Assured Supraliminal Steganography in Computer Games
暂无分享,去创建一个
John Aycock | Vineet Sinha | Anton Mosunov | Daniel Medeiros Nunes de Castro | Heather Crawford | Rashmi Kumari
[1] C. Pandu Rangan,et al. Steganographic Communication in Ordered Channels , 2006, Information Hiding.
[2] Scott Craver,et al. A supraliminal channel in a wireless phone application , 2009, MM&Sec '09.
[3] Sebastian Zander,et al. Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[4] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[5] Steven J. Murdoch,et al. Covert Channels for Collusion in Online Computer Games , 2004, Information Hiding.
[6] John Aycock,et al. Supraliminal Audio Steganography: Audio Files Tricking Audiophiles , 2009, Information Hiding.
[7] Nick Montfort,et al. Racing the Beam: The Atari Video Computer System , 2009 .
[8] Stefan Katzenbeisser,et al. Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens , 2006, Information Hiding.
[9] Vernon Rego,et al. Covert channels in combinatorial games , 2012, SimuTools.
[10] Ling-Hwei Chen,et al. A perfect maze based steganographic method , 2010, J. Syst. Softw..
[11] Juan E. Tapiador,et al. Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..
[12] M. Pooyan,et al. LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[13] C. Laisant. Sur la numération factorielle, application aux permutations , .
[14] Scott Knight,et al. Permutation-based steganographic channels , 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009).
[15] Roger Wattenhofer,et al. Hidden communication in P2P networks Steganographic handshake and broadcast , 2011, 2011 Proceedings IEEE INFOCOM.
[16] Mohammad Hassan Shirali-Shahreza,et al. Steganography in SMS by Sudoku puzzle , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[17] Jun Yu,et al. A Supraliminal Channel in a Videoconferencing Application , 2008, Information Hiding.
[18] Tapio Seppänen,et al. Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[19] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.