Keywords: associative steganography, cryptography, streaming architecture, decorator, information security
Development of StegoStream decorator for associative protection of byte stream
UDC 004.056.5
DOI: 10.26102/2310-6018/2023.41.2.023
The .NET streaming architecture is based on three concepts: reference repositories, decorators, and adapters. A reference repository represents an endpoint, such as a file on a storage device, an array in RAM, or a network connection. It cannot be used unless the programmer has access to it. The standard .NET class designed for this purpose is Stream; it provides a standard set of methods that allow byte-by-byte reading, writing, and positioning. Streams fall into two categories: streams with reference repository and streams with decorators. Streams with reference repositories and streams with decorators deal exclusively with bytes. While flexible and efficient, applications often operate at higher levels, such as text or XML. Adapters bridge this gap by putting a stream into a class shell with specialized methods that are typified for a specific format. The paper presents the StegoStream decorator developed by the authors, which is based on associative data protection mechanism. This decorator has the following advantages: it provides interaction with the adapter; it releases streams with reference repositories from the necessity of independent implementation of such features as hiding and unhiding; streams decorated with StegoStream do not suffer from interface changes; StegoStream may be used when chaining with other decorators (for example, the compression decorator may be combined with the hiding decorator). Practical use of StegoStream decorator is presented drawing on the example of the developed multi-client secure chat with a centralized server.
1. Duda R.O., Hart P.E., Stork D.G. Pattern classification and scene analysis. New York: Wiley. 1973;3:731–739.
2. Raikhlin V.A., Vershinin I.S., Gibadullin R.F., Pystogov S.V. Reliable recognition of masked binary matrices. Connection to information security in map systems. Lobachevskii Journal of Mathematics, 2013;34(4):319–325. DOI: 10.1134/S1995080213040112.
3. Raikhlin V.A., Gibadullin R.F., Vershinin I.S., Pystogov S.V. Reliable recognition of masked cartographic scenes during transmission over the network. In 2016 International Siberian Conference on Control and Communications (SIBCON), IEEE. 2016;1–5. DOI: 10.1109/SIBCON.2016.7491657.
4. Tian X., Benkrid K. Mersenne Twister Random Number Generation on FPGA, CPU and GPU. 2009 NASA/ESA Conference on Adaptive Hardware and Systems, San Francisco, CA, USA. 2009;460–464. DOI: 10.1109/AHS.2009.11.
5. Raikhlin V.A., Vershinin I.S., Gibadullin R.F. The Elements of Associative Steganography Theory. Moscow University Computational Mathematics and Cybernetics. 2019;43(1):40–46. DOI: 10.3103/S0278641919010072.
6. Vershinin I.S., Gibadullin R.F., Pystogov S.V., Raikhlin V.A. Associative steganography. Durability of associative protection of information. Lobachevskii Journal of Mathematics. 2020;41(3):440–450. DOI: 10.1134/S1995080220030191.
7. Vershinin I.S., Gibadullin R.F., Pystogov S.V., Raikhlin V.A. Associative steganography of text messages. Moscow University Computational Mathematics and Cybernetics. 2021;45(1):1–11. DOI: 10.3103/S0278641921010076.
8. Raikhlin V.A., Gibadullin R.F., Vershinin I.S. Is it possible to reduce the sizes of stegomessages in associative steganography? Lobachevskii Journal of Mathematics. 2022;43(2):455–462.
9. Albahari J. C# 10 in a Nutshell. O'Reilly Media, Inc.; 2022. 1061 p.
10. Stego. URL: https://bitbucket.org/landwatersun/stego/ (accessed on 15.04.2023).
11. GostCryptography. URL: https://github.com/AlexMAS/GostCryptography/ (accessed on 08.04.2023).
12. InfoTeKS. URL: https://infotecs.ru/ (accessed on 15.04.2023).
13. Fomichev V.M., Bobrovsky D.A., Koreneva A.M. Experimental evaluation of performance of one class of cryptoalgorithms based on generalization of Feistel networks. Pricladnaia diskretnaia matematika. Prilozhenie = Applied discrete mathematics. Appendix. 2020;13:59–62. DOI: 10.17223/2226308X/13/18. (In Russ.)
14. Multi-Client Chat Server. URL: https://bitbucket.org/landwatersun/multi-client-chat-server/ (accessed on 15.04.2023).
Keywords: associative steganography, cryptography, streaming architecture, decorator, information security
For citation: Vershinin I.S., Gibadullin R.F., Gashigullin D.A. Development of StegoStream decorator for associative protection of byte stream. Modeling, Optimization and Information Technology. 2023;11(2). URL: https://moitvivt.ru/ru/journal/pdf?id=1359 DOI: 10.26102/2310-6018/2023.41.2.023 (In Russ).
Received 07.05.2023
Revised 23.05.2023
Accepted 19.06.2023
Published 30.06.2023