Steganography is considered as the craftsmanship and study of concealing restricted information on display secretly inside an honest cover information to guarantee security of communicated information over an organization. The word Steganography gets its starting point from two Greek words steganos and graphia, signifying "covered composition". The use of Steganography follows as far as possible back to past where it had been used by the romans and outdated Egyptians. Any advanced record like picture, video, sound, message or IP parcels can be utilized to conceal secret message. For the most part, the records used to conceal information is named as cover object, and for the documents containing secret message it is named as stego-object. Contrasted with different computerized designs, picture documents are simpler to find and have more significant level of twisting resistance over different kinds of records with high concealing limit because of the excess of advanced data portrayal of a picture information and accordingly it is supposed to be the most famous cover objects as of now. Steganography acquired unmistakable quality in the past few years because of the raising requirement for giving secret in a transparent environment like the internet. While anybody can notice the imparted information for what it's worth, Steganography intends to conceal the actual presence of the message and makes correspondence imperceptible. Different strategies are utilized to encrypt data like cryptography that expects to scramble the data sent, consequently making it unreadable while Steganography is utilized to conceal the data so nobody can detect its reality. Among the algorithms that is utilized to get data both Steganography and cryptography secure a piece of information. Steganography has numerous specialized difficulties like high concealing limit and imperceptibility. The modified least significant bit (LSB) replacement technique for information hiding. Normal LSB method involves the least significant bit of successive pixels for immerse the message which draws speculation to transferral of out of sight message. Assuming the doubt is raised, then, at that point, the objective of steganography is crushed. Considering LSB method as the most basic one, it's widely utilized everywhere. In our execution pixels to be subbed with data are chosen randomly which makes it better than the traditional methodology. The potency of the computation is moreover extended by using keyless steganography. This article proposes a cleverprocedure to conceal data in a 24 bpp RGB picture utilizing changed LSB replacement strategy.

1.
Pradeepa
,
N.
,
Ram Kumar
,
C. P.
, &
Chenthur Pandian
,
S.
(
2019
).
Compressive Sensing-Based Diagnosis of Diabetic Retinopathy from Fundus Image–A Sparse Approach
.
IETE Journal of Research
,
1
12
.
2.
Saravanan
,
M.
, &
Priya
,
A.
(
2019
).
An Algorithm for Security Enhancement in Image Transmission Using Steganography
.
Journal of the Institute of Electronics and Computer
,
1
(
1
),
1
8
.
3.
Kadhim
,
I. J.
,
Premaratne
,
P.
,
Vial
,
P. J.
, &
Halloran
,
B.
(
2019
).
Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
.
Neurocomputing
,
335
,
299
326
.
4.
Liao
,
X.
,
Yu
,
Y.
,
Li
,
B.
,
Li
,
Z.
, &
Qin
,
Z.
(
2019
).
A new payload partition strategy in color image steganography
.
IEEE Transactions on Circuits and Systems for Video Technology
,
30
(
3
),
685
696
.
5.
Abirami
,
A.
,
Akshaya
,
N.
,
Poornakala
,
D.
, &
Priyanka
,
D.
(
2013
).
C. R.
kumar
, ―Enhancement of Satellite Image Resolution 0 10 20 30 40 50 60 70 80 90 a et al. (2013) Saran ya et al.(2014) Sinh a et al.(2014) P ro po sed A lgo rithm Peppers Lena Baboon Football with Moving Objects.
International Journal of Electronics and Communication Engineering
,
4
(
6
),
22
27
.
6.
Tao
,
J.
,
Li
,
S.
,
Zhang
,
X.
, &
Wang
,
Z.
(
2018
).
Towards robust image steganography
.
IEEE Transactions on Circuits and Systems for Video Technology
,
29
(
2
),
594
600
.
7.
Kumar
,
C. R.
,
Vijayalakshmi
,
B.
,
Karthik
,
S.
,
Hanitha
,
R.
, &
Hemapreetha
,
T.
(
2018
).
Drip rate monitor for infusion fluids
.
Taga J
,
14
,
2312
2316
.
8.
Ali
,
U. A. M. E.
,
Sohrawordi
,
M.
, &
Uddin
,
M. P.
(
2019
).
A robust and secured image steganography using LSB and random bit substitution
.
American Journal of Engineering Research (AJER)
,
8
(
2
),
39
44
.
9.
Pradhan
,
A.
,
Sekhar
,
K. R.
, &
Swain
,
G.
(
2018
).
Digital image steganography using LSB substitution, PVD, and EMD
.
Mathematical Problems in Engineering
, 2018.
10.
Sahu
,
A. K.
, &
Swain
,
G.
(
2020
).
Reversible image steganography using dual-layer LSB matching
.
Sensing and Imaging
,
21
(
1
),
1
21
.
11.
Chatterjee
,
A.
,
Ghosal
,
S. K.
, &
Sarkar
,
R.
(
2020
).
LSB based steganography with OCR: an intelligent amalgamation
.
Multimedia tools and applications
,
79
(
17
),
11747
11765
.
12.
Elhadad
,
A.
(
2020
).
Data sharing using proxy re-encryption based on DNA computing
.
Soft Computing
,
24
(
3
),
2101
2108
.
13.
Polyakov
Y
,
Rohloff
K
,
Sahu
G
,
Vaikuntanathan
V.
(
2017
)
Fast proxy re-encryption for publish/subscribe systems
.
ACM Trans Priv Secur (TOPS)
20
(
4
):
14
This content is only available via PDF.
Published by AIP Publishing.
You do not currently have access to this content.