A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Aakanksha Laiker, Promil Pande, Contribution of policy and regulations to enhance Transparency and Traceability in the Garment Industry , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Arunachalaprabu G, Fathima Bibi K, A pattern-driven Huffman encoding and positional encoding for DNA compression , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Amresh Kumar Singh, Manjit Singh Chhetri, Pushyamitra Mishra, Toughness and Ductile Brittle Transition Temperature of Different Mineral Filler Reinforced TPOs Composites , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Divya R., Vanathi P. T., Harikumar R., An optimized cardiac risk levels classifier based on GMM with min- max model from photoplethysmography signals , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Rajashree Sunder Raj, Sayar Ahmad Sheikh, Health status of women in slums: A comprehensive study in Raichur District Karnataka, India , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, A Unified Consistency-Calibrated Boundary-Aware Framework for Generalizable Skin Cancer Detection , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, Cost-based resource allocation method for efficient allocation of resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Akanksha Singh, Nand Kumar, Analysis of renewable energy and economic growth of Germany , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- M. Monika, J. Merline Vinotha, Optimization of a Lean Vendor–Buyer Supply Chain Model under Neutrosophic Fuzzy Environment with Transportation, Loading, and Unloading Considerations , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
<< < 26 27 28 29 30 31 32 33 34 35 > >>
You may also start an advanced similarity search for this article.

