Steganography in Game Actions
The exchange of messages has always carried with it the timeless challenge of secrecy. From whispers in shadows to the enigmatic notes written in the margins of history, humanity has long sought ways to convey thoughts that remain imperceptible to all but the chosen few. In the intricate patterns of...
Saved in:
Main Authors: | Ching-Chun Chang, Isao Echizen |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10844282/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Image vaccine against steganography in encrypted domain
by: Xinran Li, et al.
Published: (2025-02-01) -
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
by: Kisakye Diana Michelle, et al.
Published: (2024-12-01) -
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
by: Ilham Firman Ashari, et al.
Published: (2024-03-01) -
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
by: Omar Y. Abdulhammed, et al.
Published: (2022-10-01) -
The Content and Game Action Weight of Senior Football Players as Goalkeeper
by: A. Dinca, et al.
Published: (2024-12-01)