Research Article
BibTex RIS Cite

A Snake Game Steganography Method based on S-Boxes

Year 2017, Volume: 5 Issue: 1, 193 - 209, 30.01.2017

Abstract

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

References

  • [1] M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa (2015) DOI: 10.1007/s11042-014-1952-z. [2] J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3.
  • H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y.
  • K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4.
  • V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y
  • D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Mazurczyk, K. Szczypiorski, Evaluation of steganographic methods for oversized IP packets, Telecommun Syst 49 (2) (2012) 207–217. DOI: 10.1007/s11235-010-9362-7.
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: introducing inter-protocol steganography, Telecommun Syst 52 (2) (2013) 1101–1111. DOI: 10.1007/s11235-011-9616z.
  • W.C. Yang, L.H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl. 74 (3) (2015) 1003–1019. DOI: 10.1007/s11042-013-1708-1.
  • D. Uljarevic´, M. Veinovic´, G. Kunjadic´, D. Tepšic´ (2015) DOI: 10.1007/s00530-0150492-3.
  • A. Desoky, M. Younis (2009) DOI: 10.1002/sec.99.
  • L.H. Lee, C.F. Lee, L.H. Chen (2010) DOI: 10.1016/j.jss.2010.07.054.
  • Z.H. Ou, L.H. Chen (2014) DOI: 10.1016/j.ins.2013.12.024.
  • M. Virvou, S. Papadimitriou, Simple arithmetic lessons through an adaptive snake game, In: Proceedings of International Conference on Computer, Information and Telecommunication Systems (CITS 2013), (2013) 71-75. [V. Di Iorio, R.S. Bigonha, M.A.S. Bigonha, A. Oliveira, E. Miguel (2005) DOI: 10.1016/j.entcs.2005.03.008.
  • M. Temmerman, E.G. Daylight, F. Catthoor, S. Demeyer, T. Dhaene (2007) DOI: 10.1016/j.sysarc.2006.11.008.
  • P. Roelse (2007) DOI: 10.1007/s10623-006-9012-y.
  • M. Szaban, F. Seredynski (2011) DOI: 10.1007/s11227-010-0398-y.
  • K. Winstein, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 01 April 2016
  • F.K. Mohamed (2014) DOI: 10.1016/j.jestch.2014.04.001.

A Snake Game Steganography Method based on S-Boxes

Year 2017, Volume: 5 Issue: 1, 193 - 209, 30.01.2017

Abstract

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

References

  • [1] M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa (2015) DOI: 10.1007/s11042-014-1952-z. [2] J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3.
  • H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y.
  • K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4.
  • V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y
  • D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Mazurczyk, K. Szczypiorski, Evaluation of steganographic methods for oversized IP packets, Telecommun Syst 49 (2) (2012) 207–217. DOI: 10.1007/s11235-010-9362-7.
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: introducing inter-protocol steganography, Telecommun Syst 52 (2) (2013) 1101–1111. DOI: 10.1007/s11235-011-9616z.
  • W.C. Yang, L.H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl. 74 (3) (2015) 1003–1019. DOI: 10.1007/s11042-013-1708-1.
  • D. Uljarevic´, M. Veinovic´, G. Kunjadic´, D. Tepšic´ (2015) DOI: 10.1007/s00530-0150492-3.
  • A. Desoky, M. Younis (2009) DOI: 10.1002/sec.99.
  • L.H. Lee, C.F. Lee, L.H. Chen (2010) DOI: 10.1016/j.jss.2010.07.054.
  • Z.H. Ou, L.H. Chen (2014) DOI: 10.1016/j.ins.2013.12.024.
  • M. Virvou, S. Papadimitriou, Simple arithmetic lessons through an adaptive snake game, In: Proceedings of International Conference on Computer, Information and Telecommunication Systems (CITS 2013), (2013) 71-75. [V. Di Iorio, R.S. Bigonha, M.A.S. Bigonha, A. Oliveira, E. Miguel (2005) DOI: 10.1016/j.entcs.2005.03.008.
  • M. Temmerman, E.G. Daylight, F. Catthoor, S. Demeyer, T. Dhaene (2007) DOI: 10.1016/j.sysarc.2006.11.008.
  • P. Roelse (2007) DOI: 10.1007/s10623-006-9012-y.
  • M. Szaban, F. Seredynski (2011) DOI: 10.1007/s11227-010-0398-y.
  • K. Winstein, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 01 April 2016
  • F.K. Mohamed (2014) DOI: 10.1016/j.jestch.2014.04.001.
There are 23 citations in total.

Details

Journal Section Articles
Authors

Esra Şatır

Kubilay Güner This is me

Publication Date January 30, 2017
Published in Issue Year 2017 Volume: 5 Issue: 1

Cite

APA Şatır, E., & Güner, K. (2017). A Snake Game Steganography Method based on S-Boxes. Düzce Üniversitesi Bilim Ve Teknoloji Dergisi, 5(1), 193-209.
AMA Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DUBİTED. January 2017;5(1):193-209.
Chicago Şatır, Esra, and Kubilay Güner. “A Snake Game Steganography Method Based on S-Boxes”. Düzce Üniversitesi Bilim Ve Teknoloji Dergisi 5, no. 1 (January 2017): 193-209.
EndNote Şatır E, Güner K (January 1, 2017) A Snake Game Steganography Method based on S-Boxes. Düzce Üniversitesi Bilim ve Teknoloji Dergisi 5 1 193–209.
IEEE E. Şatır and K. Güner, “A Snake Game Steganography Method based on S-Boxes”, DUBİTED, vol. 5, no. 1, pp. 193–209, 2017.
ISNAD Şatır, Esra - Güner, Kubilay. “A Snake Game Steganography Method Based on S-Boxes”. Düzce Üniversitesi Bilim ve Teknoloji Dergisi 5/1 (January 2017), 193-209.
JAMA Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DUBİTED. 2017;5:193–209.
MLA Şatır, Esra and Kubilay Güner. “A Snake Game Steganography Method Based on S-Boxes”. Düzce Üniversitesi Bilim Ve Teknoloji Dergisi, vol. 5, no. 1, 2017, pp. 193-09.
Vancouver Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DUBİTED. 2017;5(1):193-209.