with a key generated inside the Secure Enclave. The Enclave key never leaves the chip. Apple’s Platform Security guide documents the architecture publicly.

Android has no equivalent single standard. Google’s Titan M chip appears in Pixel phones but not in Samsung, Xiaomi, or OnePlus devices. A vault app on Android cannot rely on consistent hardware security across devices.

The Calculator Vault Concept — Android vs iOS

Calculator vault apps — apps that disguise themselves as a calculator and open a hidden vault via a secret code — are popular on both platforms. The implementation differs significantly.

On Android, calculator vault apps are straightforward. The app registers as a calculator in the launcher. Tapping the calculator icon opens a functional calculator. Entering a secret sequence (a long-press on the equals key, a specific calculation result) opens the vault. Android allows apps to hide their icon from the app drawer, making the calculator the only visible entry point.

On iPhone, Apple’s App Store guidelines make calculator vault apps difficult to ship. Guideline 4.3 prohibits apps that are “thin shells” or that “hide functionality from Apple Review.” AppVault’s Calculator Launcher passes this guideline by shipping a fully functional iOS calculator with an opt-in long-press equals-key shortcut to the encrypted vault.

The key difference: Android calculator vault apps can hide their own icon. iPhone calculator vault apps cannot. AppVault’s calculator icon is always visible on the home screen.

How to Choose the Right Method for Your Situation

The method you should use depends on your threat model.

Low threat — casual privacy. You want to hide a surprise party photo from a family member who occasionally borrows your phone. Use the built-in gallery hide toggle. Accept that it provides zero encryption.

Medium threat — shared device. You share a phone with a partner or child. Use Samsung Secure Folder or Huawei PrivateSpace. These provide hardware-backed encryption that a shared user cannot bypass.

High threat — professional or legal. You are a journalist, lawyer, or medical professional with privileged client content. Do not use any OEM solution that requires a cloud account for key recovery. Use a dedicated vault app with published cryptography, zero network calls, and no account requirement. On Android, this means carefully vetting the app’s architecture. On iPhone, AppVault provides AES-256-GCM encryption with Secure Enclave key wrapping and zero network calls by default.

Extreme threat — border crossing or device seizure. No software solution protects against a compelled decryption order or a forensic tool that exploits a zero-day in the device firmware. The only reliable protection is to not carry the photos on the device. Encrypt them with a strong passphrase before crossing the border, or leave them at home.

The Bottom Line

Android gives you many ways to hide photos. Most of them are not secure. The built-in hide toggle is cosmetic. OEM solutions range from excellent (Samsung) to weak (OnePlus). Third-party vault apps are a minefield of ad SDKs and server-side key storage.

The safest approach: use Samsung Secure Folder if you have a Galaxy phone. Use Huawei PrivateSpace if you have a Huawei phone. For everything else, treat Android’s photo-hiding features as convenience tools, not security measures.

If your photos need real protection — encryption that a forensic tool cannot break, with hardware-backed keys that never leave the device — the iPhone ecosystem currently offers more consistent security. AppVault’s AES-256-GCM encryption and zero-knowledge architecture are designed for that threat model. The threat model page explains exactly what we defend against and what we do not.

For Android users: push your OEM to publish the full cryptographic architecture of their secure folder features. Demand hardware-backed key storage. Demand published NIST citations. Until then, treat every “hide” button as what it is — a toggle, not a vault.

Sources

DIAGRAM · 04

DOSSIER

ON-DEVICE ONLY 📱 your iPhone key · vault · plaintext all sealed locally vs. ACCOUNT + CLOUD ☁︎ a server email · password · sync breach surface
ARCHITECTURE COMPARISON — on-device versus account-and-cloud

QUESTIONS

10 sharp answers.

  1. 01 How do I hide photos on a Samsung Galaxy phone?
    Open the Gallery app, tap the three-dot menu, select Settings, then Hide albums. Toggle albums you want hidden. For stronger protection, use Secure Folder — long-press a photo, tap Move to Secure Folder, and authenticate with your Knox PIN.
  2. 02 How do I hide pictures on a Xiaomi phone?
    Open the Gallery app, tap the three-line menu, select Hide albums, and toggle the albums you want hidden. For encryption, use the Private album feature — long-press a photo, tap More, then Move to Private album. This requires your Mi Account password.
  3. 03 How do I hide photos on a OnePlus phone?
    Open the Gallery app, tap the three-dot menu, select Lockbox, and authenticate with your device PIN or fingerprint. Then tap Add to add photos. Lockbox uses AES-128 encryption.
  4. 04 Can I hide photos on stock Android without an app?
    Yes. Create a folder with a dot prefix — for example, .hiddenphotos — and move files there. Most gallery apps ignore dot-prefixed folders. This provides zero security. Anyone who enables Show hidden files in a file manager can see everything.
  5. 05 Does the built-in Android hide feature actually encrypt my photos?
    No. The built-in hide toggle in Google Photos or the stock gallery app simply adds a .nomedia file to the folder. The photos remain unencrypted on disk. A file manager with hidden files visible can access them directly.
  6. 06 What is the most secure way to hide photos on Android?
    Samsung Secure Folder with Knox encryption is the strongest OEM option. For maximum security, a dedicated vault app that uses AES-256-GCM encryption with hardware-backed key storage — though the best options are currently iOS-only.
  7. 07 Can someone recover hidden photos if I factory reset my phone?
    Yes, unless the photos were encrypted before the reset. Samsung Secure Folder photos encrypted with Knox remain unrecoverable. Photos hidden with the .nomedia method survive a reset and are recoverable with data recovery tools.
  8. 08 Do third-party photo vault apps on Android work offline?
    Most do, but many require an account for setup. Some upload encryption keys to the developer's server. Android vault apps with zero-knowledge architecture exist but are rare. Always check the app's data collection policy.
  9. 09 How do I hide photos in the Samsung Gallery app without Secure Folder?
    Open Gallery, tap the three-dot menu, tap Settings, then Hide albums. Select the albums to hide. The photos remain unencrypted. This method only removes them from the default gallery view.
  10. 10 What happens to hidden photos when I update Android?
    Photos hidden with OEM secure folders typically survive OS updates. Photos hidden with the .nomedia method survive but remain unencrypted. Third-party vault apps may require updates to maintain compatibility with new Android versions.

GET STARTED

Seal the vault.

Free to download. The first vault is free, forever. Upgrade only when you outgrow it.