A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Panda Aditi Ambarish, Kaushik Trivedi, Immersive learning: A virtual reality teaching model for enhancing english speaking skills , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Vibhu Tripathi, India’s transformative journey: A decade and a half of growth, innovation, and inclusive progress , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Karthik Baburaj, Navaneeth kattil Madathil, Roshini Barkur, NLP Based Voice Assistant Usage on Consumer Shopping , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- M. Deepika, I. Antonitte Vinoline, The Impact of ERP Integration and Preservation Technology on Profit Optimization in Inventory Systems with Shortages and Deterioration , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Ahmed Mustefa, Ethiopian Voluntary Resettlement Programme-Lesson to Learn , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Deneshkumar V, Jebitha R, Jithu G, Multistate modeling for estimating clinical outcomes of COVID-19 patients , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Gomathi, Balaji V, Sanjay R. Pawar, Ayesha Siddiqua, M. Dhanalakshmi, Ravi Rastogi, Ensuring ethical integrity and bias reduction in machine learning models , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Krishna P. Kalyanathaya, Krishna Prasad K, A novel method for developing explainable machine learning framework using feature neutralization technique , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- B. Swaminathan, G. Komahan, A. Venkatesh, Linear and non-linear mathematical model of the physiological behavior of diabetes , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Priya Rajwade, Alka Bansal, A study of the perceptions of teachers towards a holistic approach in teaching in CBSE board schools in the context of NEP 2020 at the foundational and preparatory stages , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
<< < 33 34 35 36 37 38 39 40 41 42 > >>
You may also start an advanced similarity search for this article.

