{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:51:15Z","timestamp":1770547875234,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319051482","type":"print"},{"value":"9783319051499","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05149-9_16","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:36:27Z","timestamp":1394184987000},"page":"245-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Assured Supraliminal Steganography in Computer Games"],"prefix":"10.1007","author":[{"given":"Anton","family":"Mosunov","sequence":"first","affiliation":[]},{"given":"Vineet","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Crawford","sequence":"additional","affiliation":[]},{"given":"John","family":"Aycock","sequence":"additional","affiliation":[]},{"given":"Daniel Medeiros Nunes","family":"de Castro","sequence":"additional","affiliation":[]},{"given":"Rashmi","family":"Kumari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"16_CR1","series-title":"LNCS","first-page":"109","volume-title":"IH 2006","author":"R Bergmair","year":"2007","unstructured":"Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 109\u2013123. Springer, Heidelberg (2007)"},{"key":"16_CR2","series-title":"LNCS","first-page":"42","volume-title":"IH 2006","author":"RC Chakinala","year":"2007","unstructured":"Chakinala, R.C., Kumarasubramanian, A., Manokaran, R., Noubir, G., Rangan, C.P., Sundaram, R.: Steganographic communication in ordered channels. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 42\u201357. Springer, Heidelberg (2007)"},{"key":"16_CR3","series-title":"LNCS","first-page":"355","volume-title":"IH 1998","author":"S Craver","year":"1998","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355\u2013368. Springer, Heidelberg (1998)"},{"key":"16_CR4","series-title":"LNCS","first-page":"283","volume-title":"IH 2008","author":"S Craver","year":"2008","unstructured":"Craver, S., Li, E., Yu, J., Atakli, I.: A supraliminal channel in a videoconferencing application. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 283\u2013293. Springer, Heidelberg (2008)"},{"key":"16_CR5","series-title":"LNCS","first-page":"1","volume-title":"IH 2009","author":"H Crawford","year":"2009","unstructured":"Crawford, H., Aycock, J.: Supraliminal audio steganography: audio files tricking audiophiles. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 1\u201314. Springer, Heidelberg (2009)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: Increasing the capacity of LSB-based audio steganography. In: 2002 IEEE Workshop on Multimedia Signal Processing, pp. 336\u2013338 (2002)","DOI":"10.1109\/MMSP.2002.1203314"},{"key":"16_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/b10818","volume-title":"The Golden Age of Video Games","author":"R Dillon","year":"2011","unstructured":"Dillon, R.: The Golden Age of Video Games. CRC Press, Boca Raton (2011)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Eidenbenz, R., Locher, T., Wattenhofer, R.: Hidden communication in P2P networks: steganographic handshake and broadcast. In: IEEE INFOCOM, pp. 954\u2013962 (2011)","DOI":"10.1109\/INFCOM.2011.5935323"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Forest, K., Knight, S.: Permutation-based steganographic channels. In: 4th International Conference in Risks and Security of Internet and Systems, pp. 67\u201373 (2009)","DOI":"10.1109\/CRISIS.2009.5411975"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2005.12.001","volume":"25","author":"JC Hernandez-Castro","year":"2006","unstructured":"Hernandez-Castro, J.C., Blasco-Lopez, I., Estevez-Tapiador, J.M., Ribagorda-Garnacho, A.: Steganography in games: a general methodology and its application to the game of go. Comput. Secur. 25(1), 64\u201371 (2006)","journal-title":"Comput. Secur."},{"key":"16_CR11","doi-asserted-by":"crossref","first-page":"176","DOI":"10.24033\/bsmf.378","volume":"16","author":"C-A Laisant","year":"1888","unstructured":"Laisant, C.-A.: Sur la num\u00e9ration factorielle, application aux permutations. Bulletin de la Soci\u00e9t\u00e9 Math\u00e9matique de France 16, 176\u2013183 (1888)","journal-title":"Bulletin de la Soci\u00e9t\u00e9 Math\u00e9matique de France"},{"issue":"12","key":"16_CR12","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.1016\/j.jss.2010.07.054","volume":"83","author":"H-L Lee","year":"2010","unstructured":"Lee, H.-L., Lee, C.-F., Chen, L.-H.: A perfect maze based steganographic method. J. Syst. Softw. 83(12), 2528\u20132535 (2010)","journal-title":"J. Syst. Softw."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: 10th Symposium in Applied Mathematics of the American Mathematical Society, pp. 179\u2013193 (1960). Symposium was actually held in 1958","DOI":"10.1090\/psapm\/010\/0113289"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Li, E., Craver, S.: A supraliminal channel in a wireless phone application. In: 11th ACM Workshop on Multimedia and Security, pp. 151\u2013154 (2009)","DOI":"10.1145\/1597817.1597843"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Steganography in SMS by sudoku puzzle. In: IEEE\/ACS International Conference on Computer Systems and Applications, pp. 844\u2013847 (2008)","DOI":"10.1109\/AICCSA.2008.4493626"},{"key":"16_CR16","unstructured":"Macaulay, G.C.: (trans.) The History of Herodotus, vol. 2. Macmillan, London (1890)"},{"key":"16_CR17","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7588.001.0001","volume-title":"Racing the Beam: The Atari Video Computer System","author":"N Montfort","year":"2009","unstructured":"Montfort, N., Bogost, I.: Racing the Beam: The Atari Video Computer System. MIT Press, Cambridge (2009)"},{"key":"16_CR18","volume-title":"Hoyle\u2019s Rules of Games","year":"2001","unstructured":"Morehead, A.H., Mott-Smith, G. (eds.): Hoyle\u2019s Rules of Games, 3rd edn. Penguin Putnam Inc, New York (2001). Revised by Morehead, P.D.","edition":"3"},{"key":"16_CR19","unstructured":"Ms. Pac-Man. http:\/\/meatfighter.com\/mspacman2010\/ 2010. Accessed 21 May 2013"},{"key":"16_CR20","series-title":"LNCS","first-page":"355","volume-title":"IH 2004","author":"SJ Murdoch","year":"2005","unstructured":"Murdoch, S.J., Zieli\u0144ski, P.: Covert channels for collusion in online computer games. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 355\u2013369. Springer, Heidelberg (2005)"},{"key":"16_CR21","unstructured":"National Institute of Standards and Technology: Recommendation for Key Management - Part 1: General (revised), 800\u2013857 edn. NIST Special Publication, Berhampur (2007)"},{"key":"16_CR22","unstructured":"Pittman, J.: The Pac-Man dossier. http:\/\/home.comcast.net\/~jpittman2\/pacman\/pacmandossier.html. Accessed 16 June 2011"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Pooyan, M., Delforouzi, A.: LSB-based audio steganography method based on lifting wavelet transform. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 600\u2013603 (2007)","DOI":"10.1109\/ISSPIT.2007.4458198"},{"key":"16_CR24","unstructured":"PySolFC: a Python solitaire game collection. http:\/\/pysolfc.sourceforge.net\/. Accessed 21 May 2013"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Ritchey, P.C., Rego, V.J.: Covert channels in combinatorial games. In: 5th International ICST Conference on Simulation Tools and Techniques, pp. 234\u2013241 (2012)","DOI":"10.4108\/icst.simutools.2012.247733"},{"key":"16_CR26","unstructured":"Shankar, A.R.: HTML5 game development tutorial: breakout part I - introduction to Canvas. http:\/\/www.adityaravishankar.com\/2011\/10\/html5-game-development-tutorial-breakout-i-introduction-to-canvas\/, 11 October 2011. Accessed 21 May 2013"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO \u201983, pp. 51\u201367 (1984)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Zander, S., Armitage, G., Branch, P.: Covert channels in multiplayer first person shooter online games. In: 33rd IEEE Conference on Local Computer Networks, pp. 215\u2013222 (2008)","DOI":"10.1109\/LCN.2008.4664172"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05149-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:35:57Z","timestamp":1746146157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05149-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051482","9783319051499"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05149-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}