This document presents a novel technique for image steganography. It begins with an abstract that discusses using image steganography to hide secret data in an image with a key so that hackers cannot detect it. The introduction discusses the importance of security and outlines the objectives of hiding secret data in images, text, audio or video files. It then provides block diagrams of the transmitter and extraction processes, which involve steps like image resizing, plane separation, data hiding using DWT and DCT techniques, and data extraction using a key. Stimulated results show DWT, DCT and encrypted/decrypted images. The conclusion discusses using different algorithms like LSB and chaos encryption to hide data confidentiality. The document proposes using stegan