In this report, we discuss some approaches to obtaining fingerprints of steganography tools which embed message in fixed positions. Three main cases will be analyzed, including embedding message in the reserved positions of the image file header, embedding message in the sequential LSBs (least ...