Assured Supraliminal Steganography in Computer Games

While there is some work on supraliminal steganography, its definition makes it problematic in several respects. We deconstruct and sharpen the definition to create assured supraliminal steganography. The taxonomy and definition of assured supraliminal steganography are illustrated by hiding messages in computer games. We discuss four steganographic computer game implementations, and present the results of an experiment needed to ascertain whether or not a supraliminal method is actually assured supraliminal steganography. The results showed that it was possible to embed assured supraliminal messages into the four game implementations, and extract the messages with no or minimal errors.

[1]  C. Pandu Rangan,et al.  Steganographic Communication in Ordered Channels , 2006, Information Hiding.

[2]  Scott Craver,et al.  A supraliminal channel in a wireless phone application , 2009, MM&Sec '09.

[3]  Sebastian Zander,et al.  Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[4]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[5]  Steven J. Murdoch,et al.  Covert Channels for Collusion in Online Computer Games , 2004, Information Hiding.

[6]  John Aycock,et al.  Supraliminal Audio Steganography: Audio Files Tricking Audiophiles , 2009, Information Hiding.

[7]  Nick Montfort,et al.  Racing the Beam: The Atari Video Computer System , 2009 .

[8]  Stefan Katzenbeisser,et al.  Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens , 2006, Information Hiding.

[9]  Vernon Rego,et al.  Covert channels in combinatorial games , 2012, SimuTools.

[10]  Ling-Hwei Chen,et al.  A perfect maze based steganographic method , 2010, J. Syst. Softw..

[11]  Juan E. Tapiador,et al.  Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..

[12]  M. Pooyan,et al.  LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[13]  C. Laisant Sur la numération factorielle, application aux permutations , .

[14]  Scott Knight,et al.  Permutation-based steganographic channels , 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009).

[15]  Roger Wattenhofer,et al.  Hidden communication in P2P networks Steganographic handshake and broadcast , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Mohammad Hassan Shirali-Shahreza,et al.  Steganography in SMS by Sudoku puzzle , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[17]  Jun Yu,et al.  A Supraliminal Channel in a Videoconferencing Application , 2008, Information Hiding.

[18]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[19]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.