Downloads: 224 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019
Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp
Amritha R, Anu Priya R, Initha G, Sindhu Priya S
Abstract: WhatsApp application have become one of the most important and popular application on smartphones. It has the capability of exchange text messages, images and files for the users to communicate with each other. All messages must be protected. A major issue that is overlooked by most of the people in the instant messaging world is Privacy. Though different Instant Messaging Applications offer different security to users they tend to fail and lead to increase in vulnerabilities and risks of attack on data. Not only business conversations, even in normal conversations our data must be secured, because, anyone's data is very sensitive & data security is highly important to prevent unwanted data losses. To overcome these kinds of vulnerabilities & risks involving attack on data we need an encrypted messaging protocol for a secured conversation. The aim of this paper is securing WhatsApp conversation from targeted advertising and promotion. Increasing the privacy through in-device encryption technique.
Keywords: Cryptography, Secure Transmission, Encryption, Authentication Server
Edition: Volume 8 Issue 3, March 2019,
Pages: 514 - 520
How to Cite this Article?
Amritha R, Anu Priya R, Initha G, Sindhu Priya S, "Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20196011, Volume 8 Issue 3, March 2019, 514 - 520
How to Share this Article?
Similar Articles with Keyword 'Cryptography'
Introduction to Cryptography
A Survey on Secure Mechanism for Wireless Sensor Networks
Tabbasum Sajjan Magdum, Y.B.Gurav
Similar Articles with Keyword 'Secure Transmission'
Secure Data Transmission with Hierarchical Clustering
Rahul Raj, J. Godwin Ponsam
Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator
Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas
Similar Articles with Keyword 'Encryption'
Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Document Security within Institutions Using Image Steganography Technique