11.07.2015 Views

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8Block Diagram and Formal Mathematical Definition of SteganographicSystemAlexey SmirnovAssociate Professor in the Department of Software, Kirovohrad National Technical University, Kirovohrad, UkraineAbstractThis paper studies a formal mathematical description and the block diagram of the secret system and, by analogy withthe theory of secret systems, introduces the basic elements and mathematical operators, abstractly d escribing steganographicinformation protection system.Keywords: secret systems, steganographic system, formal mathematical definition1. IntroductionMathematical foundations of modern cryptography are laid by the famous American scientist C. Shannon [1-3], who,for the first time, using information-theoretic approach, introduced abstract mathematical definition of a secret system andformalized the procedures for data cryptographic transformation of data. These studies gave a significant boost to thedevelopment of the individual methods of the theory of information security, crypt ography and authentication, digitalsteganography, and digital signal processing techniques and error-correcting coding [4-12].This paper studies a formal mathematical description (in terms of C. Shannon) and the block diagram of the s ecretsystem and, by analogy with the theory of secret systems, introduces the basic elements and mathematical operators, abstractlydescribing steganographic information protection system.2. Block diagram and a formal mathematical definition of cryptographic (secret) systemAbstract secret system is defined as some set of mappings from one space (the set of possible messages) to a differentspace (the set of possible cryptograms) [1-3].Let’s fix a set of possible messages M = {M 1 , M 2 , …, M m } and a set of cryptograms E = {E 1 , E 2 , …, E n }. We will alsofix a set of mappings: = { 1 , 2 , …, k },where: i : M E, i = 1, 2 , …, k.If the sets M and E are equivalent, i.e., n = m, then there is an inverse mapping -1 i : E M, which assigns each-1element of the set E to an element of M. Obviously, i and i are given reciprocally the same mapping of the sets M and E.Let’s now fix a set of keys К = {К 1 , К 2 , …, К k }, so that for all i = 1, 2 , …, k mapping i is uniquely specified bythe key K i , that is:Ki : M E .iEach specific mapping of i from the set corresponds to the way of encryption with a specific key K i .Let’s fix a set of keys К * = {К 1 * , К 2 * , …, К k * }, in general to К К * . All the elements of the inverse mappings: -1 = { 1 -1 , 2 -1 , …, k -1 }are given the appropriate key:1iK * i : E M .Each specific mapping -1 i of the set -1 corresponds to the way of decryption using the key K * i . If the key K * i isknown, then the only one answer is possible as the result of decryption – an element of the set M.Thus, an abstract definition of a secret system includes the following sets of M, E, , -1 , К and К * (the sets of opentexts and cryptograms, sets of direct and inverse mappings, sets of keys). If, in addition, К К * , then the system isasymmetric. On the contrary, if К = К * – the system is symmetric. Fig. 1 represents a block diagram of a s ecret system.Issn <strong>2250</strong>-<strong>3005</strong>(online) December| 2012 Page 90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!