Figure 3:
Flow Diagram for secure communication using Cryptography & Steganography