A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- M. Monika, J. Merline Vinotha, A Sustainable Vendor–Buyer Supply Chain Framework Integrating Energy Storage Systems and Green Investments with Incentive Policies under Demand Uncertainty , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Heikham G. Chanu, Sudha A. Raddi, Anita Dalal, Sangeeta N. Kharde, Shivani Tendulkar, Association between the socio-demographic variables of women admitted for delivery to a Tertiary Care Hospital and their maternal and neonatal outcome - A cross-sectional study , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- U. Perachiselvi, R. Balasubramani, Funding agencies in Tamil Nadu State Universities: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- P. Nagajothi, M. V. Srinath, Ensemble and Multimodal Approaches for Analyzing Student Engagement and Flexibility in Online Learning: A Review , The Scientific Temper: Vol. 17 No. 03 (2026): The Scientific Temper
- Tarannum ., Anuja Pandey, Arti Rauthan, An evaluation of the impact of lean management practices on patients’ satisfaction at a small healthcare facility , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Bayelign Abebe Zelalem, Ayalew Ali Abebe, Dividend policy and banks’ performance: Assessing the relevance versus irrelevance theory , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- T Sowmya Priyadharshini, Rengasamy Sathya, Influence of Different Extraction Solvents and the Micronutrient Composition on the Bioactive Properties and Antimicrobial Efficacy of Spirulina Maxima Extracts , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Alok Sharma, Roumi Deb, Sanjay Kumar Manjul , Cultural continuity and change through ceramic ethnoarchaeology: A comparative analysis of Rang Mahal and contemporary pottery in Nohar, Hanumangarh district, Rajasthan , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Bhavika Bhagyesh Lad, Sonam Mansukhani, Applying the risk-need-responsivity model in juvenile offender treatment: A conceptual framework , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
<< < 21 22 23 24 25 26 27 28 29 30 > >>
You may also start an advanced similarity search for this article.

