128,272 Hits in 3.9 sec

Quiz games as a model for information hiding

Bernd Bank, Joos Heintz, Guillermo Matera, José Luis Montaña, Luis M. Pardo, Andrés Rojas Paredes
2016 Journal of Complexity  
We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.  ...  Quiz games and information hiding in software engineering Let assumptions and notations be as before.  ...  Introduction We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game.  ... 
doi:10.1016/j.jco.2015.11.005 fatcat:324bld77kvghlfpofeyjbys7yu

Steganography -- A Game of Hide and Seek in Information Communication [article]

Sanjeeb Kumar Behera, Minati Mishra
2016 arXiv   pre-print
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information have become some of the important issues.  ...  techniques those are used to encrypt and hide the secret data inside other media to ensure data security.  ...  In this work images are used as covers to hide the secret information.  ... 
arXiv:1604.00493v1 fatcat:ztfrwzxag5fozb5b5c6vsvnqwq

Hiding information in electoral competition

Paul Heidhues, Johan Lagerlöf
2003 Games and Economic Behavior  
We study whether the candidates are able to credibly communicate their information to voters through their choice of policy platforms.  ...  Information transmission becomes more di¢cult, the less correlated are the candidates' signals, the lower is the signals' quality, and the stronger is the electorate's prior.  ...  For the repeated-game argument to be valid, however, there must be some bene…t associated with the candidates' having access to a commitment technology.  ... 
doi:10.1016/s0899-8256(02)00531-6 fatcat:qxenk6wpvjg57m2bi37tkv7odu

Using or hiding private information? An experimental study of zero-sum repeated games with incomplete information

Nicolas Jacquemet, Frédéric Koessler
2013 Games and Economic Behavior  
A typical example is the use of balanced strategies in poker: a good poker player should sometimes resist the temptation to bet or raise the best hand in the current round of betting to hide his information  ...  We implement simple examples from the class of zero-sum repeated games with incomplete information.  ...  These three hypotheses summarize the treatment effects predicted by the optimal trade-off between using and hiding one's own information on the outcomes of the games over two dimensions: Note.  ... 
doi:10.1016/j.geb.2012.12.002 fatcat:pbsevnel3jamheffkj2erab5cm

The Optimal Equilibrium Capacity Of Information Hiding Based On Game Theory

Ziquan Hu, Kun She, Shahzad Ali, Kai Yan
2011 Zenodo  
Game theory could be used to analyze the conflicted issues in the field of information hiding.  ...  Furthermore, the optimal equilibrium capacity of hiding information is calculated through the optimal number of EU with the embedded secret information.  ...  The optimal equilibrium capacity of information hiding for r =8, R=2, F =6, g=2, λ=1, x=0.9. The optimal equilibrium capacity of information hiding q m=0.5 m=1 m=2 m=4 m=8 Fig. 3 .  ... 
doi:10.5281/zenodo.1076530 fatcat:aiskdfylcbhw5giij3cghwux6u

Using or Hiding Private Information? An Experimental Study of Zero-Sum Repeated Games with Incomplete Information

Nicolas Jacquemet, Frederic Koessler
2011 Social Science Research Network  
The stage games share the same simple structure, but differ markedly on how information should be optimally used once they are repeated.  ...  Subjects are unable to completely ignore their information when it is optimal to do so, but the use of information in the lab reacts qualitatively well to the type and length of the game being played.  ...  Experimental subjects use private information with very high accuracy when it's worth using, but they are unable to correctly hide it when it is in their own interest to do so.  ... 
doi:10.2139/ssrn.1803655 fatcat:jd6hdrt4svctljisqid7acebqy

A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach

Suganthi Kumar, Rajkumar Soundrapandiyan
2021 Journal of King Saud University: Computer and Information Sciences  
This paper presents a cooperative game theory approach to design an optimal video steganography framework.  ...  This paper proposes a novel game-theoretic approach using strategy adaption to address this issue.  ...  Soundrapandiyan Journal of King Saud University -Computer and Information Sciences xxx (xxxx) xxx The rest of the paper is organized as follows: section 2 presents the proposed game theory-based video  ... 
doi:10.1016/j.jksuci.2021.05.018 fatcat:yzdxpqg4xvhjpbivv4h6b2jswu

Capacities and capacity-achieving decoders for various fingerprinting games

Thijs Laarhoven
2014 Proceedings of the 2nd ACM workshop on Information hiding and multimedia security - IH&MMSec '14  
Combining an information-theoretic approach to fingerprinting with a more constructive, statistical approach, we derive new results on the fingerprinting capacities for various informed settings, as well  ...  Moulin, "On the saddle-point solution and the large-coalition asymptotics of fingerprinting games," IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 160-175, 2012.  ...  ., "Optimal suspicion functions for Tardos traitor tracing schemes," in ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), 2013, pp. 19-28.  ... 
doi:10.1145/2600918.2600925 dblp:conf/ih/Laarhoven14 fatcat:bjy7smfqe5f3jjwmgturfy5fhm

Efficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application

Xingquan Cai, Shiyu Li, Xin Wu, Hao Lu
2017 Journal of Information Hiding and Multimedia Signal Processing  
In large scene online games, efficient path finding is an important technology. In this paper, we provide an efficient path finding method based evaluation function in large scene online games.  ...  We smooth the path and roam in large scene online game. Finally, we implement our system and provide the results.  ...  When need to load a new map area, loaded by reading the adjacent map areas index information from the configuration information of loaded map areas.  ... 
dblp:journals/jihmsp/CaiLWL17 fatcat:cmkm6vbemnblxecm6xbg6fhc7y

An Unfair Game of Virtual Hide-and-Go-Seek: The Passive Collection of Children's Information Online

Andrea Korajlija
2020 Canadian Journal of Children s Rights / Revue canadienne des droits des enfants  
Specifically, I assess how the passive collection of children's information through their parents is permitted under the current legislation.  ...  I outline the consequences children face because of this unconsented passive collection of their information enabled by their parents' technology use. Lastly, I call for more stringent regulation.  ...  ACHIEVING A FAIR GAME OF VIRTUAL HIDE-AND-GO-SEEK Parents have a legal responsibility to safeguard their children online, yet oddly enough, they play a significant role in producing children's online information  ... 
doi:10.22215/cjcr.v7i1.2796 fatcat:ehawef4yszbbhjk3podfuuzuhu

Succession of hide-seek and pursuit-evasion at heterogeneous locations

S. Gal, J. Casas
2014 Journal of the Royal Society Interface  
The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described.  ...  In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape.  ...  In hide -search games, the players have, by contrast, little information about the movement of the other player and the main emphasis is to find optimal probabilistic choices of strategies for the players  ... 
doi:10.1098/rsif.2014.0062 pmid:24621817 pmcid:PMC3973372 fatcat:fj4vrn33vfb77gtl2sedvxdrui

Children and robots learning to play hide and seek

J. Gregory Trafton, Alan C. Schultz, Dennis Perznowski, Magdalena D. Bugajska, William Adams, Nicholas L. Cassimatis, Derek P. Brock
2006 Proceeding of the 1st ACM SIGCHI/SIGART conference on Human-robot interaction - HRI '06  
We propose that children are able to learn how to play hide and seek by learning the features and relations of objects (e.g., containment, under) and use that information to play a credible game of hide  ...  We show through a case study that a 3 1/2 year old child can, in fact, play a credible game of hide and seek, even though she does not seem to have perspective taking ability.  ...  A table is supplied that maps marker color to the object's size, but all information on hidability is learned through feedback from playing the game and added to the table to be used in subsequent games  ... 
doi:10.1145/1121241.1121283 dblp:conf/hri/TraftonSPBACB06 fatcat:557oelhr3vdofay2n5oo3iclbe

Steganography in games: A general methodology and its application to the game of Go

Julio C. Hernandez-Castro, Ignacio Blasco-Lopez, Juan M. Estevez-Tapiador, Arturo Ribagorda-Garnacho
2006 Computers & security  
Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries.  ...  In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents.  ...  Otherwise, the information sent may be incorrectly decoded. 3. Approaches to hide data in games The idea of hiding information into game strategies can be applied in two different scenarios.  ... 
doi:10.1016/j.cose.2005.12.001 fatcat:ia52hpnyvba6xlzidx7psub3ze


Martin Chapman, Gareth Tyson, Peter McBurney, Michael Luck, Simon Parsons
2014 Proceedings of the 1st International Workshop on Agents and CyberSecurity - ACySE '14  
We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek.  ...  In this paper we consider hide-and-seek as a formal game, and consider in depth how it is allegorical to the cyber domain, particularly in the problems of attack attribution and attack pivoting.  ...  Hide-and-seek Hide-and-seek games belong to a wider class of games known as Search Games, which generalise the notion of one agent, a seeker, attempting to locate another agent, the hider.  ... 
doi:10.1145/2602945.2602946 fatcat:6uysthkqcvgbtghzvtpxd4jrii

Strategic gaze: an interactive eye-tracking study

J. Hausfeld, K. von Hesler, S. Goldlücke
2020 Experimental Economics  
In contrast, gaze becomes less informative in the competitive game.  ...  The game can either be a competitive (hide & seek) game in which players want to be unpredictable, or a game of common interest in which players want to be predictable.  ...  in the hide & seek game.  ... 
doi:10.1007/s10683-020-09655-x fatcat:cipsplzpvbhahltxh2usfzpani
« Previous Showing results 1 — 15 out of 128,272 results