Steganography conceals the fact that a message is being sent. It is a method akin to covert channels, spread spectrum communication and invisible inks which adds another step in security. A message in ciphertext may arouse suspicion while an invisible message will not.
This paper introduces steganography by explaining what it is, providing a brief history with illustrations of some methods for implementing steganography, and comparing available software providing steganographic services. Though the forms are many, the focus of the software evaluation in this paper is on the use of images in steganography.
Section 2 will define steganography, provide a brief history, and explain various methods of steganography. Section 3 will review several software applications that provide steganographic services and mention the approaches taken. Section 4 will conclude with a brief discussion of the implications of stegaonographic technology. Section 5 will list the resources used in researching this topic and additional readings for those interested in more in-depth understanding of steganography.