A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- SOBTI R.C., KIRTIPAL N., THAKUR H., JANMEJA A.K., POLYMORPHISM IN INTERLEUKIN-4 GENE AND THE RISK OF CHRONIC OBSTRUCTIVE PULMONARY DISEASE IN A NORTH INDIAN POPULATION : A CASE-CONTROL STUDY , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- M. Deepika, I. Antonitte Vinoline, The Impact of ERP Integration and Preservation Technology on Profit Optimization in Inventory Systems with Shortages and Deterioration , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, A vendor-constrained economic production quantity model integrating scrap recovery under sustainability , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Deepika M, Antonitte Vinoline I, An integrated inventory system for profit maximization considering partial demand satisfaction , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- P N Tripathi, Ved Prakash Tripathi, Swapnil Raj Dubey, Conservation Needs of Freshwater Fin-Fish Genetic Resources , The Scientific Temper: Vol. 7 No. 1&2 (2016): THE SCIENTIFIC TEMPER
- P. Sangeetha, G. Janaki, Inherent Approaches to Solving Exponential Diophantine Equations involving Disarium Numbers of order 2 to 4. , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Ayalew Ali, Sitotaw Wodajo, Taye Teshoma, The link between corporate governance and earnings management of insurance companies in Ethiopia , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Deepa Ramachandran VR VR, Kamalraj N, Hybrid deep segmentation architecture using dual attention U-Net and Mask-RCNN for accurate detection of pests, diseases, and weeds in crops , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- R. Gomathi, Balaji V, Sanjay R. Pawar, Ayesha Siddiqua, M. Dhanalakshmi, Ravi Rastogi, Ensuring ethical integrity and bias reduction in machine learning models , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Akila L, Comparative study on Datafication and Digitization , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
<< < 27 28 29 30 31 32 33 34 35 36 > >>
You may also start an advanced similarity search for this article.

