With the use of picture steganography, secret information may be safely transferred to a host image. This may be done in a variety of ways. The proper algorithm selection is an essential first step. This essay provides a study of the well-known steganography techniques and explores their appeal, drawbacks, and relative effectiveness. The fundamentals and characteristics of steganography images are presented in the study. Techniques for image steganography can be divided into groups based on a variety of factors. This essay also touches on separation. In this work, five different types of photos are reported. In this paper, each strategy is thoroughly examined, along with its applicability, and many tactics are reduced and compared. There are also several tracks made of stainless steel. Security provision is a problem that cannot be avoided when sending private information and will not be compromised. The biggest disparity in this field's most popular algorithm. This is the stage where secret messages in a picture file are being deciphered. This is because the algorithm's simplicity made it possible to decode messages quickly. As a result, the SRM steganography algorithm is the name given to the Security Extensibility methods.