First it is shown that the majority of steganographic applications for confidential communication have fundamental weaknesses. On the way to secure steganographic applications, the development of attacks to assess security is essential. The attacks on known algorithms presented here visualize the fallacy that the least significant bits are irrelevant. In addition, more objective methods for the detection of steganography using statistical means.