1. bookVolume 2021 (2021): Issue 3 (July 2021)
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year
access type Open Access

A First Look at Private Communications in Video Games using Visual Features

Published Online: 27 Apr 2021
Page range: 433 - 452
Received: 30 Nov 2020
Accepted: 16 Mar 2021
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year

Internet privacy is threatened by expanding use of automated mass surveillance and censorship techniques. In this paper, we investigate the feasibility of using video games and virtual environments to evade automated detection, namely by manipulating elements in the game environment to compose and share text with other users. This technique exploits the fact that text spotting in the wild is a challenging problem in computer vision. To test our hypothesis, we compile a novel dataset of text generated in popular video games and analyze it using state-of-the-art text spotting tools. Detection rates are negligible in most cases. Retraining these classifiers specifically for game environments leads to dramatic improvements in some cases (ranging from 6% to 65% in most instances) but overall effectiveness is limited: the costs and benefits of retraining vary significantly for different games, this strategy does not generalize, and, interestingly, users can still evade detection using novel configurations and arbitrary-shaped text. Communicating in this way yields very low bitrates (0.3-1.1 bits/s) which is suited for very short messages, and applications such as microblogging and bootstrapping off-game communications (dialing). This technique does not require technical sophistication and runs easily on existing games infrastructure without modification. We also discuss potential strategies to address efficiency, bandwidth, and security constraints of video game environments. To the best of our knowledge, this is the first such exploration of video games and virtual environments from a computer vision perspective.


[1] Haseeb Ahmad, Sardar Muhammad Usama, Wajahat Hussain, and Muhammad Latif Anjum. A sketch is worth a thousand navigational instructions. Autonomous Robots, pages 1–21, 2021.Search in Google Scholar

[2] Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao. Zombiecoin 2.0: managing next-generation bot-nets using bitcoin. International Journal of Information Security, 17(4):411–422, 2018.Search in Google Scholar

[3] D Anthony, D Johnson, P Lutz, and B Yuan. A behavior based covert channel within anti-virus updates. In Proceedings of the International Conference on Security and Management (SAM), page 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2012.Search in Google Scholar

[4] Matt Burgess. This is why Russia’s attempts to block Telegram have failed. https://www.wired.co.uk/article/telegram-in-russia-blocked-web-app-ban-facebook-twitter-google, April 2018.Search in Google Scholar

[5] Sam Burnett, Nick Feamster, and Santosh Vempala. Chipping away at censorship firewalls with user-generated content. In USENIX Security Symposium, pages 463–468. Washington, DC, 2010.Search in Google Scholar

[6] Michal Bušta, Lukáš Neumann, and Jirı Matas. Deep textspotter: An end-to-end trainable scene text localization and recognition framework. In IEEE International Conference on Computer Vision (ICCV), Venice, pages 22–29, 2017.Search in Google Scholar

[7] Xiangrong Chen and Alan L Yuille. Detecting and reading text in natural scenes. In Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. IEEE, 2004.Search in Google Scholar

[8] Chee Kheng Ch’ng and Chee Seng Chan. Total-text: A comprehensive dataset for scene text detection and recognition. In 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), volume 1, pages 935–942. IEEE, 2017.Search in Google Scholar

[9] Google Cloud. Cloud Vision. https://cloud.google.com/vision/.Search in Google Scholar

[10] Samantha Cole. Second Life Users Are Protesting With Their Avatars. https://www.vice.com/en/article/kbgnwa/second-life-users-are-protesting-with-their-avatars, February 2017.Search in Google Scholar

[11] Sarah Deen. Nice city! Photo series captures real life GTA V locations. https://metro.co.uk/2015/02/06/nice-city-photo-series-captures-real-life-gta-v-locations-5052766/#, February 2015.Search in Google Scholar

[12] Abdelrahman Desoky and Mohamed Younis. Chestega: chess steganography methodology. Security and Communication Networks, 2(6):555–566, 2009.Search in Google Scholar

[13] Malte Diehl. Secure covert channels in multiplayer games. In Proceedings of the 10th ACM Workshop on Multimedia and Security, pages 117–122. ACM, 2008.Search in Google Scholar

[14] Entertainment Software Association (ESA). Essential facts about the computer and video game industry: 2018 sale, demographic, and usage data. http://www.theesa.com/wp-content/uploads/2018/05/EF2018_FINAL.pdf, 2018.Search in Google Scholar

[15] Boris Epshtein, Eyal Ofek, and Yonatan Wexler. Detecting text in natural scenes with stroke width transform. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, pages 2963–2970. IEEE, 2010.Search in Google Scholar

[16] Wu-chang Feng, Francis Chang, Wu-chi Feng, and Jonathan Walpole. A traffic characterization of popular on-line games. IEEE/ACM Transactions on Networking (TON), 13(3):488–500, 2005.Search in Google Scholar

[17] Ji Gao, Jack Lanchantin, Mary Lou Soffa, and Yanjun Qi. Black-box generation of adversarial text sequences to evade deep learning classifiers. In 2018 IEEE Security and Privacy Workshops (SPW), pages 50–56. IEEE, 2018.Search in Google Scholar

[18] Dileep George, Wolfgang Lehrach, Ken Kansky, Miguel Lázaro-Gredilla, Christopher Laan, Bhaskara Marthi, Xinghua Lou, Zhaoshi Meng, Yi Liu, Huayan Wang, et al. A generative vision model that trains with high data efficiency and breaks text-based captchas. Science, 358(6368):eaag2612, 2017.Search in Google Scholar

[19] Chance Gibbs and Narasimha Shashidhar. Stegorogue: Steganography in two-dimensional video game maps. Advances in Computer Science: an International Journal, 4(3):141–146, 2015.Search in Google Scholar

[20] GTAall. Best Crews in GTA Online: April 2016. https://www.gtaall.com/gta-5/news/27947-gta-online-best-crews-april.html, April 2016.Search in Google Scholar

[21] Ankush Gupta, Andrea Vedaldi, and Andrew Zisserman. Synthetic data for text localisation in natural images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2315–2324, 2016.Search in Google Scholar

[22] Bridger Hahn, Rishab Nithyanand, Phillipa Gill, and Rob Johnson. Games without frontiers: Investigating video games as a covert channel. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pages 63–77. IEEE, 2016.Search in Google Scholar

[23] Christopher Hale, Lei Chen, and Qingzhong Liu. A new villain: Investigating steganography in source engine based video games. In Proceedings of the 2012 Hong Kong International Conference on Engineering & Applied Science (HKICEAS), Hong Kong, China, December 14, volume 16, 2012.Search in Google Scholar

[24] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H Witten. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11(1):10–18, 2009.Search in Google Scholar

[25] Julio C Hernandez-Castro, Ignacio Blasco-Lopez, Juan M Estevez-Tapiador, and Arturo Ribagorda-Garnacho. Steganography in games: A general methodology and its application to the game of go. computers & security, 25(1):64–71, 2006.Search in Google Scholar

[26] Megan Hess. Fighting Turkey’s Twitter Ban With DNS Graffiti. https://mashable.com/2014/03/21/twitter-ban-turkey-graffiti/#E7qrq61jAmqA, March 2014.Search in Google Scholar

[27] Freedom House. Freedom on the net. Washington, DC: Freedom House, 2019.Search in Google Scholar

[28] Jane Hu. The Second Act of Social-Media Activism. https://www.newyorker.com/culture/cultural-comment/the-second-act-of-social-media-activism, August 2020.Search in Google Scholar

[29] Wajahat Hussain, Javier Civera, Luis Montano, and Martial Hebert. Dealing with small data and training blind spots in the manhattan world. In Applications of Computer Vision (WACV), 2016 IEEE Winter Conference on, pages 1–9. IEEE, 2016.Search in Google Scholar

[30] Max Jaderberg, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. Synthetic data and artificial neural networks for natural scene text recognition. arXiv preprint arXiv:1406.2227, 2014.Search in Google Scholar

[31] Max Jaderberg, Karen Simonyan, Andrew Zisserman, et al. Spatial transformer networks. In Advances in neural information processing systems, pages 2017–2025, 2015.Search in Google Scholar

[32] Kanghyun Jo et al. Led dot matrix text recognition method in natural scene. Neurocomputing, 151:1033–1041, 2015.Search in Google Scholar

[33] Daryl Johnson, Peter Lutz, and Bo Yuan. Behavior-based covert channel in cyberspace. In Intelligent Decision Making Systems, pages 311–318. World Scientific, 2010.Search in Google Scholar

[34] Kevin S Killourhy and Roy A Maxion. Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pages 125–134. IEEE, 2009.Search in Google Scholar

[35] Itzik Kotler and Ziv Gadot. Turbot: a next generation botnet. http://www.hackitoergosum.org/2010/HES2010-ikolter-zgadot-Turbot-Next-Generation-Botnet.pdf, 2010.Search in Google Scholar

[36] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012.Search in Google Scholar

[37] Pierre-Yves Laffont, Zhile Ren, Xiaofeng Tao, Chao Qian, and James Hays. Transient attributes for high-level understanding and editing of outdoor scenes. ACM Transactions on graphics (TOG), 33(4):1–11, 2014.Search in Google Scholar

[38] Hasnain Lakhani and Fareed Zaffar. Covert channels in online rogue-like games. In Communications (ICC), 2014 IEEE International Conference on, pages 761–767. IEEE, 2014.Search in Google Scholar

[39] Hui-Lung Lee, Chia-Feng Lee, and Ling-Hwei Chen. A perfect maze based steganographic method. Journal of Systems and Software, 83(12):2528–2535, 2010.Search in Google Scholar

[40] Minghui Liao, Baoguang Shi, Xiang Bai, Xinggang Wang, and Wenyu Liu. Textboxes: A fast text detector with a single deep neural network. In AAAI, pages 4161–4167, 2017.Search in Google Scholar

[41] Xuebo Liu, Ding Liang, Shi Yan, Dagui Chen, Yu Qiao, and Junjie Yan. Fots: Fast oriented text spotting with a unified network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 5676–5685, 2018.Search in Google Scholar

[42] Yuliang Liu, Hao Chen, Chunhua Shen, Tong He, Lianwen Jin, and Liangwei Wang. Abcnet: Real-time scene text spotting with adaptive bezier-curve network. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 9809–9818, 2020.Search in Google Scholar

[43] Zichuan Liu, Guosheng Lin, Sheng Yang, Fayao Liu, Weisi Lin, and Wang Ling Goh. Towards robust curve text detection with conditional spatial expansion. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 7269–7278, 2019.Search in Google Scholar

[44] Shangbang Long, Jiaqiang Ruan, Wenjie Zhang, Xin He, Wenhao Wu, and Cong Yao. Textsnake: A flexible representation for detecting text of arbitrary shapes. In Proceedings of the European conference on computer vision (ECCV), pages 20–36, 2018.Search in Google Scholar

[45] Asaf Lubin. A New Era of Mass Surveillance is Emerging Across Europe. https://www.justsecurity.org/36098/era-mass-surveillance-emerging-europe/, January 2017.Search in Google Scholar

[46] Jianqi Ma, Weiyuan Shao, Hao Ye, Li Wang, Hong Wang, Yingbin Zheng, and Xiangyang Xue. Arbitrary-oriented scene text detection via rotation proposals. IEEE Transactions on Multimedia, 2018.Search in Google Scholar

[47] Fabrizia Malgieri. Modern Warfare reaches 62.7 million active monthly users. https://www.gamereactor.eu/modern-warfare-reaches-627-million-active-monthly-users/, April 2020.Search in Google Scholar

[48] Marco Margaritoff. ’Grand Theft Auto V’ Is Most Profitable Entertainment Title Ever With $6 Billion in Sales. https://www.complex.com/pop-culture/2018/04/grand-theft-auto-v-5-most-profitable-entertainment-title-ever-6-billion-sales, April 2018.Search in Google Scholar

[49] Mark Mazzetti and Justin Elliott. Spies Infiltrate a Fantasy Realm of Online Games. https://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html, December 2013.Search in Google Scholar

[50] Michael J Milford and Gordon F Wyeth. Seqslam: Visual route-based navigation for sunny summer days and stormy winter nights. In 2012 IEEE International Conference on Robotics and Automation, pages 1643–1649. IEEE, 2012.Search in Google Scholar

[51] Mohsen Minaei, Pedro Moreno-Sanchez, and Aniket Kate. R3c3: Cryptographically secure censorship resistant rendezvous using cryptocurrencies. https://eprint.iacr.org/2018/454.pdf, 2018.Search in Google Scholar

[52] Cheang Ming. China has launched another crackdown on the internet ? but it’s different this time. https://www.cnbc.com/2017/10/26/china-internet-censorship-new-crackdowns-and-rules-are-here-to-stay.html, October 2017.Search in Google Scholar

[53] Greg Mori and Jitendra Malik. Recognizing objects in adversarial clutter: Breaking a visual captcha. In Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on, volume 1, pages I–I. IEEE, 2003.Search in Google Scholar

[54] Anton Mosunov, Vineet Sinha, Heather Crawford, John Aycock, Daniel Medeiros Nunes de Castro, and Rashmi Kumari. Assured supraliminal steganography in computer games. In International Workshop on Information Security Applications, pages 245–259. Springer, 2013.Search in Google Scholar

[55] Steven J Murdoch and Piotr Zieli«ski. Covert channels for collusion in online computer games. In International Workshop on Information Hiding, pages 355–369. Springer, 2004.Search in Google Scholar

[56] Tayyab Naseer, Wolfram Burgard, and Cyrill Stachniss. Robust visual localization across seasons. IEEE Transactions on Robotics, 34(2):289–302, 2018.Search in Google Scholar

[57] NetBlocks. Egypt filters 34,000 domains in bid to block opposition campaign platform. https://netblocks.org/reports/egypt-filters-34000-domains-in-bid-to-block-opposition-campaign-platform-7eA1blBp, April 2019.Search in Google Scholar

[58] Nintendo. Animal Crossing: New Horizons Usage Guidelines for Businesses and Organizations . https://www.nintendo.co.jp/animalcrossing_announcement/en/index.html, November 2007.Search in Google Scholar

[59] Naomoto Niwayama, Nasen Chen, Takeshi Ogihara, and Yukio Kaneda. A steganographic method for mazes. In Proc. of Pacific Rim Workshop on Digital Steganography, 2002.Search in Google Scholar

[60] Tatiana Novikova, Olga Barinova, Pushmeet Kohli, and Victor Lempitsky. Large-lexicon attribute-consistent text recognition in natural images. In European Conference on Computer Vision, pages 752–765. Springer, 2012.Search in Google Scholar

[61] Paul Benjamin Osterlund. Turkey marks one year without Wikipedia. https://www.theverge.com/2018/4/30/17302142/wikipedia-ban-turkey-one-year-anniversary, April 2018.Search in Google Scholar

[62] Zhan-He Ou and Ling-Hwei Chen. Hiding data in tetris. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, volume 1, pages 61–67. IEEE, 2011.Search in Google Scholar

[63] Zhan-He Ou and Ling-Hwei Chen. A steganographic method based on tetris games. Information Sciences, 276:343–353, 2014.Search in Google Scholar

[64] Gene Park. Joe Biden’s ‘Animal Crossing’ island was definitely made by a pro gamer. https://www.washingtonpost.com/video-games/2020/10/16/biden-animal-crossing-island/, October 2020.Search in Google Scholar

[65] Sarah Perez. Android Users Can Now Record And Publish Their Video Gameplay From The Google Play Games App. https://techcrunch.com/2015/10/28/android-users-cannow-record-publish-their-video-gameplay-from-the-google-play-games-app/, October 2015.Search in Google Scholar

[66] Pranesh Prakash. Can India Trust Its Government on Privacy? https://india.blogs.nytimes.com/2013/07/11/can-india-trust-its-government-on-privacy/, July 2013.Search in Google Scholar

[67] Siyang Qin. Text Spotting in the Wild. PhD thesis, UC Santa Cruz, 2018.Search in Google Scholar

[68] Ahmed Sabir, Francesc Moreno-Noguer, and Lluís Padró. Textual visual semantic dataset for text spotting. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pages 542–543, 2020.Search in Google Scholar

[69] Daisy Schofield. Black Lives Matter meets Animal Crossing: how protesters take their activism into video games. https://www.theguardian.com/games/2020/aug/07/black-lives-matter-meets-animal-crossing-how-protesters-take-their-activism-into-video-games, August 2020.Search in Google Scholar

[70] Yao Shen, Wei Yang, and Liusheng Huang. Concealed in web surfing: Behavior-based covert channels in http. Journal of Network and Computer Applications, 101:83–95, 2018.Search in Google Scholar

[71] Baoguang Shi, Xiang Bai, and Cong Yao. An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition. IEEE transactions on pattern analysis and machine intelligence, 39(11):2298–2304, 2017.Search in Google Scholar

[72] Baoguang Shi, Xinggang Wang, Pengyuan Lyu, Cong Yao, and Xiang Bai. Robust scene text recognition with automatic rectification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4168–4176, 2016.Search in Google Scholar

[73] M Hassan Shirali-Shahreza and Mohammad Shirali-Shahreza. Steganography in sms by sudoku puzzle. In Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International Conference on, pages 844–847. IEEE, 2008.Search in Google Scholar

[74] Jouni Smed, Timo Knuutila, and Harri Hakonen. Can we prevent collusion in multiplayer online games. In Proceedings of the Ninth Scandinavian Conference on Artificial Intelligence (SCAI 2006), pages 168–175, 2006.Search in Google Scholar

[75] Congzheng Song and Vitaly Shmatikov. Fooling ocr systems with adversarial text images. arXiv preprint arXiv:1802.05385, 2018.Search in Google Scholar

[76] Keith Stuart. Gamer communities: the positive side. https://www.theguardian.com/technology/gamesblog/2013/jul/31/gamer-communities-positive-side-twitter, July 2013.Search in Google Scholar

[77] Brian Taylor. 9 Great Videogame Flashlights. https://www.pastemagazine.com/articles/2016/04/9-great-videogameflashlights.html, April 2016.Search in Google Scholar

[78] Iain Thomson. Germany, France lobby hard for terror-busting encryption backdoors ? Europe seems to agree. https://www.theregister.co.uk/2017/02/28/german_french_ministers_breaking_encryption/, February 2017.Search in Google Scholar

[79] Zhi Tian, Weilin Huang, Tong He, Pan He, and Yu Qiao. Detecting text in natural image with connectionist text proposal network. In European Conference on Computer Vision, pages 56–72. Springer, 2016.Search in Google Scholar

[80] PG Vandana and Bobbinpreet Kaur. A novel technique for led dot-matrix text detection and recognition for nonuniform color system. In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, pages 2750–2754. IEEE, 2016.Search in Google Scholar

[81] Andreas Veit, Tomas Matera, Lukas Neumann, Jiri Matas, and Serge J. Belongie. Coco-text: Dataset and benchmark for text detection and recognition in natural images. arXiv preprint arXiv:1601.07140, 2016.Search in Google Scholar

[82] Paul Vines and Tadayoshi Kohno. Rook: Using video games as a low-bandwidth censorship resistant communication platform. In Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pages 75–84. ACM, 2015.Search in Google Scholar

[83] Kai Wang and Serge Belongie. Word spotting in the wild. In European Conference on Computer Vision, pages 591–604. Springer, 2010.Search in Google Scholar

[84] Zhi-Hui Wang, Chin-Chen Chang, Ming-Chu Li, et al. A sudoku based wet paper hiding scheme. International Journal of Smart Home, 3(2):1–11, 2009.Search in Google Scholar

[85] Tom Warren. Minecraft still incredibly popular as sales top 200 million and 126 million play monthly. https://www.theverge.com/2020/5/18/21262045/minecraft-sales-monthly-players-statistics-youtube, May 2020.Search in Google Scholar

[86] Human Rights Watch. Russia: ?Big Brother? Law Harms Security, Rights. https://www.hrw.org/news/2016/07/12/russia-big-brother-law-harms-security-rights, July 2016.Search in Google Scholar

[87] Human Rights Watch. Belarus: Internet Disruptions, Online Censorship. https://www.hrw.org/news/2020/08/28/belarus-internet-disruptions-online-censorship, August 2020.Search in Google Scholar

[88] Sarah Wheaton. Obama Is First in Their Second Life. https://thecaucus.blogs.nytimes.com/2007/03/31/obama-is-firstin-their-second-life/, March 2007.Search in Google Scholar

[89] Brenda K Wiederhold. Social media and social organizing: From pandemic to protests. Cyberpsychology, Behavior, and Social Networking, 23(9):579–580, 2020.Search in Google Scholar

[90] Tom Wijman. The World’s 2.7 Billion Gamers Will Spend $159.3 Billion on Games in 2020; The Market Will Surpass $200 Billion by 2023. https://newzoo.com/insights/articles/newzoo-games-market-numbers-revenues-and-audience-2020-2023/, May 2020.Search in Google Scholar

[91] Tommy Wilkes. Pakistan lifts ban on YouTube after launch of local version. https://www.reuters.com/article/us-pakistan-youtube-idUSKCN0UW1ER, January 2016.Search in Google Scholar

[92] Peter Winkler. The advent of cryptology in the game of bridge. Cryptologia, 7(4):327–332, 1983.Search in Google Scholar

[93] Xing Xu, Jiefu Chen, Jinhui Xiao, Lianli Gao, Fumin Shen, and Heng Tao Shen. What machines see is not what they get: Fooling scene text recognition models with adversarial text images. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 12304–12314, 2020.Search in Google Scholar

[94] Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, and Zheng Wang. Yet another text captcha solver: A generative adversarial network based approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 332–348, 2018.Search in Google Scholar

[95] Xu-Cheng Yin, Xuwang Yin, Kaizhu Huang, and Hong-Wei Hao. Robust text detection in natural scene images. IEEE transactions on pattern analysis and machine intelligence, 36(5):970–983, 2014.Search in Google Scholar

[96] Liu Yuliang, Jin Lianwen, Zhang Shuaitao, and Zhang Sheng. Detecting curve text in the wild: New dataset and new solution. arXiv preprint arXiv:1712.02170, 2017.Search in Google Scholar

[97] A.R. Zamir and M. Shah. Image geo-localization based on multiple nearest neighbor feature matching using generalized graphs. Pattern Analysis and Machine Intelligence, IEEE Transactions on, PP(99):1–1, 2014.Search in Google Scholar

[98] Sebastian Zander, Grenville Armitage, and Philip Branch. Covert channels in multiplayer first person shooter online games. In Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pages 215–222. IEEE, 2008.Search in Google Scholar

[99] Bolei Zhou, Agata Lapedriza, Aditya Khosla, Aude Oliva, and Antonio Torralba. Places: A 10 million image database for scene recognition. IEEE transactions on pattern analysis and machine intelligence, 40(6):1452–1464, 2017.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo