Araştırma Makalesi
BibTex RIS Kaynak Göster

A Snake Game Steganography Method based on S-Boxes

Yıl 2017, Cilt: 5 Sayı: 1, 193 - 209, 30.01.2017

Öz

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

Kaynakça

  • [1] M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa (2015) DOI: 10.1007/s11042-014-1952-z. [2] J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3.
  • H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y.
  • K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4.
  • V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y
  • D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Mazurczyk, K. Szczypiorski, Evaluation of steganographic methods for oversized IP packets, Telecommun Syst 49 (2) (2012) 207–217. DOI: 10.1007/s11235-010-9362-7.
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: introducing inter-protocol steganography, Telecommun Syst 52 (2) (2013) 1101–1111. DOI: 10.1007/s11235-011-9616z.
  • W.C. Yang, L.H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl. 74 (3) (2015) 1003–1019. DOI: 10.1007/s11042-013-1708-1.
  • D. Uljarevic´, M. Veinovic´, G. Kunjadic´, D. Tepšic´ (2015) DOI: 10.1007/s00530-0150492-3.
  • A. Desoky, M. Younis (2009) DOI: 10.1002/sec.99.
  • L.H. Lee, C.F. Lee, L.H. Chen (2010) DOI: 10.1016/j.jss.2010.07.054.
  • Z.H. Ou, L.H. Chen (2014) DOI: 10.1016/j.ins.2013.12.024.
  • M. Virvou, S. Papadimitriou, Simple arithmetic lessons through an adaptive snake game, In: Proceedings of International Conference on Computer, Information and Telecommunication Systems (CITS 2013), (2013) 71-75. [V. Di Iorio, R.S. Bigonha, M.A.S. Bigonha, A. Oliveira, E. Miguel (2005) DOI: 10.1016/j.entcs.2005.03.008.
  • M. Temmerman, E.G. Daylight, F. Catthoor, S. Demeyer, T. Dhaene (2007) DOI: 10.1016/j.sysarc.2006.11.008.
  • P. Roelse (2007) DOI: 10.1007/s10623-006-9012-y.
  • M. Szaban, F. Seredynski (2011) DOI: 10.1007/s11227-010-0398-y.
  • K. Winstein, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 01 April 2016
  • F.K. Mohamed (2014) DOI: 10.1016/j.jestch.2014.04.001.

A Snake Game Steganography Method based on S-Boxes

Yıl 2017, Cilt: 5 Sayı: 1, 193 - 209, 30.01.2017

Öz

Steganography is the art and science of concealing the existence of information within seemingly innocuous carriers or it is a communication method in such a way that the presence of a message cannot be detected. There are a variety of digital carriers or places like images, audio files, text, html, etc. where data can be hidden. In this study, we proposed a game steganography method using snake game as the cover medium. We aim to hide the secret data by estimating the each move of the bait called “vitamin”. In other words, we compute coordinates of the vitamin according to the unit components of secret data. Meanwhile, we plan to complicate the game platform and establish a nonlinear relationship between the vitamin location and secret data by employing DES S-boxes. These operations render the proposed scheme more resilient against the possible steganographic attacks and make the extraction procedure more complicated. Therefore, security and imperceptibility have been kept as the focus of interest in the scope of this study. Besides, significant capacity rates have been obtained by each move. The performed experiments offer significant results to support these claims. 

Kaynakça

  • [1] M.M. Sadek, A.S. Khalifa, M.G.M. Mostafa (2015) DOI: 10.1007/s11042-014-1952-z. [2] J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, A. Ribagorda-Garnacho, Steganography in games: A general methodology and its application to the game of Go, Computers & Security 25 (1) (2006) 64-71. [3] W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3. [4] H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y. [5] K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4. [6] V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y [7] D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5. [8] A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261. [9] E. Satir, H. Isik J. Syst. Softw. 85 (10) (2012) 2385–2394. [10] E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Luo, F. Huang, J. Huang (2011) DOI: 10.1007/s11042-009-0440-3.
  • H. Sajedi, M. Jamzad (2009) DOI: 10.1007/s10207-009-0089-y.
  • K. Bailey, K. Curran (2006) DOI: 10.1007/s11042-006-0008-4.
  • V. Sabeti, S. Samavi, S. Shirani (2013) DOI: 10.1007/s11042-011-0975-y
  • D. Yan, R. Wang (2011) DOI: 10.1007/s11042-009-0430-5.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • A. Desoky Int. J. Inf. Secur. 8 (4) (2009) 247–261.
  • E. Satir, H. Isik (2014) DOI: 10.1007/s11042-012-1223-9.
  • W. Mazurczyk, K. Szczypiorski, Evaluation of steganographic methods for oversized IP packets, Telecommun Syst 49 (2) (2012) 207–217. DOI: 10.1007/s11235-010-9362-7.
  • B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: introducing inter-protocol steganography, Telecommun Syst 52 (2) (2013) 1101–1111. DOI: 10.1007/s11235-011-9616z.
  • W.C. Yang, L.H. Chen, A steganographic method via various animations in PowerPoint files, Multimed. Tools Appl. 74 (3) (2015) 1003–1019. DOI: 10.1007/s11042-013-1708-1.
  • D. Uljarevic´, M. Veinovic´, G. Kunjadic´, D. Tepšic´ (2015) DOI: 10.1007/s00530-0150492-3.
  • A. Desoky, M. Younis (2009) DOI: 10.1002/sec.99.
  • L.H. Lee, C.F. Lee, L.H. Chen (2010) DOI: 10.1016/j.jss.2010.07.054.
  • Z.H. Ou, L.H. Chen (2014) DOI: 10.1016/j.ins.2013.12.024.
  • M. Virvou, S. Papadimitriou, Simple arithmetic lessons through an adaptive snake game, In: Proceedings of International Conference on Computer, Information and Telecommunication Systems (CITS 2013), (2013) 71-75. [V. Di Iorio, R.S. Bigonha, M.A.S. Bigonha, A. Oliveira, E. Miguel (2005) DOI: 10.1016/j.entcs.2005.03.008.
  • M. Temmerman, E.G. Daylight, F. Catthoor, S. Demeyer, T. Dhaene (2007) DOI: 10.1016/j.sysarc.2006.11.008.
  • P. Roelse (2007) DOI: 10.1007/s10623-006-9012-y.
  • M. Szaban, F. Seredynski (2011) DOI: 10.1007/s11227-010-0398-y.
  • K. Winstein, Lexical steganography, http://alumni.imsa.edu/~keithw/tlex, Accessed 01 April 2016
  • F.K. Mohamed (2014) DOI: 10.1016/j.jestch.2014.04.001.
Toplam 23 adet kaynakça vardır.

Ayrıntılar

Bölüm Makaleler
Yazarlar

Esra Şatır

Kubilay Güner Bu kişi benim

Yayımlanma Tarihi 30 Ocak 2017
Yayımlandığı Sayı Yıl 2017 Cilt: 5 Sayı: 1

Kaynak Göster

APA Şatır, E., & Güner, K. (2017). A Snake Game Steganography Method based on S-Boxes. Duzce University Journal of Science and Technology, 5(1), 193-209.
AMA Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DÜBİTED. Ocak 2017;5(1):193-209.
Chicago Şatır, Esra, ve Kubilay Güner. “A Snake Game Steganography Method Based on S-Boxes”. Duzce University Journal of Science and Technology 5, sy. 1 (Ocak 2017): 193-209.
EndNote Şatır E, Güner K (01 Ocak 2017) A Snake Game Steganography Method based on S-Boxes. Duzce University Journal of Science and Technology 5 1 193–209.
IEEE E. Şatır ve K. Güner, “A Snake Game Steganography Method based on S-Boxes”, DÜBİTED, c. 5, sy. 1, ss. 193–209, 2017.
ISNAD Şatır, Esra - Güner, Kubilay. “A Snake Game Steganography Method Based on S-Boxes”. Duzce University Journal of Science and Technology 5/1 (Ocak 2017), 193-209.
JAMA Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DÜBİTED. 2017;5:193–209.
MLA Şatır, Esra ve Kubilay Güner. “A Snake Game Steganography Method Based on S-Boxes”. Duzce University Journal of Science and Technology, c. 5, sy. 1, 2017, ss. 193-09.
Vancouver Şatır E, Güner K. A Snake Game Steganography Method based on S-Boxes. DÜBİTED. 2017;5(1):193-209.