Steganography methods can arise during research or during malware investigation. To aid replicability and understanding, such methods should be described in a comparable manner. Our paper proposes a simple way to achieve that. However, the different components of a steganography method are linked to several attributes which need explanation. Simply click on an item to get more information about it.