- Stego-Only Attack
In this type of attack only the stego file is available to the attacker. It means that an attacker can only access the stego file to retrieve the hidden message.
- Cover Attack
In cover attack , an attacker compares the original file with stego file to detect the pattern difference . Fr example an original and stego image is compared to know the pattern variance in that to find whether the steganography is done or not
- Visual Detection :
Steganography can also be detected by using visual lookup. Sometimes the unusual variance and patterns can lead to the failure and detection of the steganography . Generally due to lack of proper encrypting within the image, it is detected by viewing the image . Specially , in case when the steganography is done using colour variance