Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views1 page

Secure Message Transmission Using Chaotic Encryption

Uploaded by

Sanskar Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views1 page

Secure Message Transmission Using Chaotic Encryption

Uploaded by

Sanskar Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Secure Message Transmission Using Chaotic Encryption, Elliptic

Curve Cryptography, and Image Steganography


This project is about creating a safe way to send secret messages by combining three security
methods — chaotic encryption, elliptic curve cryptography (ECC), and steganography. First,
the secret text is scrambled using chaotic encryption, which makes the message look like
complete nonsense to anyone without the key. Then, the key needed for decryption is itself
protected using ECC, a strong and modern cryptographic method. After that, the encrypted
message is hidden inside a normal image using steganography so that it looks like a regular
picture to others. This layered security ensures that even if someone gets hold of the image,
they cannot read the hidden message without the correct key and the method to extract it. The
system is designed for sending confidential data over the internet or social media, which are
often not secure, and can be used in areas like the military, government, companies, or personal
communication to keep sensitive information safe.

You might also like