International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 227 | Views: 392 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019 | Popularity: 6.8 / 10


     

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R, Anu Priya R, Initha G, Sindhu Priya S


Abstract: WhatsApp application have become one of the most important and popular application on smartphones. It has the capability of exchange text messages, images and files for the users to communicate with each other. All messages must be protected. A major issue that is overlooked by most of the people in the instant messaging world is Privacy. Though different Instant Messaging Applications offer different security to users they tend to fail and lead to increase in vulnerabilities and risks of attack on data. Not only business conversations, even in normal conversations our data must be secured, because, anyone's data is very sensitive & data security is highly important to prevent unwanted data losses. To overcome these kinds of vulnerabilities & risks involving attack on data we need an encrypted messaging protocol for a secured conversation. The aim of this paper is securing WhatsApp conversation from targeted advertising and promotion. Increasing the privacy through in-device encryption technique.


Keywords: Cryptography, Secure Transmission, Encryption, Authentication Server


Edition: Volume 8 Issue 3, March 2019


Pages: 514 - 520



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Amritha R, Anu Priya R, Initha G, Sindhu Priya S, "Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 514-520, https://www.ijsr.net/getabstract.php?paperid=ART20196011

Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 1415 - 1423

Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud

Sandeep Chinamanagonda

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 0

Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022

Pages: 1549 - 1559

Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments

Yash Jani, Arth Jani, Dhaval Gogri

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article
Top