This paper is a brief overview of the process of steganography and how it works. Included is a discussion of how it works, its value, detection, and tools available to perform the process. This paper was originally published on ibm.com and is published here with new information and updates.