{"id":"https://openalex.org/W2044994532","doi":"https://doi.org/10.1109/icc.2014.6883411","title":"Covert channels in online rogue-like games","display_name":"Covert channels in online rogue-like games","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2044994532","doi":"https://doi.org/10.1109/icc.2014.6883411","mag":"2044994532"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2014.6883411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086649250","display_name":"Hasnain Lakhani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099336","display_name":"Menlo School","ror":"https://ror.org/01240pn49","country_code":"US","type":"education","lineage":["https://openalex.org/I4210099336"]},{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hasnain Lakhani","raw_affiliation_strings":["LUMS, Computer Science Laboratory SRI International Menlo Park, CA, United States","Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA"],"affiliations":[{"raw_affiliation_string":"LUMS, Computer Science Laboratory SRI International Menlo Park, CA, United States","institution_ids":["https://openalex.org/I1298353152"]},{"raw_affiliation_string":"Comput. Sci. Lab., SRI Int., Menlo Park, CA, USA","institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011363617","display_name":"Fareed Zaffar","orcid":null},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fareed Zaffar","raw_affiliation_strings":["School of Science and Engineering Lahore University of Management Sciences Lahore, Pakistan","Sch. of Sci. & Eng., Lahore Univ. of Manage. Sci., Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"School of Science and Engineering Lahore University of Management Sciences Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]},{"raw_affiliation_string":"Sch. of Sci. & Eng., Lahore Univ. of Manage. Sci., Lahore, Pakistan","institution_ids":["https://openalex.org/I207789805"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086649250"],"corresponding_institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"],"apc_list":null,"apc_paid":null,"fwci":0.2439,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58655092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"761","last_page":"767"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.8585590720176697},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.7602324485778809},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7576567530632019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7477530241012573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6825671195983887},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5855346918106079},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.48122358322143555},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41334742307662964},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37351423501968384},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3732612133026123},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14813369512557983}],"concepts":[{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.8585590720176697},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.7602324485778809},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7576567530632019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7477530241012573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6825671195983887},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5855346918106079},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.48122358322143555},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41334742307662964},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37351423501968384},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3732612133026123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14813369512557983},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2014.6883411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W852997327","https://openalex.org/W1536024840","https://openalex.org/W1591473542","https://openalex.org/W1878907771","https://openalex.org/W1964331153","https://openalex.org/W1993704367","https://openalex.org/W2028197392","https://openalex.org/W2101302040","https://openalex.org/W2114062029","https://openalex.org/W2114674883","https://openalex.org/W2129389941","https://openalex.org/W2146520149","https://openalex.org/W2164582681","https://openalex.org/W6632102286","https://openalex.org/W6675319365","https://openalex.org/W6681758714"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W3203504906","https://openalex.org/W3190769222","https://openalex.org/W1568579691","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W2497446005"],"abstract_inverted_index":{"Covert":[0],"channels":[1],"allow":[2],"two":[3],"parties":[4],"to":[5,59,83],"exchange":[6],"secret":[7,22],"data":[8,23],"in":[9,24,37],"the":[10,16,42,60,72],"presence":[11],"of":[12,62],"adversaries":[13],"without":[14],"disclosing":[15],"fact":[17],"that":[18,39,78],"there":[19],"is":[20],"any":[21],"their":[25],"communications.":[26],"We":[27,56],"propose":[28],"and":[29,49,76],"implement":[30],"EEDGE,":[31],"an":[32,86],"improved":[33],"method":[34],"for":[35,74],"steganography":[36],"mazes":[38,70],"builds":[40],"upon":[41],"work":[43],"done":[44],"by":[45],"Lee":[46],"et":[47],"al;":[48],"has":[50],"a":[51],"significantly":[52],"higher":[53],"embedding":[54],"capacity.":[55],"apply":[57],"EEDGE":[58],"setting":[61],"online":[63],"rogue-like":[64],"games,":[65],"which":[66],"have":[67],"randomly":[68],"generated":[69],"as":[71],"levels":[73],"players;":[75],"show":[77],"this":[79],"can":[80],"be":[81],"used":[82],"successfully":[84],"create":[85],"efficient,":[87],"error-free,":[88],"high":[89],"bit-rate":[90],"covert":[91],"channel.":[92]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
