Project report to the honorable supervisor, Dr. Rami Step 1: The algorithms that we will use in the process of encoding text information are Aes,rsa,3des,des Other algorithms may be used Step 2: The process of steganography that has been encrypted using one of the algorithms mentioned in step 1 The masking process is done in the images using steganography The masking process is done by choosing the best location in the image for concealment. In the event of a modification or compression of this image, we try as much as possible to make the information stored in the image non-perishable. It is expected that we will use a genetic algorithm for this task. Step 3: الترجمة طويلة جد ًا وال يمكن حفظها. In order for our work to be good, this image is sent using Multi cloud computing and stored on Dropbox and on Aws Amazon Cloud, which are similar to Google Drive, but they provide broader possibilities for using api in this field for easy uploading and downloading images through Access token. In order to check integration, md5 is used to ensure that the image has not been tampered with before uploading and after downloading.