A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Anita Mathew, Sneha Kanade, Fostering safe and inclusive workplace toward a sustainable and high-performing work culture , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- C. Agilan, Lakshna Arun, Optimization-based clustering feature extraction approach for human emotion recognition , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sanskriti Gandhi, Usha Asnani, Srivalli Natarajan, Chinmay Rao, Richa Agrawal, Evaluation of stability of fixation using conventional miniplate osteosynthesis in comminuted and non-comminuted Le Fort I, II, III fractures – A dynamic finite element analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S. Vnuchko, O. Batrymenko, О. Ткach, М. Karashchuk, M. Volkivskyi, Models of interaction between business and government in the conditions of the European integration course of Ukraine , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sweta Jain, Jacob Joseph Kalapurackal, Green Innovation, Pressure, Green Training, and Green Manufacturing: Empirical evidence from the Indian apparel export industry , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Sharanya Unnikrishnan, Eldhose Thomas, Arunima Dey, AI-Powered NLP in Vernacular Public Relations: Opportunities, Challenges, and Ethical Implications for India’s Multilingual Landscape , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.

