A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Prabu Gopal, M. Jeyaseelan, Familial support of rural elderly in indian family system: A sociological analysis , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Senthil Murugan C, Vijayabalan Dhanabal, Sukumaran D, Suresh G, Senthilkumar P, Analysis of distributions using stochastic models with fuzzy random variables , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Thilagavathi K, Thankamani K., P. Shunmugapriya, D. Prema, Navigating fake reviews in online marketing: Innovative strategies for authenticity and trust in the digital age , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Kanwar D Singh, Rashmi Ashtt, Barriers to last mile connectivity: The role of crime in metro station accessibility , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Deena Merit C K , Haridass M, Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Shivani Goel, Rashmi Ashtt, Monali Wankar, Analyzing the impact of crime on quality of life in Old Delhi: A quantitative approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sowmiya M, Banu Rekha B, Malar E, Assessment of transfer learning models for grading of diabetic retinopathy , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Nithya Raju , Shruthi Deivigarajan, Sindhuja Santhakumar, Sneha Balamurugan, Challenges encountered by healthcare professionals in monitoring adverse events due to medical devices-A review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- NITHYA R, shruthi D, Sindhuja S, Sneha S, Challenges encountered by health care professionals in monitoring adverse events due to medical devices: A review , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- P. J. Robinson, S. W. A. Prakash, Stochastic artificial neural network for magdm problem solving in intuitionistic fuzzy environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 41 42 43 44 45 46 47 48 > >>
You may also start an advanced similarity search for this article.

