Steganography in Game Actions
The exchange of messages has always carried with it the timeless challenge of secrecy. From whispers in shadows to the enigmatic notes written in the margins of history, humanity has long sought ways to convey thoughts that remain imperceptible to all but the chosen few. In the intricate patterns of...
Saved in:
Main Authors: | Ching-Chun Chang, Isao Echizen |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10844282/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Digital steganography model and its formal description
by: Haitao SONG, et al.
Published: (2020-06-01) -
A robust audio steganography algorithm based on differential evolution
by: Zhaopin SU, et al.
Published: (2021-11-01) -
Computationally secure steganography based on speech synthesis
by: Menghan LI, et al.
Published: (2022-06-01) -
A COMPUTATIONAL SYSTEM FOR EVALUATING HUMAN PERCEPTION IN VIDEO STEGANOGRAPHY
by: Marcin PERY, et al.
Published: (2024-12-01) -
Steganography in NFT images
by: Zichi WANG, et al.
Published: (2022-06-01)