{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:01:52Z","timestamp":1768413712067,"version":"3.49.0"},"reference-count":37,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061246","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:47:16Z","timestamp":1748494036000},"page":"1031-1054","source":"Crossref","is-referenced-by-count":3,"title":["FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images"],"prefix":"10.32604","volume":"84","author":[{"given":"Mardhatillah Shevy","family":"Ananti","sequence":"first","affiliation":[]},{"given":"Adifa Widyadhani Chanda","family":"D\u2019Layla","sequence":"additional","affiliation":[]},{"given":"Ntivuguruzwa Jean De La","family":"Croix","sequence":"additional","affiliation":[]},{"given":"Tohari","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"108580","DOI":"10.1016\/j.compeleceng.2023.108580","article-title":"Advanced audio coding steganography algorithm with distortion minimization model based on audio beat","volume":"106","author":"Zhang","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref2","first-page":"103612","article-title":"Secret data sharing through coverless video steganography based on bit plane segmentation","volume":"78","author":"Debnath","year":"2023","journal-title":"J Inf Secur Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"124390","DOI":"10.1016\/j.eswa.2024.124390","article-title":"A survey on deep-learning-based image steganography","volume":"254","author":"Song","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"123715","DOI":"10.1016\/j.eswa.2024.123715","article-title":"Learning-based image steganography and watermarking: a survey","volume":"249","author":"Hu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"6770","DOI":"10.1109\/ACCESS.2023.3237393","article-title":"A comprehensive study of digital image steganographic techniques","volume":"11","author":"Rahman","year":"2023","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","article-title":"Digital image steganography: a literature survey","volume":"609","author":"Mandal","year":"2022","journal-title":"Inf Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","article-title":"An optimal information hiding approach based on pixel value differencing and modulus function","volume":"108","author":"Sahu","year":"2019","journal-title":"Wirel Pers Commun"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"107264","DOI":"10.1016\/j.sigpro.2019.107264","article-title":"Improved PPVO-based high-fidelity reversible data hiding","volume":"167","author":"Wu","year":"2020","journal-title":"Signal Process"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ins.2019.03.032","article-title":"Dynamic improved pixel value ordering reversible data hiding","volume":"489","author":"Weng","year":"2019","journal-title":"Inf Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"103097","DOI":"10.1016\/j.jvcir.2021.103097","article-title":"Hybrid prediction-based pixel-value-ordering method for reversible data hiding","volume":"77","author":"Chang","year":"2021","journal-title":"J Vis Commun Image Represent"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.cjph.2023.06.016","article-title":"A high-capacity and robust steganography algorithm for quantum images","volume":"85","author":"Khan","year":"2023","journal-title":"Chin J Phys"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"30749","DOI":"10.1007\/s11042-018-6187-y","article-title":"Separable reversible data hiding in encrypted images with improved security and capacity","volume":"77","author":"Li","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"100385","DOI":"10.1016\/j.eij.2023.05.010","article-title":"Toward secret data location via fuzzy logic and convolutional neural network","volume":"24","author":"De La Croix","year":"2023","journal-title":"Egypt Inform J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"14340","DOI":"10.1109\/ACCESS.2021.3052494","article-title":"GBRAS-net: a convolutional neural network architecture for spatial image steganalysis","volume":"9","author":"Reinel","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1186\/s42400-023-00156-x","article-title":"A convolutional neural network to detect possible hidden data in spatial domain images","volume":"6","author":"De La Croix Ntivuguruzwa","year":"2023","journal-title":"Cybersecurity"},{"key":"ref16","first-page":"271","article-title":"LSB based image steganography using McEliece cryptosystem","volume":"40","author":"Mohammed","year":"2021","journal-title":"Mater Today Proc"},{"key":"ref17","first-page":"24","article-title":"A LSB based image steganography using random pixel and bit selection for high payload","volume":"7","author":"Ali","year":"2021","journal-title":"Int J Math Sci Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"6128","DOI":"10.1109\/TCSVT.2023.3348291","article-title":"Invisible and steganalysis-resistant deep image hiding based on one-way adversarial invertible networks","volume":"34","author":"Hu","year":"2024","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"181893","DOI":"10.1109\/ACCESS.2020.3028315","article-title":"A dynamic three-bit image steganography algorithm for medical and e-healthcare systems","volume":"8","author":"Siddiqui","year":"2020","journal-title":"IEEE Access"},{"key":"ref20","series-title":"Conference on Information Communications Technology and Society (ICTAS); 2024 Mar 7\u20138","first-page":"63","article-title":"A steganographic approach based on pixel blocks differencing to enhance the quality of the stego image","author":"Zaini","year":"2024"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"7911","DOI":"10.1007\/s11042-018-6031-4","article-title":"Local complexity based adaptive embedding mechanism for reversible data hiding in digital images","volume":"78","author":"Cao","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"103060","DOI":"10.1016\/j.jvcir.2021.103060","article-title":"High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels","volume":"76","author":"Chen","year":"2021","journal-title":"J Vis Commun Image Represent"},{"key":"ref23","first-page":"103068","article-title":"A data hiding scheme based on the difference of image interpolation algorithms","volume":"65","author":"Bai","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.patrec.2022.05.014","article-title":"Reversible image data hiding based on scalable difference expansion","volume":"159","author":"Ding","year":"2022","journal-title":"Pattern Recognit Lett"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.aej.2023.11.013","article-title":"Optimized steganography techniques based on PVDS and genetic algorithm","volume":"85","author":"Fahim","year":"2023","journal-title":"Alex Eng J"},{"key":"ref27","series-title":"2024 7th International Conference on Informatics and Computational Sciences (ICICoS)","first-page":"496","article-title":"Image steganography using customized differences between the neighboring pixels","author":"Ramadhan","year":"2024 Jul 17\u201318"},{"key":"ref28","unstructured":"Signal and Image Processing Institute (USC). Volume 3: miscellaneous. [cited 2024 May 1]. Available from: https:\/\/sipi.usc.edu\/database\/database.php?volume=misc."},{"key":"ref29","unstructured":"Lorem Ipsum. The standard lorem ipsum passage. [cited 2024 May 1]. Available from: https:\/\/www.lipsum.com\/."},{"key":"ref30","unstructured":"DICOM Library. Free online medical knowledge exchange portal\u2014DICOM Library. [cited 2024 May 1]. Available from: https:\/\/www.dicomlibrary.com\/."},{"key":"ref31","unstructured":"Scott Mader K. CT medical images. [cited 2024 May 1]. Available from: https:\/\/www.kaggle.com\/datasets\/kmader\/siim-medical-images."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","author":"Bas","year":"2011","journal-title":"Information hiding"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"131001","DOI":"10.1109\/ACCESS.2023.3334650","article-title":"Enhancing secret data detection using convolutional neural networks with fuzzy edge detection","volume":"11","author":"Croix","year":"2023","journal-title":"IEEE Access"},{"key":"ref34","first-page":"353","article-title":"Image steganography by pixel-value differencing using general quantization ranges","volume":"141","author":"Wu","year":"2024","journal-title":"Comput Model Eng Sci"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.jksuci.2019.12.007","article-title":"Improved payload capacity in LSB image steganography uses dilated hybrid edge detection","volume":"34","author":"Setiadi","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","article-title":"A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT","volume":"574","author":"Wang","year":"2021","journal-title":"Inf Sci"},{"key":"ref37","first-page":"100593","article-title":"Trends in audio scene source counting and analysis","volume":"18","author":"Nigro","year":"2024","journal-title":"Mach Learn Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_61246\/TSP_CMC_61246.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:09Z","timestamp":1763343249000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061246","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}