Abstract: Information security is the main concern of current scenario, which has a number of approaches to preserve data via cryptography, watermarking, steganography techniques. One such approach may always create a negative impact on all the process, which involves with vulnerable activities such as malicious and harmful content spreading by embedding. To identify such content, steganalysis has been performed. The counter technique of image steganography is called as image steganalysis, which begins by recognizing the object that exists in the embedded source file. This paper gives a survey of the approaches and techniques, tools used in steganalysis. This paper also makes the discussion about the problems of those techniques in the real-time analysis.
Keywords: Data security, Steganalysis, Steganography, Image Processing, Pixel-Decimation.