This document discusses the history and techniques of steganography. It begins by defining steganography as concealed writing and provides some historical examples of its use. It then describes how information can be hidden in various carriers like images, audio, and video. The document outlines several steganography techniques including LSB substitution and modifying DCT coefficients in images. It also discusses embedding data in IP datagrams and detecting steganography. In closing, it notes both benefits and risks of using steganography.