This document discusses various image steganography techniques. It begins by introducing image steganography and its applications, such as hiding passwords and encrypting private files. It then covers several embedding and extraction methods, including least significant bit substitution, pixel indicator, stego color cycle, triple-A, Max-bit, optimal pixel adjustment procedure, and inverted pattern approaches. For each method, it provides a brief overview of the technique and how it works to hide information in the image in an imperceptible way.