A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Mansi Harjivan Chauhan, Divyang D. Vyas, Advancements in sentiment analysis – A comprehensive review of recent techniques and challenges , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Ekta Singh, Ekta Rani, Trends and Determinants of Mergers and Acquisitions in the Manufacturing Sector in India , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- B. Kalpana, P. Krishnamoorthy, S. Kanageswari, Anitha J. Albert, Machine learning approaches for predicting species interactions in dynamic ecosystems , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Brigith Gladys L, J. Merline Vinotha, Sustainable rough multi-objective two-stage solid transportation problem of third-party e-commerce logistic providers with conditional fixed parameter on safety , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Z.D. Lalhmangaihzuali, Neha Dubey, Digital Health, Technology and Innovation in Nutrition Monitoring in Lunglei District, Mizoram , The Scientific Temper: Vol. 17 No. 03 (2026): The Scientific Temper
- Hardik N Talsania, Kirit Modi, Interpretable Cardiovascular Diagnosis using Multi-dimensional Feature Fusion and Deep Learning , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Bayelign Abebe Zelalem, Ayalew Ali Abebe, Financial strategy and private commercial banks’ profitability in the emerging market: Evidence from Ethiopia , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Josephine Theresa S, Graph Neural Network Ensemble with Particle Swarm Optimization for Privacy-Preserving Thermal Comfort Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Rajeev P. R., K. Aravinthan, A novel approach for metrics-based software defect prediction using genetic algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 18 19 20 21 22 23 24 25 26 27 > >>
You may also start an advanced similarity search for this article.

