Steganography in games: A general methodology and its application to the game of Go

被引:28
作者
Hernandez-Castro, JC
Blasco-Lopez, I
Estevez-Tapiador, JM
Ribagorda-Garnacho, A
机构
[1] Carlos III Univ Madrid, Dept Comp Sci, Madrid 28911, Spain
[2] Tecsidel, Div TSO, Area Telecomu, Madrid 28016, Spain
关键词
steganography in games; information hiding; covert channels; steganalysis; Go;
D O I
10.1016/j.cose.2005.12.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg for-mats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called STEGOGo, for hiding digital contents in Go games. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:64 / 71
页数:8
相关论文
共 15 条
[1]   Hiding messages in DNA microdots [J].
Clelland, CT ;
Risca, V ;
Bancroft, C .
NATURE, 1999, 399 (6736) :533-534
[2]  
Ding W, 2000, IEEE IMAGE PROC, P601, DOI 10.1109/ICIP.2000.901030
[3]  
El-Khalil R, 2004, LECT NOTES COMPUT SC, V3269, P187
[4]  
Gibbons RS, 1992, Game Theory for Applied Economists
[5]  
Giffin J, 2003, LECT NOTES COMPUT SC, V2482, P194
[6]  
HINTZ A, DEFCON 10
[7]   A METHOD FOR THE CONSTRUCTION OF MINIMUM-REDUNDANCY CODES [J].
HUFFMAN, DA .
PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (09) :1098-1101
[8]  
INOUE S, 2001, 1 WORKSH NLP XML TOK
[9]  
JOHNSON NF, 2000, INFORMATION HIDING S
[10]  
Kahn D., 1967, CODEBREAKERS