Return to Article Details Detection of tampered data using steganography techniques