0% found this document useful (0 votes)
24 views32 pages

MP Report Phase 1

The project report details the development of a secure real-time chat application that incorporates steganography and screen sharing, aimed at enhancing privacy and functionality in digital communication. It addresses the limitations of existing chat systems by integrating covert communication and secure collaboration tools, utilizing technologies such as the MERN stack, WebRTC, and AES encryption. The project emphasizes the importance of data confidentiality and aims to provide a robust solution for sensitive environments, making significant contributions to the field of cybersecurity.

Uploaded by

Nandan Shetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views32 pages

MP Report Phase 1

The project report details the development of a secure real-time chat application that incorporates steganography and screen sharing, aimed at enhancing privacy and functionality in digital communication. It addresses the limitations of existing chat systems by integrating covert communication and secure collaboration tools, utilizing technologies such as the MERN stack, WebRTC, and AES encryption. The project emphasizes the importance of data confidentiality and aims to provide a robust solution for sensitive environments, making significant contributions to the field of cybersecurity.

Uploaded by

Nandan Shetty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“Jnana Sangama”, Belagavi-590018

A PROJECT REPORT
On
“Secure Real-Time Chat with Steganography and Screen Sharing”
Submitted in partial fulfillment of the requirements for the
award of

BACHELOR OF ENGINEERING DEGREE


In
COMPUTER SCIENCE & ENGINEERING (DATA SCIENCE)
Submitted by,
Anthony Anup 4AD22CD006
Bhoma P 4AD22CD008
Nandan M 4AD22CD028
Shakthi T L 4AD22CD043

Under the guidance of,


Prof. Anitha D B
Associate Professor
Department of CSE-Data Science

ATME College of Engineering,


13th Kilometer, Mysore-Kanakapura-Bangalore Road
Mysore-570028
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Belagavi-590018
ATME College of Engineering
13th Kilometer, Mysore-Kanakapura-Bangalore Road

Department of CSE (DATA SCIENCE)

CERTIFICATE
This is to certify that the project work entitled “Secure Real-Time Chat with Steganography
and Screen Sharing” is the bonafide work carried out by following students,

Anthony Anup 4AD22CD006


Nandan M 4AD22CD028
Bhoma P 4AD22CD008
Shakthi T L 4AD22CD043

in partial fulfillment for the award of degree of Bachelor of Engineering in CSE-Data


Science from the Visvesvaraya Technological University, Belagavi during the year 2024-
[Link] is certified that all the corrections or suggestions indicated for internal assessment
have been incorporated in the Major-project report deposited in the department library. The
Major-Project report has been approved and satisfies the academic requirement with respect
to Major-project work prescribed for Bachelor of Engineering degree.

Signature of the guide Signature of HOD


Dr. Anitha D B Dr. Anitha D B
Associate Professor Associate Prof. & HOD
ACKNOWLEDGEMENT

The successful completion of our Major-project would be incomplete without the mention
of the names of the people who have made it possible. We are indebted to several
individuals who have helped us to complete the project report.

We are thankful to Dr. L Basavaraj, Principal, ATME College of Engineering, for having
granted us permission and extended full use of the college facilities to carry out this project
successfully.

We express our profound gratitude to Dr. Anitha DB & HoD & Associate Professor,
Department of CSE-Data Science for her consistent co-operation and support.

At the outset we express our profound gratitude to our guide Dr. Anitha D B

, Associate Professor, Department of CSE-Data Science for his consistent co-operation


and support.

We are greatly indebted to our project coordinator Dr. Vinod Kumar. P, Associate Professor,
Department of CSE-Data Science for their timely inquiries into the progress of the project.

Lastly, we would like to thank our family and friends for their cooperation and support for
success full completion of our project.

Anthony Anup 4AD22CD006


Nandan M 4AD22CD028
Bhoma P 4AD22CD008
Shakthi T L 4AD22CD043
ABSTRACT

In today's digital age, secure and private communication has become a fundamental
requirement. With the exponential growth of online messaging platforms and remote
collaboration tools, ensuring data confidentiality and protecting sensitive information during
transmission is a pressing concern. This project presents a comprehensive solution titled
"Secure Real-Time Chat with Steganography and Screen Sharing", which integrates real-
time communication, data hiding techniques, and remote desktop sharing into a unified, secure
platform.

The proposed system is designed to facilitate encrypted real-time text communication between
users, ensuring that data is transmitted securely over the network. To further enhance security,
the project implements steganography—the art of hiding messages within digital media. This
enables covert communication by embedding confidential text messages within image files
using techniques like Least Significant Bit (LSB) manipulation. This layer of security
ensures that even if the image is intercepted, the hidden data remains concealed and
inaccessible to unauthorized users.
In addition to secure chat, the system supports real-time screen sharing, enabling users to
collaborate remotely and effectively. This feature is implemented using WebRTC (Web
Real-Time Communication) and related technologies, allowing for peer-to-peer connection
and low-latency streaming of screen content. The combination of secure messaging and live
screen sharing makes the platform particularly suitable for professional and academic
environments where privacy and confidentiality are paramount.
Technologies employed in the project include Python/JavaScript, WebSocket for real-time
communication, OpenCV for image processing, and AES encryption to safeguard user
data. The system has been tested for reliability, efficiency, and resistance to common attack
vectors such as packet sniffing and man-in-the-middle attacks.
This project demonstrates the practical application of cybersecurity principles in modern
communication tools and sets the foundation for further innovations, such as voice call
integration, cloud storage security, and advanced steganalysis resistance. It stands as a
significant contribution toward building trustworthy digital communication systems for a
privacy-focused world.
CONTENTS

Page No.

CHAPTER 1: INTRODUCTION 1-7

1.1 Preamble 2

1.2 Motivation 3

1.3 Existing System Drawbacks 3

1.4 Proposed System 4

1.5 Problem Statement 5

1.6 Objective of the Project

1.7 Advantages 5

1.8 Organization of the Report 6

CHAPTER 2: LITERATURE SURVEY 8-15

2.1 Introduction 9

2.2 Literature Review 10

2.3 Outcome of the Literature Review 15

CHAPTER 3: METHODOLOGY & IMPLEMENTATION 16-22

3.1 Introduction 17

3.2 Proposed Methodology 19

CHAPTER 4: CONCLUSION 23-24

REFERENCES 25-26
CHAPTER 1
INTRODUCTION
Secure Real Chat 2024-25

CHAPTER 1
INTRODUCTION

1.1 Preamble

In the digital era, communication technologies have evolved rapidly, transforming how people
connect, collaborate, and share information. The growth of the internet, smartphones, and cloud-
based services has enabled real-time communication across the globe. Applications like
WhatsApp, Telegram, Microsoft Teams, and Zoom have become integral parts of daily life,
allowing for instant messaging, voice and video calls, and screen sharing. While these platforms
have increased efficiency and connectivity, they have also introduced significant cybersecurity
concerns related to dEata privacy, interception, and unauthorized surveillance.
Traditional communication tools primarily rely on encryption algorithms to ensure data
confidentiality during transmission. Encryption techniques such as AES (Advanced Encryption
Standard) and RSA provide a layer of security by converting readable data into an unreadable
format for unauthorized users. However, encrypted messages can still attract attention, especially
in regions where digital communication is monitored. In such environments, the mere presence
of encrypted content can lead to suspicion or scrutiny, even if the data itself remains
undecipherable.
To counter this challenge, an advanced technique known as steganography can be employed.
Unlike encryption, which hides the content of a message, steganography hides the very
existence of the message. It involves embedding secret information within innocuous files such
as images, audio, or video, in such a way that the hidden data is imperceptible to human senses
and difficult to detect through conventional means. By combining encryption and steganography,
a higher level of security and privacy can be achieved, offering a robust solution against digital
threats and unauthorized access.
Simultaneously, the increasing reliance on remote work, online learning, and technical support
has popularized screen-sharing tools. Screen sharing allows one user to broadcast their desktop
or a particular application window to another user in real-time. While this feature is crucial for

Department of CSE (Data Science), ATMECE, Mysuru 2


Mysuru
Secure Chat App 2024-25

remote collaboration, it also poses significant security risks. Sensitive information, such as
passwords, financial data, or confidential documents, can be inadvertently exposed during a
screen-sharing session if not handled securely.
Given these challenges, there is a strong need for an integrated solution that combines secure
real-time messaging, steganographic communication, and encrypted screen sharing. The
motivation for this project stems from the goal to develop a communication system that prioritizes
both privacy and functionality, offering users the ability to chat in real time, share their screens
for collaboration, and hide sensitive messages without attracting attention.
This project addresses these needs by leveraging modern web technologies, secure protocols,
image processing techniques, and real-time communication frameworks. By doing so, it aims to
build a robust application that is suitable for various sensitive environments such as corporate,
academic, governmental, or personal use, where data confidentiality, integrity, and stealth are
of utmost importance.

1.2 Motivation

In a world increasingly reliant on digital communication, safeguarding privacy and enabling


secure collaboration have become critical. While traditional chat applications offer basic security,
they often fall short in concealing sensitive content and enabling real-time collaboration without
exposing users to cyber threats. This project is driven by the need to develop a unified platform
that not only supports encrypted real-time messaging and screen sharing but also incorporates
steganography. This technique hides the very existence of communication. By addressing these
gaps, the project aspires to empower users with a practical and secure means of digital interaction.

1.3 Existing System

Most existing chat applications primarily focus on real-time text messaging with basic multimedia
support but lack integration of advanced features such as screen sharing and steganography for
covert communication. Steganography techniques are often limited to static media and do not
support real-time embedding during live interactions. Additionally, many systems face scalability
challenges when handling high user loads combined with complex encrypted data streams. While

Department of CSE (Data Science), ATMECE, 3


Mysuru
Secure Chat App 2024-25

end-to-end encryption is common, the absence of steganographic layers leaves potential security
gaps. Advanced steganography methods also encounter practical deployment issues due to
computational complexity and limited experimental validation. Furthermore, steganalysis
techniques can detect hidden content with variable accuracy, and coverless steganography
approaches often suffer from limited payload capacity and robustness. Overall, there is a lack of
comprehensive, user-friendly chat systems that seamlessly combine secure real-time
communication, multimedia sharing, and covert data embedding.

1.4 Proposed System


The proposed system is a robust and scalable MERN stack-based chatting application that
integrates screen sharing and steganography for secure communication. Users authenticate via a
secure module before accessing the platform, ensuring privacy through JWT-based
authentication. The messaging system enables real-time encrypted communication, leveraging
advanced cryptographic algorithms for enhanced security. Screen sharing functionality, powered
by WebRTC, allows seamless interaction, ensuring smooth transmission of video and desktop
content. Steganographic messaging embeds confidential data within images, providing an
additional layer of security for sensitive communication illustrated in Figure 1.1

MongoDB
SScreen Sharing

Express

Steganography
[Link]

Figure 1.1 MERN Stack Application

1.5 Problem Statement

Department of CSE (Data Science), ATMECE, 3


Mysuru
Secure Chat App 2024-25

Most existing chat applications offer real-time messaging and basic security features, but lack
mechanisms for covert communication and integrated collaboration tools. There is currently no
widely adopted solution that combines real-time chat, secure screen sharing, and steganography
within a single platform. This project aims to fill that gap by developing a secure communication
system that supports hidden message transmission and live screen sharing in a privacy-
preserving manner.

1.6 Objective of the Project

The primary objective of this project is to design and develop a secure, real-time communication
platform that goes beyond conventional chat systems by integrating advanced features aimed at
enhancing user privacy and functionality.
• To develop a real-time chat application using the MERN stack and [Link].
• To implement secure screen sharing functionality using WebRTC.
• To integrate steganography techniques (e.g., LSB) for hiding messages inside images.
• To ensure end-to-end encryption of both text messages and hidden content.
• To provide a user-friendly interface for smooth interaction and usability.
• To build a system that ensures privacy, data integrity, and covert communication in real-
time.

1.7 Advantages
The following are the advantages of Secure Real-Time Chat with Steganography and Screen
Sharing:
• Integrates real-time chat with screen sharing, enhancing user interaction beyond basic
messaging.
• Incorporates steganography for covert communication, adding an extra layer of security and
privacy.

Supports dynamic multimedia sharing in real-time, unlike many apps limited to static media.
• Ensures instant message delivery and scalability through efficient backend technologies.

Department of CSE (Data Science), ATMECE, 3


Mysuru
Secure Chat App 2024-25

• Provides robust end-to-end encryption combined with steganography for enhanced


confidentiality.
• Addresses practical gaps in existing systems by combining visible and hidden data exchange
simultaneously.
• Designed for high user load handling, ensuring smooth performance under heavy usage.
• Offers a user-friendly interface for seamless communication and secure data sharing.

1.8 Organization of the Project


The organization of this project report is structured to provide a systematic and comprehensive
understanding of the development of a secure chat application incorporating real-time
messaging, screen sharing, and steganography techniques. The report is divided into multiple
chapters, each focusing on a specific aspect of the system.

In chapter 1, it presents the background and significance of secure digital communication in


the modern era. It discusses the increasing demand for privacy and security in chat applications
and introduces the concept of integrating advanced features such as screen sharing and
steganography. The chapter also outlines the motivation behind the project, the problem
statement, and clearly defined objectives.

Chapter 2 reviews existing research and technological developments in the domains of real-time
communication, WebRTC-based screen sharing, and data hiding through steganography. It
explores the strengths and limitations of current systems, highlighting the research gap that this
project aims to address.

Chapter 3 focuses on the detailed analysis of system requirements, both functional and non-
functional. It includes use-case diagrams, system architecture, and module-level design. The
chapter explains how the system components—chat module, screen sharing module, and
steganography module—interact with each other through the MERN stack. This provides a
detailed explanation of the technologies used and the implementation of each module. It
includes code-level discussions for [Link] integration, WebRTC setup, and steganography
encoding/decoding functions, along with front-end and back-end integration.

Department of CSE (Data Science), ATMECE, 3


Mysuru
Secure Chat App 2024-25

This chapter 4 summarizes the work carried out, highlighting how the objectives were met. It
also discusses the limitations of the current system and proposes potential enhancements for
future development, such as adding voice/video calling and advanced encryption algorithms.

Department of CSE (Data Science), ATMECE, 3


Mysuru
CHAPTER 2
LITERATURE SURVEY
Secure Real Chat 2024-25

CHAPTER 2

LITERATURE SURVEY
2.1 Introduction

The evolution of secure communication has been a central focus of research in computer science,
especially with the increasing threats to digital privacy and data integrity. As individuals and
organizations increasingly depend on online communication platforms for exchanging sensitive
information, ensuring the confidentiality and authenticity of that data has become a major
concern. The convergence of real-time communication, steganography, and screen sharing opens
up new avenues for secure, private, and collaborative systems—yet it also brings unique
challenges in terms of implementation and protection from advanced cyber threats.

This literature survey explores existing works and technologies in three major domains: secure
chat applications, steganography techniques, and real-time screen sharing protocols. By
reviewing relevant academic papers, technical articles, and open-source tools, this chapter
identifies the strengths and weaknesses of current systems, highlighting the gaps that this project
aims to address.

Previous studies on secure messaging applications primarily focus on the use of cryptographic
protocols such as AES, RSA, and TLS for ensuring data encryption. While these methods are
effective in preventing unauthorized access, they do not hide the fact that communication is taking
place. In environments where plausible deniability and invisibility of data transmission are
crucial, encryption alone is insufficient—this is where steganography offers an advantage by
concealing the existence of a message within ordinary media files like images.
Steganographic methods such as Least Significant Bit (LSB) insertion, DCT (Discrete Cosine
Transform)-based hiding, and adaptive steganography have been widely researched. However,
their integration with real-time messaging platforms remains limited. Furthermore, the reliability
and performance of screen sharing tools such as WebRTC, VNC, and RDP have also been

Department of CSE (Data Science), ATMECE, Mysuru 9


Secure Real Chat 2024-25

widely studied, but their security aspects—especially in peer-to-peer scenarios—require further


attention.

2.2 Literature Review

Bhatikare et al. presented the design and implementation of a real-time chat application system
developed using WebSocket and Firebase. The primary focus of their work was on enabling
secure and instant communication between users by leveraging the capabilities of WebSocket’s
for real-time data transmission and incorporating end-to-end encryption to ensure message
confidentiality and user privacy. This approach provided a reliable foundation for secure
messaging, making it suitable for general communication needs. However, the application had
notable limitations, particularly the absence of advanced features such as screen sharing and
steganography. These limitations restrict the system's use in scenarios that demand more than just
secure text-based communication. Despite its strengths, the lack of support for hidden message
transmission and collaborative tools highlights the need for further enhancement. In the context
of my project, which aims to build a more feature-rich and privacy-focused chat application, the
work of Bhatikare et al. serves as a foundational reference. It informs the basic framework for
secure messaging, but my project extends this by integrating additional privacy mechanisms like
steganography and real-time collaboration features, addressing the gaps identified in
their implementation.[1]

Gayathri et al. developed a secure instant messaging application that incorporated essential
features such as individual and group chat functionality. The system was designed with a focus
on basic encryption methods and user access control, ensuring that only authorized users could
participate in conversations and that messages remained protected from unauthorized access.
While the application successfully addressed standard requirements for a functional and secure
chat platform, it did not venture into more advanced areas such as media embedding techniques
or screen sharing capabilities. These omissions limit its applicability in modern communication
environments where multimedia sharing and real-time collaboration are increasingly

Department of CSE (Data Science), ATMECE, 10


Mysuru
Secure Real Chat 2024-25

[Link] the project serves as a useful reference for implementing fundamental chat
functionalities, it falls short in terms of innovation and advanced data protection strategies. In
contrast, my project aims to go beyond these basic features by integrating more sophisticated
privacy tools such as steganography and screen sharing, thereby offering a more robust and
versatile communication platform.[2]

Gomathi et al. proposed a secure messaging application that employed a dual-layer security model
combining AES encryption with LSB steganography. This innovative approach allowed sensitive
messages to be encrypted and then embedded within static media files such as images or audio,
thereby enhancing the confidentiality and stealth of data transmission. The system demonstrated
a strong focus on privacy, particularly in scenarios where covert communication was essential.
However, the application was not intended for real-time use, as it was limited to the exchange of
pre-processed static media rather than dynamic, continuous messaging. Despite this limitation,
the work offers significant value by establishing a robust steganographic framework that can be
adapted for more interactive platforms. For my project, this research serves as a crucial
foundation, as it informs the integration of hidden messaging techniques within a real-time chat
environment—bridging the gap between static security methods and live
digital communication.[3]

Wire Swiss GmbH introduced Wire, a commercial secure communication platform designed to
meet modern communication demands with a focus on privacy and versatility. The platform
supports a comprehensive set of features, including encrypted messaging, file sharing, voice and
video calls, as well as screen sharing, making it a robust tool for both personal and professional
use. Its strong emphasis on encryption and cross-platform compatibility positions it as a leading
example of secure communication software. However, despite its advanced feature set, Wire does
not incorporate covert communication methods such as steganography, which limits its ability to
offer concealed message transmission for users requiring a higher degree of discretion. In the
context of my project, Wire serves as a benchmark for high-level communication integration, yet
highlights an important gap that my application aims to fill-by combining these standard
communication tools with hidden messaging through steganography, to enhance privacy and add

Department of CSE (Data Science), ATMECE, 10


Mysuru
Secure Real Chat 2024-25

a layer of stealth in sensitive exchanges.[4]

Tadvi et al. explored the development of next-generation real-time chat applications using the
ReactJS framework. Their work concentrated on enhancing the frontend experience by
optimizing user interface design, improving user experience, and ensuring responsive and
efficient state management. These efforts contributed to a modern and seamless chat interface,
aligning well with the standards of contemporary web applications. However, the study did not
delve into security measures involving file embedding or media-based message protection, which
are becoming increasingly important in secure digital communication. As a result, while their
work is highly relevant for understanding effective frontend architecture and performance
optimization, it lacks the innovative approaches required for ensuring data confidentiality and
covert communication. My project builds upon these frontend insights but extends functionality
by integrating advanced privacy features such as steganography, aiming to create a more secure
and feature-rich real-time chat environment.[5]

Omego et al. introduced a multichannel steganographic model that aimed to enhance the security
of hidden communications through a provably secure hybrid approach. Their model combined
multiple layers of steganographic techniques, making it significantly more resistant to a wide
range of attack vectors and detection methods. By layering various hiding strategies, the system
achieved a high level of obfuscation, offering a strong theoretical foundation for secure and covert
data transmission. However, the complexity of this hybrid model also introduced substantial
computational overhead, rendering it less suitable for real-time communication scenarios. Despite
this limitation, the work provides valuable insights into designing more secure steganographic
systems and sets the groundwork for future innovations. In the context of my project, Omego et
al.’s research serves as an important theoretical reference for strengthening the steganographic
backbone of the application. While my implementation prioritizes real-time performance, the
principles from their hybrid model can inform the development of more secure and resilient
hidden messaging features.[6]

Pang proposed a novel approach to steganography based on adaptive dynamic sampling within a

Department of CSE (Data Science), ATMECE, 10


Mysuru
Secure Real Chat 2024-25

black-box framework. This method focused on enhancing both the imperceptibility and the
security of hidden data by dynamically adjusting sampling techniques based on the host medium,
thereby making the presence of concealed messages more difficult to detect. The adaptive nature
of the technique represented a significant theoretical advancement in the field of covert
communication. However, the approach was primarily conceptual, lacking extensive
experimental validation and real-time applicability, which limits its immediate practical use in
fast-paced communication environments. Despite these constraints, Pang’s work provides a
strong theoretical foundation for developing more secure and less detectable steganographic
systems. For my project, which seeks to integrate effective steganography into a real-time chat
application, this research offers valuable insights that can be adapted to strengthen data hiding
techniques while maintaining system responsiveness and usability.[7]

Roy et al. developed an AI-powered chat application that integrated OpenAI and Chat Engine
APIs to provide intelligent chatbot responses. The project leveraged Redux Toolkit to manage
state efficiently, focusing primarily on enhancing the conversational capabilities and user
interaction within the chat system. While the application demonstrated the effective use of AI
technologies to improve chatbot intelligence and user experience, it did not address important
aspects of secure messaging such as screen sharing or the embedding of hidden messages.
Consequently, the system lacks advanced privacy and covert communication features.
Nonetheless, Roy et al.’s work is relevant in illustrating how AI-driven functionalities can be
incorporated into chat applications, offering potential avenues for future integration of intelligent
assistants alongside secure messaging components in my project.[8]

Xue et al. developed E-chat, a voice-based dialogue system designed to detect and respond to
user emotions through the use of Large Language Models (LLMs). By analyzing emotional
context in spoken conversations, the system aimed to create more empathetic and engaging
interactions between users and the chat platform. While this approach significantly enhances the
user experience by adding an emotional dimension to communication, it primarily focuses on
voice interaction and does not address security concerns related to text or image-based messaging.
Specifically, it lacks features such as message encryption or steganography for secure data

Department of CSE (Data Science), ATMECE, 10


Mysuru
Secure Real Chat 2024-25

transmission. Therefore, although E-chat contributes valuable insights into emotional intelligence
in chat systems, it does not directly align with the core objectives of my project, which centers on
secure, real-time text communication with advanced privacy techniques like steganography.[9]

Wei et al. introduced an innovative generative steganography network that creates stego-images
directly from secret data, eliminating the need for a traditional cover image. By leveraging
generative adversarial networks (GANs), the approach aimed to generate realistic images that
inherently encode hidden messages, pushing the boundaries of conventional steganography
techniques. This method offers a promising future direction for secure data embedding by
combining AI-driven image generation with covert communication. However, the study also
highlighted significant challenges, particularly in maintaining high image quality and ensuring
the invisibility of the embedded messages, which are critical factors for effective steganographic
applications. Despite these obstacles, Wei et al.’s work provides valuable inspiration for
developing advanced steganographic modules that could be incorporated into my project,
potentially enabling more sophisticated and resilient hidden messaging capabilities within a real-
time chat system.[10]

Okello conducted a comprehensive study on the steganalysis of chat-based steganography,


focusing on the detection and analysis of hidden messages within various chat environments. The
research examined multiple detection techniques and revealed significant variability in their
accuracy depending on the platform and method used. This variability underscores the challenges
in reliably identifying covert communications, highlighting the ongoing arms race between
steganographic methods and their detection. Okello’s work is particularly relevant to my project,
as it provides critical insights into the vulnerabilities of hidden messaging systems. Understanding
these detection mechanisms is essential for testing the robustness of my application’s
steganographic features and refining them to ensure stronger resistance against potential
interception and exposure.[11]

Xiang et al. explored recent advancements and ongoing challenges in the field of coverless image
steganography, a technique that enables data hiding without modifying traditional cover images.

Department of CSE (Data Science), ATMECE, 10


Mysuru
Secure Real Chat 2024-25

This approach promises enhanced robustness and improved security by generating stego-objects
directly, thereby reducing the risk of detection compared to conventional steganography methods.
However, the review also highlighted limitations, including restricted payload capacity and
increased complexity in implementation, which pose significant challenges for practical
deployment. Despite these hurdles, Xiang et al.’s work offers valuable insights that could inspire
the development of stealthier and more secure data hiding techniques in future iterations of my
application, contributing to a stronger and less detectable real-time chat platform.[12]

2.3 Outcome of the literature review

Most existing communication systems tend to focus on either secure chat or steganography
independently, rarely combining these advanced functionalities into one cohesive platform. Very
few solutions manage to integrate all three critical features—real-time chat, secure screen sharing,
and steganography—effectively. Your project fills this important gap by delivering a
comprehensive system that supports real-time encrypted messaging, allowing users to
communicate instantly and securely. In addition to secure messaging, it incorporates
steganography techniques to embed secret messages within images, providing an extra layer of
covert communication that enhances privacy beyond conventional encryption. Moreover, your
platform facilitates live screen sharing protected by strong security protocols, enabling seamless
collaboration without compromising sensitive information. By merging these functionalities, the
project not only improves the overall user experience but also addresses rising concerns about
data security and privacy in digital communications. This unique combination sets your
application apart in the communication systems domain, offering a robust, versatile, and privacy-
focused solution that meets the demands of modern users who require both convenience and
confidentiality in their interactions.

Department of CSE (Data Science), ATMECE, 10


Mysuru
CHAPTER 3
METHODOLOGY
Secure Real Chat 2024-25

CHAPTER 3
METHODOLOGY

3.1 Introduction

The methodology of this project aim to address the growing need for secure, private, and user-
friendly communication platforms by integrating three sophisticated features: real-time
encrypted chat, steganography-based secret messaging, and secure live screen sharing. Given the
sensitive nature of data transmitted in modern communication, this project adopts a multi-layered
security approach while maintaining seamless usability to ensure both privacy and [Link]
the core of this project is a modular design methodology, which allows each major component—
real-time chat, steganography, and screen sharing—to be developed, tested, and optimized
independently before being cohesively integrated into a single unified system. This approach not
only facilitates a clearer development path but also enables easier maintenance and future
scalability. The first step in the methodology involves designing the system architecture, which
acts as a blueprint detailing how the client-side application, backend servers, encryption modules,
steganographic processes, and screen sharing mechanisms interact with one another. This
architectural framework is crucial in mapping the data flow pathways, communication protocols,
and security checkpoints that together guarantee efficient, secure, and reliable transmission of
data.

The real-time chat implementation is founded on event-driven, low-latency communication


technologies, such as [Link], which facilitate instantaneous message exchange between users.
To safeguard these communications, robust encryption algorithms—such as AES or end-to-end
encryption—are incorporated, ensuring that messages remain confidential and are protected
against unauthorized access or interception during transit. This segment of the methodology also
addresses issues of synchronization, error handling, and message ordering, critical for
maintaining a smooth user experience. Steganography integration represents an innovative
extension beyond traditional encrypted messaging by embedding hidden information within
innocuous-looking images. This dual-layered security technique adds an additional veil of

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

secrecy, making it significantly harder for adversaries to detect or extract the concealed
messages. The methodology covers the selection and implementation of appropriate
steganographic algorithms—such as Least Significant Bit (LSB) modification along with
procedures for embedding, transmitting, and extracting secret data without degrading the quality
of the carrier images. This part also tackles challenges related to maintaining message integrity
and preventing detection in real-time scenarios.

Complementing these communication features, secure screen sharing is implemented to enable


live collaboration without compromising data confidentiality. Utilizing WebRTC technology,
the system establishes direct peer-to-peer connections that support real-time video and audio
streaming. Encryption protocols are layered onto these streams to ensure that shared content is
protected from eavesdropping or tampering. The methodology further explores balancing the
trade-offs between encryption overhead and streaming latency, striving to maintain a fluid and
secure user [Link] the implementation phase, these methodologies are translated into
concrete system components using a carefully selected technology stack. The frontend is
developed with [Link] and Redux Toolkit to provide a responsive and intuitive user interface,
while the backend leverages [Link], Express, and [Link] for efficient server-side processing
and communication management. Encryption libraries, custom steganographic algorithms, and
WebRTC APIs are integrated to realize the core security and collaboration features. Throughout
the implementation, rigorous testing and debugging ensure robustness and [Link] aids,
including architectural diagrams, flowcharts, sequence diagrams, and illustrative before-and-
after images, are incorporated to provide clear, step-by-step insights into the system’s operation.
These graphics help demystify complex processes such as encrypted data transmission, secret
message embedding, and secure media streaming, enhancing overall understanding.

In summary, the methodology and implementation chapters present a comprehensive, layered


approach to building a next-generation communication platform that prioritizes security and
privacy while delivering seamless real-time interaction and collaboration capabilities. This
holistic strategy ensures that the system not only meets current security standards but also
provides a flexible foundation for future enhancements.

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

3.2 Proposed Methodology

The proposed system, illustrated in Figure 3.1, represents a modular and scalable architecture
designed for a secure chat application that integrates core chat functionalities, screen sharing,
and steganography. Developed using the MERN stack (MongoDB, [Link], [Link],
[Link]), the application also incorporates technologies such as WebRTC for real-time
communication and cryptographic techniques for data security.

Application Development Backend Frontend

Core Chat Auth Chat UI

Screen Share Backend WebRTC Screen UI

Encryption Steg UI
Steganography

Figure 3.1: System Architecture for Secure Chat Application

1. Application Development Layer

As shown in Figure 3.1(left section), the Application Development layer consists of the main
functional modules that drive the features of the system. These include:

a. Core Chat:

This module handles the backbone of the messaging system. It facilitates real-time
communication between users through WebSocket’s (using [Link]). Key operations

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

like message transmission, delivery acknowledgments, chat history, and MongoDB

storage are all controlled via this component. It routes all data through the central Backend,
ensuring secure and organized message handling.

b. Screen Share:

The screen-sharing feature enables live transmission of the user's screen to another
participant. This is achieved via WebRTC, a peer-to-peer media exchange protocol. The
Screen Share module captures the screen stream from the sender and transmits it securely
through the backend using signalling services, as seen in Figure 1.2 connecting to the
WebRTC module in the Backend Layer.

c. Steganography:

This module provides covert communication by allowing users to hide text messages
inside image files using steganographic algorithms (such as LSB - Least Significant Bit).
The encoded image is then passed to the backend for encryption and transmission. This
hidden communication ensures additional layers of privacy and is crucial for secure data
sharing in sensitive environments. Each of these three core modules communicates with a
centralized Backend Controller, forming the core of the Application Development section.

2. Backend Layer

The Backend Layer (middle section of Figure 3.1) is the orchestration engine of the
application. It contains multiple components that facilitate security, communication, and
control:

a. Auth Module

The Auth component manages user registration, login, and session control. It implements
JWT (JSON Web Tokens) to ensure secure and stateless user authentication. Upon

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

successful authentication, users can access the UI components relevant to their session,

such as the Chat UI or Steg UI.

b. WebRTC Module

This handles WebRTC signalling necessary for establishing peer-to-peer connections used
in screen sharing. The module communicates with the frontend’s Screen UI to render
shared screens and supports tasks like SDP (Session Description Protocol) exchanges and
ICE (Interactive Connectivity Establishment) candidate sharing.

c. Encryption Module

Sensitive data, such as steganographically embedded images or messages, passes through


the Encryption module. Here, advanced encryption techniques (e.g., AES for symmetric
or RSA for asymmetric encryption) are applied to maintain confidentiality and data
integrity during transmission. These backend services coordinate with the Application
Development layer and relay data securely to the frontend interfaces.

3. Frontend Layer

The Frontend Layer (rightmost part of Figure 3.1) consists of dedicated user interfaces,
developed using [Link], each tailored for specific interactions:

a. Chat UI

This component presents the real-time chat interface, supporting message input/output,
timestamps, and delivery indicators. It connects with the Auth and Core Chat modules for
message management and user access control.

b. Screen UI

The Screen UI provides users with controls to initiate or terminate screen-sharing sessions.

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

It also displays the remote user's screen in real-time, driven by WebRTC interactions
handled by the backend.

c. Steg UI

This interface supports encoding and decoding hidden messages within images. Users can
upload an image, embed secret text using frontend libraries (e.g., [Link]), and
view results after transmission. It interacts closely with both the Steganography module
and the Encryption module.

Workflow Summary (End-to-End)

1. Authentication: Users authenticate via the Auth module before accessing the
application.

2. Messaging: Authenticated users utilize the Chat UI to exchange real-time encrypted


messages using the Core Chat and Encryption modules.

3. Screen Sharing: Through the Screen Share module, users initiate sessions that are routed
via the Backend and WebRTC, with the output displayed in Screen UI.

4. Steganographic Messaging: Users encode secret messages into images via the Steg UI,
and these are secured with encryption before being sent. The receiving user can decode
and extract the message from the image.

5. All functionalities are integrated through the Backend, which serves as the control center
for routing, authentication, encryption, and [Link] methodology ensures a robust,
scalable, and secure communication platform. By modularizing features into distinct
components (chat, screen share, and steganography) and integrating them through a
secure backend, the system guarantees both usability and privacy. The use of WebRTC,
JWT, and encryption algorithms reinforces data confidentiality and supports advanced
privacy-preserving features.

Department of CSE (Data Science),ATMECE, Mysuru


CHAPTER 4
CONCLUSION
Secure Real Chat 2024-25

CHAPTER 4

Conclusion

The project titled "Secure Real-Time Chat with Steganography and Screen Sharing" successfully
addresses the critical need for secure, private, and efficient digital communication. In an era
where data breaches, surveillance, and cyber threats are increasingly common, this application
offers a robust solution by combining three essential features—real-time encrypted chat, screen
sharing, and message hiding through steganography—into a single, seamless platform. Through
the use of modern web technologies such as the MERN stack and [Link], the application
ensures low-latency and responsive communication. The implementation of WebRTC allows
real-time screen sharing with strong security and minimal delay, which is highly useful in remote
collaboration, online training, and support. Furthermore, the integration of LSB-based
steganography enhances privacy by enabling users to hide sensitive messages within image files,
thus preventing detection even if the data is intercepted.

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

References
[1] Bhatikare, P., Bansode, P., Gavade, S., & Garkal, A. (2025). Design and Implementation of a
Real-Time Chat Application System. Developed a scalable real-time chat app using WebSocket’s
and Firebase with end-to-end encryption. Lacks screen sharing and steganography features.

[2] Gayathri, R., & Kalieswari, C. (2022). Development of Chat Application. Created a secure
instant messaging system with group chat, but without screen sharing or steganography.

[3] Gomathi, S., & Radhika, C. (2025). A Secure Messaging Application Using Steganography
and AES Encryption: A Dual-Layer Secure Messaging System. Embedded messages in
images/audio with AES and LSB steganography; limited to static media, no real-time features.

[4] Wire Swiss GmbH. (2025). Wire (Software). Offers encrypted messaging, calls, file sharing,
and screen sharing, but does not support steganography.

[5] Tadvi, B., Parmar, B., & Gupta, S. (2025). Next-Gen React Chat Applications: Enhancing
Real-Time Communication. Focused on React architecture and real-time messaging, lacks
alternative data handling and multimedia features.

[6] Omego, O., & Bosy, M. (2025). Multichannel Steganography: A Provably Secure Hybrid
Model. Proposed a secure hybrid steganography resistant to multichannel attacks; complex and
inefficient for practical use.

[7] Pang, K. (2025). Provable Secure Steganography Based on Adaptive Dynamic Sampling.
Introduced secure steganography for black box settings, theoretical with limited experimental
validation.

[8] Roy, K., & Sanyal, K. (2024). Development and Integration of AI-Powered Chat Application
Using OpenAI and Chat Engine APIs. Built AI-driven chat with Redux Toolkit and React Router;
focused on text generation rather than communication features.

[9] Xue, H., Liang, Y., Mu, B., et al. (2023). E-chat: Emotion-Sensitive Spoken Dialogue System
Using LLMs. Developed voice-based emotional chat interface; does not cover text or multimodal
messaging.

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

[10] Wei, P., et al. (2022). Generative Steganography Network. Created stego images from secret
data without cover images; challenges remain in image quality and imperceptibility.

[11] Okello, M. O. (2023). Steganalysis of Chat-Based Steganography. Analyzed detection


methods of hidden messages in chats; accuracy varies across platforms.

[12] Xiang, X., et al. (2024). Advancements and Challenges in Coverless Image Steganography.
Reviewed coverless steganography techniques avoiding cover modification; limited
payload and robustness.

Department of CSE (Data Science),ATMECE, Mysuru


Secure Real Chat 2024-25

Department of CSE (Data Science),ATMECE, Mysuru

You might also like