Steganographic protocols play an important role in computer security systems and the transmission of strategic data. The security of these methods is guaranteed by the way secret information is placed on data storage media. This work will describe new approaches in which user characteristics will also be used to place data in the container. This will allow the creation of a new class of steganographic procedures dedicated to specific people or groups of users.