{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T12:59:54Z","timestamp":1775912394719,"version":"3.50.1"},"reference-count":26,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T00:00:00Z","timestamp":1682985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Vlatacom Institute of High Technologies, Belgrade, Serbia","award":["Prj_122 vPCWD"],"award-info":[{"award-number":["Prj_122 vPCWD"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The main goal of this paper is the proposal of a key-based steganographic system in which the ratio of capacity and image quality metrics that represents the stego object while reducing the detectability of hidden content was improved. The main contribution of the proposed steganographic system is a new algorithm for selecting stego areas. The area selection algorithm is based on clustering the pixels of the cover object into a predetermined number of clusters. The goal of this selection of areas (clusters) is to group as many homogeneous parts of the image as possible in order to cover these areas with as few rectangular shapes as possible. Since the data on the defined rectangles represent the key of the system, the capacity of the additional secret channel is minimized in this way. On the obtained stego-carriers, an embedding of test random content is performed in order to estimate its detectability. By combining the proposed area selection method with the Minimal Decimal Difference steganographic method, a system was created with an optimal trade-off between detectability of secret content, quality and capacity of the carrier, and the length of the stego-key. Finally, a comparison of the obtained results with relevant adaptive steganographic methods is presented. The proposed concept obtains its verification in one practical system for secure file transfer of controlled cryptographic strength.<\/jats:p>","DOI":"10.3390\/sym15051015","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T01:36:38Z","timestamp":1683077798000},"page":"1015","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0898-4457","authenticated-orcid":false,"given":"Predrag","family":"Milosav","sequence":"first","affiliation":[{"name":"Vlatacom Institute, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Milan","family":"Milosavljevi\u0107","sequence":"additional","affiliation":[{"name":"Vlatacom Institute, 11000 Belgrade, Serbia"},{"name":"Faculty of Technical Sciences, Singidunum University, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8195-8576","authenticated-orcid":false,"given":"Zoran","family":"Banjac","sequence":"additional","affiliation":[{"name":"Vlatacom Institute, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,2]]},"reference":[{"key":"ref_1","unstructured":"Ramakrishnan, S. (2020). Cryptographic and Information Security Approaches for Images and Videos, CRC Press."},{"key":"ref_2","first-page":"3198","article-title":"A Study and Review of Techniques of Spatial Steganography","volume":"4","author":"Kaur","year":"2015","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","article-title":"Digital image steganography: Survey and analysis of current methods","volume":"90","author":"Cheddad","year":"2010","journal-title":"Signal Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","article-title":"Image steganography in spatial domain: A survey","volume":"65","author":"Hussain","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","article-title":"New adaptive steganographic method using least-significant-bit substitution and pixel-value differ-encing","volume":"6","author":"Khodaei","year":"2012","journal-title":"IET Image Process."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1080\/01969722.2016.1214459","article-title":"Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution","volume":"47","author":"Khodaei","year":"2016","journal-title":"Cybern. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.procs.2016.05.174","article-title":"A Steganographic Method Combining LSB Substitution and PVD in a Block","volume":"85","author":"Swain","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hussain, M., Wahab, A.W.A., Javed, N., and Jung, K.-H. (2016). Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images. Symmetry, 8.","DOI":"10.3390\/sym8060041"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11517","DOI":"10.1016\/j.eswa.2012.02.106","article-title":"A novel technique for image steganography based on a high payload method and edge detection","volume":"39","author":"Ioannidou","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_10","first-page":"110","article-title":"A comparsion between using SIFT and SURF for characteristic region based image steganography","volume":"9","author":"Hamid","year":"2012","journal-title":"Int. Juurnal Comput. Sci. Issues (IJCSI)"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"32257","DOI":"10.1007\/s11042-018-6237-5","article-title":"Steganographic approach to enhancing secure data communication using contours and clustering","volume":"77","author":"Manikandan","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"ref_12","unstructured":"(2022, October 26). Practical Steganalysis of Digital Images-State of the Art-Researchgate (No Date). Available online: https:\/\/www.researchgate.net\/publication\/2534088_Practical_Steganalysis_of_Digital_Images_-_State_of_the_Art."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/93.959097","article-title":"Detecting LSB steganography in color, and gray-scale images","volume":"8","author":"Fridrich","year":"2001","journal-title":"IEEE Multimed."},{"key":"ref_14","first-page":"127","article-title":"Comparative Study of Different Quality Assessment Techniques on Color Images","volume":"2","author":"Sara","year":"2019","journal-title":"Iconic Res. Eng."},{"key":"ref_15","first-page":"81","article-title":"Steganography: Various Techniques In Spatial and Transform Domain","volume":"1","author":"Divya","year":"2016","journal-title":"Int. J. Adv. Sci. Res. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"8","DOI":"10.4236\/jcc.2019.73002","article-title":"Image Quality Assessment through FSIM, SSIM, MSE and PSNR\u2014A Comparative Study","volume":"7","author":"Sara","year":"2019","journal-title":"J. Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","article-title":"A steganographic method for images by pixel-value differencing","volume":"24","author":"Wu","year":"2003","journal-title":"Pattern Recognit. Lett."},{"key":"ref_18","unstructured":"Milosav, P., Banjac, Z., Unka\u0161evi\u0107, T., and Milosavljevi\u0107, M. (2020, January 18\u201320). Minimal Decimal Difference Method Applied in Spatial Image Steganography. Proceedings of the 2020 19th International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo, Bosnia and Herzegovina."},{"key":"ref_19","first-page":"19","article-title":"Stego-Objects Metrics Improvement Using the Method of Minimal Decimal Difference in Spatial Image Seganography","volume":"5","author":"Milosav","year":"2020","journal-title":"J. Mechatron. Autom. Identif. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","article-title":"High payload steganography mechanism using hybrid edge detector","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"e6448","DOI":"10.1002\/cpe.6448","article-title":"High-quality steganography scheme using hybrid edge detector and Vernam algorithm based on hybrid fuzzy neural network","volume":"33","author":"Dhawan","year":"2021","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.patrec.2021.04.026","article-title":"Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality","volume":"147","author":"Geetha","year":"2021","journal-title":"Pattern Recognit. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ganguly, S., and Mukherjee, I. (2022, January 24\u201326). Image Sterilization through Adaptive Noise Blending in Integer Wavelet Transformation. Proceedings of the 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India.","DOI":"10.1109\/INDICON56171.2022.10039861"},{"key":"ref_24","first-page":"25","article-title":"Defeating Steganography with Multibit Sterilization Using Pixel Eccentricity","volume":"11","author":"Mukherjee","year":"2015","journal-title":"IPSI BgD Internet Res. Soc."},{"key":"ref_25","unstructured":"(2023, April 13). Available online: https:\/\/www.vlatacominstitute.com\/encryption-authentication."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDCF.318666","article-title":"Latest Trends in Deep Learning Techniques for Image Steganography","volume":"15","author":"Kumar","year":"2023","journal-title":"Int. J. Digit. Crime Forensics"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/5\/1015\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:28:17Z","timestamp":1760124497000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/5\/1015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,2]]},"references-count":26,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["sym15051015"],"URL":"https:\/\/doi.org\/10.3390\/sym15051015","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,2]]}}}