Assured Supraliminal Steganography in Computer Games

  • Anton Mosunov
  • Vineet Sinha
  • Heather Crawford
  • John Aycock
  • Daniel Medeiros Nunes de Castro
  • Rashmi Kumari
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8267)


While there is some work on supraliminal steganography, its definition makes it problematic in several respects. We deconstruct and sharpen the definition to create assured supraliminal steganography. The taxonomy and definition of assured supraliminal steganography are illustrated by hiding messages in computer games. We discuss four steganographic computer game implementations, and present the results of an experiment needed to ascertain whether or not a supraliminal method is actually assured supraliminal steganography. The results showed that it was possible to embed assured supraliminal messages into the four game implementations, and extract the messages with no or minimal errors.


Computer Game Secret Message Trained Operator Covert Channel Digital Game 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



The authors’ work is supported in part by grants from the Natural Sciences and Engineering Research Council of Canada (JA), and the Scottish Informatics and Computer Science Alliance (HC). Thanks to Melissa Aycock for translating [11].


  1. 1.
    Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 109–123. Springer, Heidelberg (2007)Google Scholar
  2. 2.
    Chakinala, R.C., Kumarasubramanian, A., Manokaran, R., Noubir, G., Rangan, C.P., Sundaram, R.: Steganographic communication in ordered channels. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 42–57. Springer, Heidelberg (2007)Google Scholar
  3. 3.
    Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)Google Scholar
  4. 4.
    Craver, S., Li, E., Yu, J., Atakli, I.: A supraliminal channel in a videoconferencing application. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 283–293. Springer, Heidelberg (2008)Google Scholar
  5. 5.
    Crawford, H., Aycock, J.: Supraliminal audio steganography: audio files tricking audiophiles. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 1–14. Springer, Heidelberg (2009)Google Scholar
  6. 6.
    Cvejic, N., Seppanen, T.: Increasing the capacity of LSB-based audio steganography. In: 2002 IEEE Workshop on Multimedia Signal Processing, pp. 336–338 (2002)Google Scholar
  7. 7.
    Dillon, R.: The Golden Age of Video Games. CRC Press, Boca Raton (2011)CrossRefGoogle Scholar
  8. 8.
    Eidenbenz, R., Locher, T., Wattenhofer, R.: Hidden communication in P2P networks: steganographic handshake and broadcast. In: IEEE INFOCOM, pp. 954–962 (2011)Google Scholar
  9. 9.
    Forest, K., Knight, S.: Permutation-based steganographic channels. In: 4th International Conference in Risks and Security of Internet and Systems, pp. 67–73 (2009)Google Scholar
  10. 10.
    Hernandez-Castro, J.C., Blasco-Lopez, I., Estevez-Tapiador, J.M., Ribagorda-Garnacho, A.: Steganography in games: a general methodology and its application to the game of go. Comput. Secur. 25(1), 64–71 (2006)CrossRefGoogle Scholar
  11. 11.
    Laisant, C.-A.: Sur la numération factorielle, application aux permutations. Bulletin de la Société Mathématique de France 16, 176–183 (1888)zbMATHMathSciNetGoogle Scholar
  12. 12.
    Lee, H.-L., Lee, C.-F., Chen, L.-H.: A perfect maze based steganographic method. J. Syst. Softw. 83(12), 2528–2535 (2010)CrossRefGoogle Scholar
  13. 13.
    Lehmer, D.H.: Teaching combinatorial tricks to a computer. In: 10th Symposium in Applied Mathematics of the American Mathematical Society, pp. 179–193 (1960). Symposium was actually held in 1958Google Scholar
  14. 14.
    Li, E., Craver, S.: A supraliminal channel in a wireless phone application. In: 11th ACM Workshop on Multimedia and Security, pp. 151–154 (2009)Google Scholar
  15. 15.
    Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Steganography in SMS by sudoku puzzle. In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 844–847 (2008)Google Scholar
  16. 16.
    Macaulay, G.C.: (trans.) The History of Herodotus, vol. 2. Macmillan, London (1890)Google Scholar
  17. 17.
    Montfort, N., Bogost, I.: Racing the Beam: The Atari Video Computer System. MIT Press, Cambridge (2009)Google Scholar
  18. 18.
    Morehead, A.H., Mott-Smith, G. (eds.): Hoyle’s Rules of Games, 3rd edn. Penguin Putnam Inc, New York (2001). Revised by Morehead, P.D.Google Scholar
  19. 19.
    Ms. Pac-Man. 2010. Accessed 21 May 2013
  20. 20.
    Murdoch, S.J., Zieliński, P.: Covert channels for collusion in online computer games. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 355–369. Springer, Heidelberg (2005)Google Scholar
  21. 21.
    National Institute of Standards and Technology: Recommendation for Key Management - Part 1: General (revised), 800–857 edn. NIST Special Publication, Berhampur (2007)Google Scholar
  22. 22.
    Pittman, J.: The Pac-Man dossier. Accessed 16 June 2011
  23. 23.
    Pooyan, M., Delforouzi, A.: LSB-based audio steganography method based on lifting wavelet transform. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 600–603 (2007)Google Scholar
  24. 24.
    PySolFC: a Python solitaire game collection. Accessed 21 May 2013
  25. 25.
    Ritchey, P.C., Rego, V.J.: Covert channels in combinatorial games. In: 5th International ICST Conference on Simulation Tools and Techniques, pp. 234–241 (2012)Google Scholar
  26. 26.
    Shankar, A.R.: HTML5 game development tutorial: breakout part I - introduction to Canvas., 11 October 2011. Accessed 21 May 2013
  27. 27.
    Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO ’83, pp. 51–67 (1984)Google Scholar
  28. 28.
    Zander, S., Armitage, G., Branch, P.: Covert channels in multiplayer first person shooter online games. In: 33rd IEEE Conference on Local Computer Networks, pp. 215–222 (2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Anton Mosunov
    • 1
  • Vineet Sinha
    • 1
  • Heather Crawford
    • 2
  • John Aycock
    • 1
  • Daniel Medeiros Nunes de Castro
    • 1
  • Rashmi Kumari
    • 1
  1. 1.Department of Computer ScienceUniversity of CalgaryCalgaryCanada
  2. 2.Harris Institute for Assured InformationFlorida Institute of TechnologyMelbourneUSA

Personalised recommendations