A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Susithra N, Rajalakshmi K, Ashwath P, Performance analysis of compressive sensing and reconstruction by LASSO and OMP for audio signal processing applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- S. Deepa, I.S. Arafat, M. Sathya Priya, S. Saravanan, An improved spectrum sharing strategy evaluation over wireless network framework to perform error free communications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R Prabhu, S Sathya, P Umaeswari, K Saranya, Lung cancer disease identification using hybrid models , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S. TAMIL FATHIMA, K. FATHIMA BIBI, Early diagnosis of cardiac disease using Xgboost ensemble voting-based feature selection, based lightweight recurrent neural network approach , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- S. Ramkumar, K. Aanandha Saravanan, Martin Joel Rathnam, M. Revathy, Integration of AI and agent-based modeling for simulating human-ecological systems , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, MARCR: Method of allocating resources based on cost of the resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

