Разработка декоратора StegoStream для ассоциативной защиты байтового потока
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Development of StegoStream decorator for associative protection of byte stream

Vershinin I.S.,  idGibadullin R.F., Gashigullin D.A. 

UDC 004.056.5
DOI: 10.26102/2310-6018/2023.41.2.023

  • Abstract
  • List of references
  • About authors

The .NET streaming architecture is based on three concepts: reference repositories, decorators, and adapters. A reference repository represents an endpoint, such as a file on a storage device, an array in RAM, or a network connection. It cannot be used unless the programmer has access to it. The standard .NET class designed for this purpose is Stream; it provides a standard set of methods that allow byte-by-byte reading, writing, and positioning. Streams fall into two categories: streams with reference repository and streams with decorators. Streams with reference repositories and streams with decorators deal exclusively with bytes. While flexible and efficient, applications often operate at higher levels, such as text or XML. Adapters bridge this gap by putting a stream into a class shell with specialized methods that are typified for a specific format. The paper presents the StegoStream decorator developed by the authors, which is based on associative data protection mechanism. This decorator has the following advantages: it provides interaction with the adapter; it releases streams with reference repositories from the necessity of independent implementation of such features as hiding and unhiding; streams decorated with StegoStream do not suffer from interface changes; StegoStream may be used when chaining with other decorators (for example, the compression decorator may be combined with the hiding decorator). Practical use of StegoStream decorator is presented drawing on the example of the developed multi-client secure chat with a centralized server.

1. Duda R.O., Hart P.E., Stork D.G. Pattern classification and scene analysis. New York: Wiley. 1973;3:731–739.

2. Raikhlin V.A., Vershinin I.S., Gibadullin R.F., Pystogov S.V. Reliable recognition of masked binary matrices. Connection to information security in map systems. Lobachevskii Journal of Mathematics, 2013;34(4):319–325. DOI: 10.1134/S1995080213040112.

3. Raikhlin V.A., Gibadullin R.F., Vershinin I.S., Pystogov S.V. Reliable recognition of masked cartographic scenes during transmission over the network. In 2016 International Siberian Conference on Control and Communications (SIBCON), IEEE. 2016;1–5. DOI: 10.1109/SIBCON.2016.7491657.

4. Tian X., Benkrid K. Mersenne Twister Random Number Generation on FPGA, CPU and GPU. 2009 NASA/ESA Conference on Adaptive Hardware and Systems, San Francisco, CA, USA. 2009;460–464. DOI: 10.1109/AHS.2009.11.

5. Raikhlin V.A., Vershinin I.S., Gibadullin R.F. The Elements of Associative Steganography Theory. Moscow University Computational Mathematics and Cybernetics. 2019;43(1):40–46. DOI: 10.3103/S0278641919010072.

6. Vershinin I.S., Gibadullin R.F., Pystogov S.V., Raikhlin V.A. Associative steganography. Durability of associative protection of information. Lobachevskii Journal of Mathematics. 2020;41(3):440–450. DOI: 10.1134/S1995080220030191.

7. Vershinin I.S., Gibadullin R.F., Pystogov S.V., Raikhlin V.A. Associative steganography of text messages. Moscow University Computational Mathematics and Cybernetics. 2021;45(1):1–11. DOI: 10.3103/S0278641921010076.

8. Raikhlin V.A., Gibadullin R.F., Vershinin I.S. Is it possible to reduce the sizes of stegomessages in associative steganography? Lobachevskii Journal of Mathematics. 2022;43(2):455–462.

9. Albahari J. C# 10 in a Nutshell. O'Reilly Media, Inc.; 2022. 1061 p.

10. Stego. URL: https://bitbucket.org/landwatersun/stego/ (accessed on 15.04.2023).

11. GostCryptography. URL: https://github.com/AlexMAS/GostCryptography/ (accessed on 08.04.2023).

12. InfoTeKS. URL: https://infotecs.ru/ (accessed on 15.04.2023).

13. Fomichev V.M., Bobrovsky D.A., Koreneva A.M. Experimental evaluation of performance of one class of cryptoalgorithms based on generalization of Feistel networks. Pricladnaia diskretnaia matematika. Prilozhenie = Applied discrete mathematics. Appendix. 2020;13:59–62. DOI: 10.17223/2226308X/13/18. (In Russ.)

14. Multi-Client Chat Server. URL: https://bitbucket.org/landwatersun/multi-client-chat-server/ (accessed on 15.04.2023).

Vershinin Igor Sergeevich
Candidate of Technical Sciences, Associate Professor

Kazan National Research Technical University named after A.N. Tupolev–KAI

Kazan, The Russian Federation

Gibadullin Ruslan Farshatovich
Candidate of Technical Sciences, Associate Professor
Email: rfgibadullin@kai.ru

WoS | Scopus | ORCID | eLibrary |

Kazan National Research Technical University named after A.N. Tupolev–KAI

Kazan, The Russian Federation

Gashigullin Danil Ayratovich

Email: gashigullin44@gmail.com

Kazan National Research Technical University named after A.N. Tupolev–KAI

Kazan, The Russian Federation

Keywords: associative steganography, cryptography, streaming architecture, decorator, information security

For citation: Vershinin I.S., Gibadullin R.F., Gashigullin D.A. Development of StegoStream decorator for associative protection of byte stream. Modeling, Optimization and Information Technology. 2023;11(2). URL: https://moitvivt.ru/ru/journal/pdf?id=1359 DOI: 10.26102/2310-6018/2023.41.2.023 (In Russ).

458

Full text in PDF

Received 07.05.2023

Revised 23.05.2023

Accepted 19.06.2023

Published 30.06.2023