This paper reviews various steganographic techniques for information hiding, emphasizing their applications in securing sensitive information shared over the internet. It classifies steganographic methods into categories such as pure, secret key, and public key steganography, and highlights multiple techniques including substitution, transform domain, and statistical methods. The goal of steganography is to embed secret data within a cover medium so discreetly that only intended recipients are aware of its existence.