Preview

«System analysis and applied information science»

Advanced search

Mathematical model of a steganographic system based on key information in the form of stegosets

https://doi.org/10.21122/2309-4923-2022-3-67-74

Abstract

A formal description of the mathematical model of a steganographic system based on key information in the form of stegosets is given. The mathematical model of the steganographic system is intended both for placing hidden marks to control the integrity of documents acting as a container, and for covert data transmission. Exist-ing mathematical models do not fully meet the requirements for steganographic systems. The proposed model is based on the concepts of a three-level key, a stegoset, a container component, and a message block. The three-level key is a set of actual steganographic transformations depending on the type of container. A stegoset is an element of a key set. A component of a container is such a subset of it that there is a stegoset for it. A message block is such a sequential part of the message that there is a container component for it, in which it can be hidden using the appropriate stegoset. The model implements the application of different stegosets to different container compo-nents, and the message can be divided into blocks. The model allows controlling the integrity of the message and adapts to different types of containers. Possible options for the practical application of the mathematical model are proposed, such as monitoring the integrity of the message when calculating the control number, splitting the message into blocks and sequentially monitoring their integrity by analogy with the blockchain system.

About the Author

E. A. Blinova
Belarusian State Technological University
Belarus

Evgenia Blinova, senior teacher at Information systems and technolo-gies Department

Minsk



References

1. REFERENCES

2. Urbanovich P. P. Zashchita informatsii metodami kriptografii, steganografii i obfuskatsii [The protection of information based on the methods by cryptography steganography and obfuscation]. Minsk. BGTU Publ., 2017. 220 p.

3. Cachin C. An Information-Theoretic Model for Steganography, Information and Computation, Proc. 2nd International Workshop on Information Hiding, 1998, LNCS, v.1525, pp. 306-318.

4. Konahovich G.V. Komputernaya steganografia. Teoria i praktika [Computer steganography. Theory and practice] G.V. Konahovich, A. U. Puzyrenko. K.: MK-Press, 2006. 288 p.

5. Shutko N.P. Modelirovanie steganographicheskoy systemy v zadachah po ohrane avtorskih prav [The modeling of the steganographic system in copyright tasks]. N. P. Shutko, N. I. Listopad, P. P. Urbanovich, 8th International scientific and technical conference “Information technologies in industry”(IТI-2015) (2-3 April 2015), Minsk. UIIP NAS of Belarus Publ., 2015. 128 p. ISBN 978-985-6744-87-0.

6. Chernyavsky A.F. Ocenka informacionnyh poter pri filtracii izobrazheniy [Estimation of Information Losses in Image Filtering] A. F. Chernyavsky, I. L. Chvarkova, V.S. Sadov. Minsk. BSU Publ. Informatics, № 2, 2008. 119-128 pp.

7. Pavel Urbanovich, Nadzeya Shutko Theoretical Model of a Multi-Key Steganography System // Recent Developments in Mathematics and Informatics.Contemporary Mathematics and Computer Science. Part II Computer Science/ Wydawnictwo KUL, 2016, pp. 181-202.

8. Blinova E.A., Sushchenia A.A. Several steganographic methods using for embedding of hidden data in electronic text documents. «System analysis and applied information science». 2019;(2):32-38. (In Russ.) https://doi.org/10.21122/2309-49232019-2-32-38

9. Blinova E.A. Prilozhenie dlya naneseniya steganograficheskogo vodyanogo znaka na elektronnuyu kartu [An application for applying a steganographic watermark to an electronic card] / Blinova E.A., Stashevskaya I.U. // Proc. 8th International scientific and technical conference “Information technologies in education, science and industry” (20-22 November 2021), Minsk. MIDO BNTU Publ., 2021. pp. 193-198.


Review

For citations:


Blinova E.A. Mathematical model of a steganographic system based on key information in the form of stegosets. «System analysis and applied information science». 2022;(3):67-74. (In Russ.) https://doi.org/10.21122/2309-4923-2022-3-67-74

Views: 321


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)