This document presents a method for detecting Android ransomware using reduced opcode sequences and image similarity. It extracts opcode sequences of length 2 from APK files, constructs images representing the frequency of opcode pairs, selects features using LDA, classifies samples with a second LDA, and evaluates on ransomware families including Locker and Koler. Experimental results found 97% accuracy on a dataset containing ransomware and benign samples obtained from VirusTotal. The method aims to address problems in prior work using less features and detecting encrypted text ransomware.