Steganography in games: A general methodology and its application to the game of Go

Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observ...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2006-02, Vol.25 (1), p.64-71
Hauptverfasser: Hernandez-Castro, Julio C., Blasco-Lopez, Ignacio, Estevez-Tapiador, Juan M., Ribagorda-Garnacho, Arturo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 71
container_issue 1
container_start_page 64
container_title Computers & security
container_volume 25
creator Hernandez-Castro, Julio C.
Blasco-Lopez, Ignacio
Estevez-Tapiador, Juan M.
Ribagorda-Garnacho, Arturo
description Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg formats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called S tegoG o, for hiding digital contents in Go games.
doi_str_mv 10.1016/j.cose.2005.12.001
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_29673581</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404805002002</els_id><sourcerecordid>992223921</sourcerecordid><originalsourceid>FETCH-LOGICAL-c358t-994e7acf6c4d49f251072a865215fccee2e3a92e3f3ff932b892990e0b62602d3</originalsourceid><addsrcrecordid>eNp9kL1OwzAURi0EEqXwAkwWA1uC7SROjFgqBAWpEkNhtlznOnWVxsF2kfr2uJSJgeXe5Zz78yF0TUlOCeV3m1y7ADkjpMopywmhJ2hCm5plnJHmFE0SVGclKZtzdBHCJgE1b5oJWi4jdGpwnVfjeo_tgDu1hXCPZ7iDAbzq8Rbi2rWud90eq6HFNgasxrG3WkXrBhwdjmv48bAzeO4u0ZlRfYCr3z5FH89P748v2eJt_vo4W2S6qJqYCVFCrbThumxLYVhFSc1UwytGK6M1AINCiVRMYYwo2KoRTAgCZMUZJ6wtpuj2OHf07nMHIcqtDRr6Xg3gdkEyweu0iSbw5g-4cTs_pNskI3VJaMXLBLEjpL0LwYORo7db5feSEnkIWW7kIWR5CFlSJlOGSXo4SpD-_LLgZdAWBg2t9aCjbJ39T_8GgGqEXQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207401564</pqid></control><display><type>article</type><title>Steganography in games: A general methodology and its application to the game of Go</title><source>Elsevier ScienceDirect Journals</source><creator>Hernandez-Castro, Julio C. ; Blasco-Lopez, Ignacio ; Estevez-Tapiador, Juan M. ; Ribagorda-Garnacho, Arturo</creator><creatorcontrib>Hernandez-Castro, Julio C. ; Blasco-Lopez, Ignacio ; Estevez-Tapiador, Juan M. ; Ribagorda-Garnacho, Arturo</creatorcontrib><description>Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg formats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called S tegoG o, for hiding digital contents in Go games.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2005.12.001</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Covert channels ; Cybersecurity ; Data communications ; Data encryption ; Games ; Information hiding ; Security management ; Steganalysis ; Steganography in games ; Studies</subject><ispartof>Computers &amp; security, 2006-02, Vol.25 (1), p.64-71</ispartof><rights>2005 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Feb 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c358t-994e7acf6c4d49f251072a865215fccee2e3a92e3f3ff932b892990e0b62602d3</citedby><cites>FETCH-LOGICAL-c358t-994e7acf6c4d49f251072a865215fccee2e3a92e3f3ff932b892990e0b62602d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2005.12.001$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3536,27903,27904,45974</link.rule.ids></links><search><creatorcontrib>Hernandez-Castro, Julio C.</creatorcontrib><creatorcontrib>Blasco-Lopez, Ignacio</creatorcontrib><creatorcontrib>Estevez-Tapiador, Juan M.</creatorcontrib><creatorcontrib>Ribagorda-Garnacho, Arturo</creatorcontrib><title>Steganography in games: A general methodology and its application to the game of Go</title><title>Computers &amp; security</title><description>Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg formats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called S tegoG o, for hiding digital contents in Go games.</description><subject>Covert channels</subject><subject>Cybersecurity</subject><subject>Data communications</subject><subject>Data encryption</subject><subject>Games</subject><subject>Information hiding</subject><subject>Security management</subject><subject>Steganalysis</subject><subject>Steganography in games</subject><subject>Studies</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><recordid>eNp9kL1OwzAURi0EEqXwAkwWA1uC7SROjFgqBAWpEkNhtlznOnWVxsF2kfr2uJSJgeXe5Zz78yF0TUlOCeV3m1y7ADkjpMopywmhJ2hCm5plnJHmFE0SVGclKZtzdBHCJgE1b5oJWi4jdGpwnVfjeo_tgDu1hXCPZ7iDAbzq8Rbi2rWud90eq6HFNgasxrG3WkXrBhwdjmv48bAzeO4u0ZlRfYCr3z5FH89P748v2eJt_vo4W2S6qJqYCVFCrbThumxLYVhFSc1UwytGK6M1AINCiVRMYYwo2KoRTAgCZMUZJ6wtpuj2OHf07nMHIcqtDRr6Xg3gdkEyweu0iSbw5g-4cTs_pNskI3VJaMXLBLEjpL0LwYORo7db5feSEnkIWW7kIWR5CFlSJlOGSXo4SpD-_LLgZdAWBg2t9aCjbJ39T_8GgGqEXQ</recordid><startdate>20060201</startdate><enddate>20060201</enddate><creator>Hernandez-Castro, Julio C.</creator><creator>Blasco-Lopez, Ignacio</creator><creator>Estevez-Tapiador, Juan M.</creator><creator>Ribagorda-Garnacho, Arturo</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20060201</creationdate><title>Steganography in games: A general methodology and its application to the game of Go</title><author>Hernandez-Castro, Julio C. ; Blasco-Lopez, Ignacio ; Estevez-Tapiador, Juan M. ; Ribagorda-Garnacho, Arturo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c358t-994e7acf6c4d49f251072a865215fccee2e3a92e3f3ff932b892990e0b62602d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Covert channels</topic><topic>Cybersecurity</topic><topic>Data communications</topic><topic>Data encryption</topic><topic>Games</topic><topic>Information hiding</topic><topic>Security management</topic><topic>Steganalysis</topic><topic>Steganography in games</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hernandez-Castro, Julio C.</creatorcontrib><creatorcontrib>Blasco-Lopez, Ignacio</creatorcontrib><creatorcontrib>Estevez-Tapiador, Juan M.</creatorcontrib><creatorcontrib>Ribagorda-Garnacho, Arturo</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hernandez-Castro, Julio C.</au><au>Blasco-Lopez, Ignacio</au><au>Estevez-Tapiador, Juan M.</au><au>Ribagorda-Garnacho, Arturo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Steganography in games: A general methodology and its application to the game of Go</atitle><jtitle>Computers &amp; security</jtitle><date>2006-02-01</date><risdate>2006</risdate><volume>25</volume><issue>1</issue><spage>64</spage><epage>71</epage><pages>64-71</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg formats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called S tegoG o, for hiding digital contents in Go games.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2005.12.001</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2006-02, Vol.25 (1), p.64-71
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_miscellaneous_29673581
source Elsevier ScienceDirect Journals
subjects Covert channels
Cybersecurity
Data communications
Data encryption
Games
Information hiding
Security management
Steganalysis
Steganography in games
Studies
title Steganography in games: A general methodology and its application to the game of Go
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T05%3A24%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Steganography%20in%20games:%20A%20general%20methodology%20and%20its%20application%20to%20the%20game%20of%20Go&rft.jtitle=Computers%20&%20security&rft.au=Hernandez-Castro,%20Julio%20C.&rft.date=2006-02-01&rft.volume=25&rft.issue=1&rft.spage=64&rft.epage=71&rft.pages=64-71&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/j.cose.2005.12.001&rft_dat=%3Cproquest_cross%3E992223921%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207401564&rft_id=info:pmid/&rft_els_id=S0167404805002002&rfr_iscdi=true