A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Navjot Singh, Sultan Singh, Demographic perception of customers towards dairy marketing practices: An empirical study , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- M. Prabhu, A. Chandrabose, Improving the resource allocation with enhanced learning in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Kanchan Chaudhary, Saurabh Charaya, The Implementation of Artificial Intelligence-Based Models of Postoperative Care in Paediatric Healthcare Settings , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- J. Pavithra, Status of investment in startup in India – An analysis , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- M. Monika, J. Merline Vinotha, A Fuzzy Supply Chain Model Evaluating Energy Management Systems under Imperfect Production and Uncertain Costs , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Sanjeev Kumar, Saurabh Charaya, Rachna Mehta, Multi-Metric Evaluation Framework for Machine Learning-Based Load Prediction in e-Governance Systems , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- M. Menaha, J. Lavanya, Crop yield prediction in diverse environmental conditions using ensemble learning , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pravin P. P, J. Arunshankar, Development of digital twin for PMDC motor control loop , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- N. Suresh Kumar, S.N.Md. Assarudeen, Solving neutrosophic multi-objective linear fractional programming problem using central measures , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 27 28 29 30 31 32 33 34 35 36 > >>
You may also start an advanced similarity search for this article.

