2018
DOI: 10.11591/ijece.v8i5.pp3841-3850
|View full text |Cite
|
Sign up to set email alerts
|

The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat

Abstract: Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…These researches are generally using the concept of asymmetric key cryptography. Also, there are some methods to secure the IM without blockchain like using a backup server to guarantee the integrity of messages [29], increasing the security of IM applications using Honey Encryption [30], protecting group chats using Vigenère encryption [31], and a mobile app for encrypting messages before send and decrypting them after it received [32]. There is research to improve the X3DH protocol using blockchain for IoT [33].…”
Section: B Literature Reviewmentioning
confidence: 99%
“…These researches are generally using the concept of asymmetric key cryptography. Also, there are some methods to secure the IM without blockchain like using a backup server to guarantee the integrity of messages [29], increasing the security of IM applications using Honey Encryption [30], protecting group chats using Vigenère encryption [31], and a mobile app for encrypting messages before send and decrypting them after it received [32]. There is research to improve the X3DH protocol using blockchain for IoT [33].…”
Section: B Literature Reviewmentioning
confidence: 99%
“…The security of the modern text steganography method can be defined as its ability and strength to resist any attack to remove or destroy the hidden data [116,141]. It is achieved by increasing the level of algorithm complexity, such as random or non-sequence embedding positions [106,142], randomly selecting secret bits [143][144][145], and generating a strong stego key [116,121,[144][145][146][147][148]. As a result, using one or more of these complexity techniques makes the hidden data extremely difficult to extract.…”
Section: Securitymentioning
confidence: 99%
“…Cryptographic methods are divided based on key-based and keyless [6]. Several conventional keyless cryptographic methods have implemented for improving data security such as Caesar ciphers [7], Vigenere ciphers [8], [9], Zigzag ciphers [10], and Playfair cipher [11]. Those methods are more complex and consume a significant amount of power when applied in the resource-constrained devices for the provision of secure communication [12].…”
Section: Introductionmentioning
confidence: 99%