A First Look at Private Communications in Video Games using Visual Features

Author:

Wajid Abdul1,Kamal Nasir2,Sharjeel Muhammad2,Sheikh Raaez Muhammad2,Wasim Huzaifah Bin2,Ali Muhammad Hashir2,Hussain Wajahat2,Ali Syed Taha2,Anjum Latif2

Affiliation:

1. National University of Sciences & Technology (NUST) , Pakistan .

2. NUST

Abstract

Abstract Internet privacy is threatened by expanding use of automated mass surveillance and censorship techniques. In this paper, we investigate the feasibility of using video games and virtual environments to evade automated detection, namely by manipulating elements in the game environment to compose and share text with other users. This technique exploits the fact that text spotting in the wild is a challenging problem in computer vision. To test our hypothesis, we compile a novel dataset of text generated in popular video games and analyze it using state-of-the-art text spotting tools. Detection rates are negligible in most cases. Retraining these classifiers specifically for game environments leads to dramatic improvements in some cases (ranging from 6% to 65% in most instances) but overall effectiveness is limited: the costs and benefits of retraining vary significantly for different games, this strategy does not generalize, and, interestingly, users can still evade detection using novel configurations and arbitrary-shaped text. Communicating in this way yields very low bitrates (0.3-1.1 bits/s) which is suited for very short messages, and applications such as microblogging and bootstrapping off-game communications (dialing). This technique does not require technical sophistication and runs easily on existing games infrastructure without modification. We also discuss potential strategies to address efficiency, bandwidth, and security constraints of video game environments. To the best of our knowledge, this is the first such exploration of video games and virtual environments from a computer vision perspective.

Publisher

Walter de Gruyter GmbH

Subject

General Medicine

Reference99 articles.

1. [1] Haseeb Ahmad, Sardar Muhammad Usama, Wajahat Hussain, and Muhammad Latif Anjum. A sketch is worth a thousand navigational instructions. Autonomous Robots, pages 1–21, 2021.

2. [2] Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao. Zombiecoin 2.0: managing next-generation bot-nets using bitcoin. International Journal of Information Security, 17(4):411–422, 2018.

3. [3] D Anthony, D Johnson, P Lutz, and B Yuan. A behavior based covert channel within anti-virus updates. In Proceedings of the International Conference on Security and Management (SAM), page 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2012.

4. [4] Matt Burgess. This is why Russia’s attempts to block Telegram have failed. https://www.wired.co.uk/article/telegram-in-russia-blocked-web-app-ban-facebook-twitter-google, April 2018.

5. [5] Sam Burnett, Nick Feamster, and Santosh Vempala. Chipping away at censorship firewalls with user-generated content. In USENIX Security Symposium, pages 463–468. Washington, DC, 2010.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3