CONCLUSION
As a communication networks develop, there are many opportunities for businesses to become more streamlined and
efficient. However, there are also many more opportunities for unauthorized persons to gain access to sensitive
information. The information thus obtained can be used in many difference imaginative ways as per eavesdropper's
motivations and resourcefulness. If you want to keep prying eyes away from secure data, proper encryption is the most
obvious answer. Steganography is a fascinating and effective method of hiding data that has been used throughout
history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods
even exist. This thesis has proved the concept of securing data through steganography both in terms of software
simulation and physical experiment