Academic stego mechanisms focus on embedding functions. Most proof-of-concept implementations embed random data in the assumption that the message is already encrypted.
Commercial stego tools neglect current research and implement out of date embedding as well as encryption procedures.
Examples:
Model-based steganography (Sallee 2003)
http://www.invisiblesecrets.com
In brief:
There is a gap between academic stego research and commercial tools.