A secure messaging application using steganography and AES encryption a dual-layer secure messaging system
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.12Keywords:
Steganography, Secure messaging, Data hiding, LSB method, AES encryption, Privacy, Hidden communication.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This research involves the development of a secure messaging application with the capability to send messages inside images oraudiofiles using the practice called steganography. In this application, a person can secretly communicate in such a way that nooneisawareoftheexistenceof the hidden message. The application uses the Least Significant Bit (LSB) method to hide the messages while encrypting the messages. To provide greater security, AES encryption is used before hiding the messages, thus forcing both sender and receiver to decrypt the message using a shared key. This two-layer approach of steganography and encryption creates this application highly appropriate for people with communication controls or monitored at some level because it gives confidentiality for the message privacy.Abstract
How to Cite
Downloads
Similar Articles
- S. Ramkumar, K. Aanandha Saravanan, Martin Joel Rathnam, M. Revathy, Integration of AI and agent-based modeling for simulating human-ecological systems , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pratik Ghosh, Sriram M, A systematic review of social media communication with respect to fashion brands , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Nalini. S, Ritha. W, Sasitharan Nagapan, Economic Order Quantity under Perishability: Analytical and Iterative Approaches to Cost Minimization , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Neeraj, Anita Singhrova, A critical review of blockchain-based authentication techniques , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- P. Ananthi, A. Chandrabose, The socio-technical opportunities and threats of crowdsensing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Gautam Nayak, Parthivkumar Patel, Developing speaking skills through task-based learning in English as a foreign language classroom , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sreenath M.V. Reddy, D. Annapurna, Anand Narasimhamurthy, Influence node analysis based on neighborhood influence vote rank method in social network , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

