Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R, Anu Priya R, Initha G, Sindhu Priya S

WhatsApp application have become one of the most important and popular application on smartphones. It has the capability of exchange text messages, images and files for the users to communicate with each other. All messages must be protected. A major issue that is overlooked by most of the people in the instant messaging world is Privacy. Though different Instant Messaging Applications offer different security to users they tend to fail and lead to increase in vulnerabilities and risks of attack on data. Not only business conversations, even in normal conversations our data must be secured, because, anyone's data is very sensitive & data security is highly important to prevent unwanted data losses. To overcome these kinds of vulnerabilities & risks involving attack on data we need an encrypted messaging protocol for a secured conversation. The aim of this paper is securing WhatsApp conversation from targeted advertising and promotion. Increasing the privacy through in-device encryption technique.

Keywords: Cryptography, Secure Transmission, Encryption, Authentication Server

Edition: Volume 8 Issue 3, March 2019

Pages: 514 - 520

Share this Article

How to Cite this Article?

Amritha R, Anu Priya R, Initha G, Sindhu Priya S, "Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20196011, Volume 8 Issue 3, March 2019, 514 - 520

402 PDF Views | 156 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Similar Articles with Keyword 'Secure Transmission'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Research Paper, Information Technology, Iraq, Volume 4 Issue 6, June 2015

Pages: 627 - 631

Improved Steganographic Method for Hiding Secure Data Based on Efficient Keystream Generator

Dr. Ismail K. Ali, Salah T. Allawi, May M. Abbas

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 514 - 520

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R, Anu Priya R, Initha G, Sindhu Priya S

Share this Article

Similar Articles with Keyword 'Encryption'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article
Top