David C. Wyld, et al. (Eds): CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp. 161–168, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2217        Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw Ambedkar Institute of Advanced Communication Technologies and Research, Delhi, India nsingh1973@gmail.com, bhoopeshcse@yahoo.com, rsrao08@yahoo.in ABSTRACT This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the help of Steganalysis, it detect the hide message which is transfer in the network. Furthermore, we have described the security system classification. KEYWORDS Steganography, Steganalysis, Steganography History, Digital Image Forensics, Cryptography 1. INTRODUCTION Information security is most challenging issues nowadays. Information or message is being exchanged over various types of network. Communication channel is not secure due to the presence of hacker who is waiting for a chance to gain access the confidential data then use this technique to secure the information or messages is called Steganography. Steganography is a process of concealing the massages in a cover without leaving a remarkable trace is known as Steganography. To detect the hidden message in Steganography is Steganalysis. It is an art and science of detecting messages hidden using Steganography. It is used to detect and to identify suspected packages, determine whether they have a payload encoded into them, or not and, if possible, recover that payload. Steganalysis is the technique for searching and finding the occurrence of message which is hidden [11]. Steganalysis as destroying the information which is kept secret it can be performed even if there is no idea of secret information. However forensic is about searching the information. Sometime it is reasonable to do so. It is due to the reason because sometime finding secret information is very tough and sometime not possible without having knowledge of concept which was used for stegnography. Even if you discover the tool which was used for stegnography finding the secret information is still very tough because most technique employ the cryptographic technique to scramble the secret text. This scheme was possible in classical Steganography system where the security depends on the secrecy of encoding