ABSTRACT

As indicated above, Chestega follows the Nostega paradigm and exploits popular game domains such as chess, checkers, crosswords, and dominoes to conceal messages. Referring back to the five modules of Nostega, the first step for Chestega is to determine a particular game field (domain) such as chess, checkers, crosswords, or dominoes

that can be employed to achieve the steganographic goal. e second module identifies some steganographic parameters (steganographic carriers) that are capable of concealing data without creating noise. Chestega exploits representational data of games such as moves, game analysis, teaching, etc., from either authenticated data or untraceable data (private data) in order to generate noiseless steganographic cover. e third module is concerned with the message encoding and the fourth addresses cover generation. In Chestega, the message encoder will depend on the steganographic parameters and the cover is generated using non-steganographic tools such as Chessmaster 8000. e final step is implementing a communications protocol that is responsible for how the intended parties communicate covertly. e last module includes the implementation and establishment of the covert communication channel for transmitting a steganographic cover. Without loss of generality, the rest of this chapter assumes that chess is the game picked by the first module. e next section gives an overview of Chestega and is then followed by a detailed discussion of the Chestega modules.