Steganography in games: A general methodology and its application to the game of Go

Techniques to hide valuable information within seemingly harmless messages have been widely used for centuries. Typically, their use is appropriate when encryption is not available or not adequate (e.g. when available cryptography is too weak), or simply when it is convenient that no external observer can infer that some information is being exchanged. In the digital era, new cover mediums for hiding data in communication are constantly being proposed, from the classical image files (such as bmp, gif, and jpg formats) to audio files (i.e. wav and mp3), text and html documents, emails disguised as spam, TCP/IP packets, executables programs, DNA strands, etc. In this work, we present and analyze a novel methodology that illustrates how games (such as Chess, Backgammon, Go, etc.) can be used to hide digital contents. We also look at some of its possible advantages and limitations when compared with other techniques, discussing some improvements and extensions. Finally, we present the results of a first implementation of an open-source prototype, called StegoGo, for hiding digital contents in Go games.

[1]  Wei Ding,et al.  A novel digital image hiding technology based on tangram and Conways' game , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Angelos D. Keromytis,et al.  Hydan: Hiding Information in Program Binaries , 2004, ICICS.

[3]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[4]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[5]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[6]  Virgil D. Gligor,et al.  A guide to understanding covert channel analysis of trusted systems , 1993 .

[7]  A. Phillips The macmillan company. , 1970, Analytical chemistry.

[8]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[9]  B. Preneel Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings , 1995 .

[10]  R. Gibbons Game theory for applied economists , 1992 .

[11]  Director,et al.  NCSC-TG-030 VERSION-1 NATIONAL COMPUTER SECURITY CENTER A GUIDE TO UNDERSTANDING COVERT CHANNEL ANALYSIS OF TRUSTED SYSTEMS , 1993 .

[12]  Peter Winkler The Advent of Cryptology in the Game of Bridge , 1983, Cryptologia.

[13]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[14]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[15]  Steven J. Murdoch,et al.  Covert Channels for Collusion in Online Computer Games , 2004, Information Hiding.