摘要:To ensure secrecy in communication, especially if it is through image or any other digital file, attention should be paid on the tool concerned in transferring the file. It may entail intricate algorithms and cryptic measures. But the query here is how far it is multifarious? How thorny is it for the impostor to haul out the masked data? If these questions are genuinely answered by one, without doubt the algorithm is a rock. Here presented one such scheme which, of course, answers the above, ensures defence at three levels namely cryptography, steganography and fingerprinting. The first one involves encryption of text, steganography deals with burying the stealthy information, finally, fingerprinting, in general, toting up fingerprints to an entity or recognizing those which are previously inherent to a item. The efficacy is tested by the delineated image aspects. Additionally, this method can be put into action easily and bulky size of secret data can be passed on.