A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- M. Merla Agnes Mary, S. Britto Ramesh Kumar, DAJO: A Robust Machine Learning–Based Framework for Preprocessing and Denoising Fetal ECG Signals , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- SOBTI R.C., KIRTIPAL N., THAKUR H., JANMEJA A.K., POLYMORPHISM IN INTERLEUKIN-4 GENE AND THE RISK OF CHRONIC OBSTRUCTIVE PULMONARY DISEASE IN A NORTH INDIAN POPULATION : A CASE-CONTROL STUDY , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- Hashmat Ali, Nishant Soren, Rohit Kumar Ravi, Kunal Kumar, Anjali, Evaluation of Standard Changes in Free Energy During Complexation of p-chlorobenzoylthioacetophenone with Some Bivalent Transition Metals , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Swetha Rajkumar, Subasree Palanisamy, Online detection and diagnosis of sensor faults for a non-linear system , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Radha K. Jana, Dharmpal Singh, Saikat Maity, Modified firefly algorithm and different approaches for sentiment analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- L. Vamsi Narasimha Rao, P.S.Prakash, M.Veera Kumari, Improvement of power system operation using a novel hybrid optimization method for optimal allocation of facts devices in radial transmission line , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Dattatraya Pandurang Rane, Amey Adinath Choudhari, Rita Kakade, Technology-driven financial inclusion: Opportunities for corporate expansion in emerging markets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Himadri Nalinkumar Raval, Effective strategies in English language teaching: Enhancing writing proficiency among learners , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- UMA SHANKAR SHUKLA, AN INFLATED PROBABILITY MODEL FOR INFECTION , The Scientific Temper: Vol. 10 No. 1&2 (2019): The Scientific Temper
<< < 46 47 48 49 50 51 52 53 54 > >>
You may also start an advanced similarity search for this article.

