International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 227 | Views: 421 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Information Technology | India | Volume 8 Issue 3, March 2019 | Popularity: 6.8 / 10


     

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R, Anu Priya R, Initha G, Sindhu Priya S


Abstract: WhatsApp application have become one of the most important and popular application on smartphones. It has the capability of exchange text messages, images and files for the users to communicate with each other. All messages must be protected. A major issue that is overlooked by most of the people in the instant messaging world is Privacy. Though different Instant Messaging Applications offer different security to users they tend to fail and lead to increase in vulnerabilities and risks of attack on data. Not only business conversations, even in normal conversations our data must be secured, because, anyone's data is very sensitive & data security is highly important to prevent unwanted data losses. To overcome these kinds of vulnerabilities & risks involving attack on data we need an encrypted messaging protocol for a secured conversation. The aim of this paper is securing WhatsApp conversation from targeted advertising and promotion. Increasing the privacy through in-device encryption technique.


Keywords: Cryptography, Secure Transmission, Encryption, Authentication Server


Edition: Volume 8 Issue 3, March 2019


Pages: 514 - 520



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Amritha R, Anu Priya R, Initha G, Sindhu Priya S, "Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp", International Journal of Science and Research (IJSR), Volume 8 Issue 3, March 2019, pp. 514-520, https://www.ijsr.net/getabstract.php?paperid=ART20196011, DOI: https://www.doi.org/10.21275/ART20196011



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2495 - 2503

Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms

Kishore Gade

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021

Pages: 1309 - 1318

Performance Analysis of Data Exchange Protocols in Cloud Environments

Sai Kumar Reddy Thumburu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 12 Issue 1, January 2023

Pages: 1387 - 1398

Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations

Sateesh Reddy Adavelli

Share this Article
Top