A Snake Game Steganography Method based on S-Boxes

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

A Snake Game Steganography Method based on S-Boxes

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

___

  • [1] M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa (2015) DOI: 10.1007/s11042-014-1952-z. [2] J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3.
  • H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y.
  • K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4.
  • V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y
  • D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Mazurczyk, K. Szczypiorski, Evaluation of steganographic methods for oversized IP packets, Telecommun Syst 49 (2) (2012) 207–217. DOI: 10.1007/s11235-010-9362-7.
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: introducing inter-protocol steganography, Telecommun Syst 52 (2) (2013) 1101–1111. DOI: 10.1007/s11235-011-9616z.
  • W.C. Yang, L.H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl. 74 (3) (2015) 1003–1019. DOI: 10.1007/s11042-013-1708-1.
  • D. Uljarevic´, M. Veinovic´, G. Kunjadic´, D. Tepšic´ (2015) DOI: 10.1007/s00530-0150492-3.
  • A. Desoky, M. Younis (2009) DOI: 10.1002/sec.99.
  • L.H. Lee, C.F. Lee, L.H. Chen (2010) DOI: 10.1016/j.jss.2010.07.054.
  • Z.H. Ou, L.H. Chen (2014) DOI: 10.1016/j.ins.2013.12.024.
  • M. Virvou, S. Papadimitriou, Simple arithmetic lessons through an adaptive snake game, In: Proceedings of International Conference on Computer, Information and Telecommunication Systems (CITS 2013), (2013) 71-75. [V. Di Iorio, R.S. Bigonha, M.A.S. Bigonha, A. Oliveira, E. Miguel (2005) DOI: 10.1016/j.entcs.2005.03.008.
  • M. Temmerman, E.G. Daylight, F. Catthoor, S. Demeyer, T. Dhaene (2007) DOI: 10.1016/j.sysarc.2006.11.008.
  • P. Roelse (2007) DOI: 10.1007/s10623-006-9012-y.
  • M. Szaban, F. Seredynski (2011) DOI: 10.1007/s11227-010-0398-y.
  • K. Winstein, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 01 April 2016
  • F.K. Mohamed (2014) DOI: 10.1016/j.jestch.2014.04.001.