Compare and contrast different types of Steganography methods that are used for hiding confidential data. Choose at least 4 to describe in detail.
What are some of the challenges by type, that could present issues?
Are there any detection methods by type used to find such activities?
Given this day and age, are these methods still viable? Does steganography have any "competition"?
If so, what technology and why?