Information hiding device

FIELD: electricity.

SUBSTANCE: information hiding device comprises: a signal attenuation unit, two key memory units, a masking signal shaping unit, a subtracting unit, six adder units, four multiplier units, an information transfer device unit, a factor shaping unit, a divider unit.

EFFECT: improvement of security and accuracy of recovery of the secured signal.

8 dwg

 

The invention relates to telecommunications and computer technology, to the field of methods and devices for steganographic data conversion, and can be used in communications, computing and information systems for steganographic information hiding when exchanging data, government, law enforcement, defense, banking and industrial institutions when the need arises for the storage and transmission of confidential information.

As an analogue of the invention may be considered known device radiometruli [1], which contains a noise generator consisting of a system of two coupled oscillators, a capacitive coupling element between them, radiating antenna and the source of low frequency noise. The first generator comprises a nonlinear amplifier, delay and inertia chain avtomashine. The output of the nonlinear amplifier connected to the input through a delay line inertia chain avtomashine included between the common electrode of the active element non-linear generator and a shared bus. The second generator comprises a nonlinear amplifier and an adjustable delay line. The output of the nonlinear amplifier connected to the input through an adjustable delay line. The delay line provides a position adjustment of the natural frequencies of the generator. The output of the first generator with�United with the input of the second generator via a capacitive coupling element. Element of the oscillating system is radiating antenna type magnetic dipole. The input of the first generator is connected to the output of low-frequency noise source.

A disadvantage of the known device is the generation of noise by the receiving side, which limits the range of radiometruli, and the use of the principle of additive blending, which reduces its resistance to attacks.

It is known device [2, Fig. 7.1] (prototype) information hiding in audio signals that contains the encoder and decoder. The encoder contains functional Converter, the first input of which is connected to the input of the encoder, a second input connected the output of the random number generator, the adder, to the first input of which is connected to the input of the encoder, a second input connected to the output of the function Converter, and the output connected to the output of the encoder. The input of the decoder connected to the first input of the functional Converter and the second input of the first multiplier, the output of the random number generator connected to the first input of the first multiplier, to the second input of the functional Converter and to the second input of the second multiplier, the output of the function Converter connected to the first input of the second multiplier, the output of the first multiplier connected to the unit of statistical analysis, the output of which is connected to the first input of the threshold at�of trojstva, the output of the second multiplier connected to the second input of the threshold device, the output of the threshold device is an output device.

The disadvantage of the prototype is the inability to restore the hidden information in full, as a result of operation of the device is to decide about the presence of hidden information.

The purpose of the invention - increase the secrecy and accuracy of data recovery.

To this end, in the known device containing the block of formation of the masking signal, the first and second blocks of keys, and the block transmission of information, the entered block of attenuation to the input of which is connected to the input device, the output of the attenuation of the signal connected to the first input of the subtraction unit, to the first input of the first summation block and to the first input of the second summation block, the first output of the first memory block of keys connected to the second input of the first summation block, the second output is connected to the first input of the third summation block, the third output connected to the second input of the subtraction unit, the output of the block forming masking signal is connected to the second input of the first block multiplication, and to the second input of the second block multiplication, the output of the subtraction unit is connected to the second input of the third summation block and to the second input of the fourth block of summerbay�, the output of the first summation block is connected to the first input of the first block multiplication, the output of the third summation block is connected to the first input of the second block multiplication, the output of the first block multiplication is connected to the second input of the second summation block, the output of the second block multiplication connected to the first input of the fourth unit summation, the output of the second summation block is connected to the first input unit of information transfer, the output of the fourth summation block is connected to the second input of the block transmission of information, the first output of the block transmission of information connected to the first input of the third block multiplication, and to the first input of the fifth block of summation, the second output of the block transmission of information connected to the first input of the fourth block multiplication, and to the second input of the fifth block of summation, the first output of the second memory block of keys connected to the first input of the block of formation of the coefficients, a second output connected to the second input of the block of formation of the coefficients, a third output connected to the third input of the block of formation of the coefficients, the first output of the block of formation of the coefficients is connected to the second input of the third block multiplication, a second output connected to a second input of the fourth block multiplication, the third output connected to the third input of the sixth summation block, the fourth output�connected to the third input of the fifth block of summation, the output of the third block multiplication connected to the first input of the sixth summation block, the output of the fourth block multiplication is connected to the second input of the sixth summation block, the output of the sixth summation block is connected to the first input of the block division, the fifth output of the summation block is connected to the second input of the block division, the output of the unit of division is the output device.

Technical results that will be obtained when using the invention is a device for hiding information that allows you to mask the useful signal in random noise signal when the ratio signal/noise is less than 0.1 and to restore full hidden information received by a party.

Fig. 1 shows a block diagram of a device for hiding information. The device comprises a unit of attenuation 1, the first and second memory blocks of keys 2 and 12, the processing unit masking signal 3, the subtraction unit 4, six blocks of summation, respectively 5, 9, 6, 10, 17, and 16, four blocks multiplication respectively 7, 8, 14 and 15, block transmission device, information 11, the processing unit 13 coefficients, the block division 18.

Fig. 2 shows the time dependence of the samples of two signals y1(n) and y2(n), and masking of the signal z(n).

Fig. 3 shows the spectrum of the hidden signal.

Fig. 4 shows the spectrum of the signal�and the output of summation block 9.

Fig. 5 shows the spectrum of the signal at the output of the summation block 10.

Fig. 6 shows the distribution histogram of the probability density masking signal.

Fig. 7 shows the distribution histogram of the probability density of the signal at the output of summation block 9.

Fig. 6 shows the distribution histogram of the probability density of the signal at the output of summation block 10.

The device operates as follows.

Concealed signal is supplied to the unit attenuation 2, which generates a first signal y1:

where y(n) counts the hidden signal.

The second signal is generated in block 4 using the first signal:

where K1- the value of the first key stored in the memory block of 3 keys.

The value of the first key is a checksum, which links the signals (1) and (2) [3]. Unit 1 generates a random signal, which is required for masking the received two signals.

General view of the steganographic transformation is described by the following expressions:

where z is the masking signal samples;

y - readings of hidden data;

φ - function steganographic conversion.

The device implements a linear model steganographic conversion. Options�I steganographic transformation has the following form:

where K2and K3- key steganography in the transform.

Timing signals, which are fed to the inputs of the device information transmission 11, are described as follows:

The system of equations (5) is a mathematical model of the encoder. In both equations (5) used the same masking signal samples. Transmission of two signals with the known devices of information transmission, such as transmission devices stereo audio signal, quadrature-amplitude-modulated signal and other devices.

The ratio of embedded data to the values of the masking signal may be much less than unity, as shown in Fig. 2. The received signals (5) are filled with steganotaenia. A distinctive feature formed in accordance with (5) of the container is the presence of two signals, having in its composition a common masking component. This feature allows you to use for opening the container functional compressive display [3].

Consider the effectiveness of masking of the hidden signal. Take the concealed signal of the harmonic oscillation, and as the mask, a random signal with uniform distribution the probability density will Form the first and second signals. Kind of signals are shown in Fig. 2.

Compare the spectra of the hidden signal (Fig. 3) and steganographic signals after conversion (Fig. 4 and 5). It is evident that the harmonic-concealed signal in the spectra of the signals of the container are released.

Let us compare the probability density functions of the masking signal and the steganographic signals after conversion. Fig. 6 shows the density of the probability distribution of the masking signal. Distribution of probability density signals of the container shown in Fig. 7 and Fig. 8. It is seen that after embedding the hidden signal in the container band occupied by the histograms of the signals of the container is not increased.

The signals after conversion into the unit of information transfer 11. This unit involves communication system, comprising the device for conversion of the signal transmitting and receiving device and the transmission line information. As an example of a system of information transfer that implements the simultaneous transmission of two signals on a single communication channel, it is possible to consider a system that uses quadrature amplitude modulation signal [4], followed by demodulation.

The extraction of the hidden signal is performed using the inverse steganographic conversion. To extract the hidden signal receiving party, uncut�odimo know the values of the keys 1To2and K3.

The extraction of hidden information from the container (5) is performed using a compressive transformation. The restoration of two signals (1) and (2) from the container using the following expressions [3]:

Then restored the hidden signal:

Combining expressions (6) and (7) we get:

where the coefficients k are formed in the block 13 by key values To the following:

k1=2(K1+K3); k2=2R2; k3=2K1K2;

The expression (8) is a mathematical model of the decoder and is implemented using blocks 14-18 (Fig. 1).

The output signal of the decoder, in the absence of noise in the block 11 and quantization errors when performing calculations, corresponds to concealed signal with absolute precision.

Thus, the proposed device allows you to effectively mask the hidden signal in random noise signal and to transmit it by communication lines with subsequent recovery.

Sources of information

1. The patent for the invention №2170493. Russian Federation, IPC NC. The device radiometruli / V. A. Bezrukov, V. P. Ivanov, B. C. Kalashnikov, M. N. Lebedev // (Russia); Appl. 15.05.2000; publ. 15.05.2001.

2. Gribakin V. G. Digital steganog�afia / VG Gribakin, I. N. Shackles, I. V. Juventus. - Moscow: Solon-Press. 2002. - 272.

3. Samarskii, V. K. correction Algorithm multifactor additional error measurement transducers / VK Sikorski // Instruments and control systems. - 1996. - No. 7. - Pp. 20-23.

4. Sergienko, A. B. Digital signal processing / A. B. Sergienko //. - SPb.: Peter, 2005. - 604 p.

A device for hiding information containing the processing unit masking signal, the first and second memory blocks of the keys and the block transmission of information, characterized in that, to increase the stealth and precision of recovery of the hidden signal in the device, enter the unit of attenuation, the input of which is connected to the input device, the output of the attenuation of the signal connected to the first input of the subtraction unit, to the first input of the first summation block and to the first input of the second summation block, the first output of the first memory block of keys connected to the second input of the first summation block, the second output is connected to the first input of the third summation block, the third output is connected to the second input of the subtraction unit, the output of the block forming masking signal is connected to the second input of the first block multiplication, and to the second input of the second block multiplication, the output of the subtraction unit is connected to the second input of the third summation block and to the second input of the fourth �Loka summation, the output of the first summation block is connected to the first input of the first block multiplication, the output of the third summation block is connected to the first input of the second block multiplication, the output of the first block multiplication is connected to the second input of the second summation block, the output of the second block multiplication connected to the first input of the fourth unit summation, the output of the second summation block is connected to the first input unit of information transfer, the output of the fourth summation block is connected to the second input of the block transmission of information, the first output of the block transmission of information connected to the first input of the third block multiplication, and to the first input of the fifth block of summation, the second output of the block transmission of information connected to the first input of the fourth block multiplication, and to the second input of the fifth block of summation, the first output of the second memory block of keys connected to the first input of the block of formation of the coefficients, a second output connected to the second input of the block of formation of the coefficients, a third output connected to the third input of the block of formation of the coefficients, the first output of the block of formation of the coefficients is connected to the second input of the third block multiplication, a second output connected to the second input of the fourth block multiplication, the third output connected to the third input of the sixth summation block, the fourth output �otklyuchen to the third input of the fifth block of summation, the output of the third block multiplication connected to the first input of the sixth summation block, the output of the fourth block multiplication is connected to the second input of the sixth summation block, the output of the sixth summation block is connected to the first input of the block division, the fifth output of the summation block is connected to the second input of the block division, the output of the unit of division is the output device.



 

Same patents:

FIELD: information technologies.

SUBSTANCE: method of secure information transmission based on addition of the secured signal and the signal being a function of the secured signal and the masking signal, differing by that, for the purpose of increase of hiding and accuracy of recovery of the secured signal, the stego-container containing two components is formed, for this purpose the first signal is allocated which is equal to a half of the secured signal, and the second signal equal to a difference of the value of the first key and the first signal, the first component of the container is defined by the first signal, to which the product of masking signal and the sum of value of the second key and the first signal is added, the second component of the container is defined by the second signal, to which the product of masking signal and the sum of value of the third key and the second signal is added, to recover the secured signal four coefficients are determined, the first coefficient is equal to the doubled sum of values of the first and third keys, the second coefficient is equal to the doubled value of the second key, the third coefficient is equal to the doubled product of values of the first and second keys, the fourth coefficient is equal to the sum of values of the second and third keys, the readings of the secured signal are found by adding of the third coefficient to the product of the first container components and the first coefficient, and subtracting the product of the second container components and the second coefficient, the obtained result is divided by the sum of the first and second components of the container and the fourth coefficient.

EFFECT: improvement of security and accuracy of recovery of the secured signal.

11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method for transliteration conversion of information and transmission thereof over communication channels includes receiving a structured message and breaking down said method into parts. A first part is broken down into two different data units, to which control information is added to obtain transliteration matrix row and column coordinates, from which a matrix cell corresponding to the first part of the message is selected. A semantic expression is extracted and transmitted, from the selected cell, to a communication channel, the semantic expression being used to determine cells available for converting the second part of the message. The second part is broken down into two different data units with addition of control information to obtain row and column coordinates for selecting a matrix cell from which a semantic expression is extracted, which corresponds to the second part of the message, and said expression is transmitted to a communication channel. The selected semantic expression is used to determine cells which are available for converting the third part of the message, wherein the third and subsequent parts are converted in the same manner as the second part.

EFFECT: high reliability of transmitting structured messages, achieved by validation of transmission of structured units.

1 dwg

FIELD: information technologies.

SUBSTANCE: method to code a data unit represented as a bit string consisting in formation of a secret key in the form of subkeys K and Q, which represent bit strings, formation of an auxiliary n-bit string T, formation of an n-bit auxiliary cryptogram CM by performance of operation of E coding on the data unit M depending on K according to the formula CM=EK(M), formation of an n-bit auxiliary cryptogram CT by performance of operation of E coding on the n-bit string T depending on Q according to the formula CT=EQ(T), formation of 2n-bit cryptogram C depending on subkeys K and Q and auxiliary cryptograms CM and CT, differing by the fact that the subkey K is formed as a 2n-bit string, representing concatenation o two n-bit strings k1 and k2, the subkey Q is formed as a 2n-bit string, representing concatenation of two n-bit strings q1 and q2, the (n+1)-bit string m is formed, and the 2n-bit cryptogram C is formed as concatenation of two binary polynomials of degree n-1, being the solution to the system of two linear equations k1C1+k2C2=CM mod m and q1C1+q2C2=CT mod m with two unknown binary polynomials C1 and C2, in which m is an additionally formed polynomial of degree n, and n-bit strings k1, k2, q1, q2, CM, CT are considered as binary polynomials of degree n-1, and (n+1)-bit string m is considered as a binary polynomial of degree n.

EFFECT: increased level of protection of coded information.

2 cl

FIELD: information technologies.

SUBSTANCE: method to code a message represented as a multidigit binary number, which consists in the fact that a secret key is generated (p, q) in the form of two simple multidigit binary numbers p and q, an open key is generated in the form of a multi-digit binary number n=pq, a cryptogram C is generated depending on the message M and open key n, and the message M is recovered from the cryptogram C according to the secret key (p, q), differing by the fact that additionally they generate an auxiliary multidigit binary number R<n, the cryptogram C is formed as a pair (A, B) of multidigit binary numbers A and B depending on the message M, the open key n and the multidigit binary number R, and the message M is recovered by solving the equation x2-Ax+B=0 mod n relative to the unknown x and calculation of the message M from one of the solutions of the specified equation.

EFFECT: increased level of protection of coded information.

4 cl

FIELD: radio engineering, communication.

SUBSTANCE: method of encrypting a binary data (M) unit comprises generating a secret key which includes subkeys Q and R, generating an auxiliary n-bit unit of binary data T, generating an in-bit auxiliary cryptogram CM by performing, over M, a block encryption E operation depending on Q using the formula CM=EQ(M), generating an n-bit auxiliary cryptogram CT by performing, over T, a block encryption E operation depending on R using the formula CT=ER(T), generating a cryptogram C depending on the secret key and the auxiliary cryptograms CM and CT, characterised by that subkey Q is generated in the form of a 2n-bit line which is a concatenation of two n-bit binary numbers q1 and q2, the subkey R is generated in the form of a 2n-bit line which is a concatenation of two n-bit binary numbers r1 and r2, generating a (n+1)-bit binary number p and generating a cryptogram C in the form of a concatenation of two multi-bit binary numbers C1 and C2, which are the solution of a system of two linear equations q1C1+q2C2=CM mod p and r1C1+r2C2=CT mod p with two unknowns C1 and C2.

EFFECT: higher level of security of encrypted information.

3 cl

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to communication systems. Disclosed versions provide methods and systems for generating arbitrary channel switching patterns, frequent update of patterns, generating different patterns for different cells/sectors and generating patterns of adjacent frequency subcarriers for block channel switching.

EFFECT: efficient design of arbitrary channel switching patterns in a communication system.

34 cl, 7 dwg

FIELD: physics, computer engineering.

SUBSTANCE: Invention relates to data transmission in digital TCP/IP data networks via HTTP. The method of transmitting data in digital TCP/IP data networks via HTTP is realised by a system which includes network modules integrated into a client computer and a server computer and which facilitate a connection between the client computer and the server computer; receiving and transmitting network packets in the connection between the client and the server; encrypting the network packets for the established connection; tunneling the network packets; wherein between the client and the server there are at least two proxy servers connected to the client and the server; the method comprises establishing, by the network modules, a connection between the client and the server, wherein the connection is established through at least two proxy servers; creating a tunnel message in the client network module; transmitting the tunnel message to the server; selecting a delay T value based on maximum transmission speed of the tunnel message between the client and the server by carrying out the following procedures: establishing a time T variation interval and a time increment; measuring the transmission speed of the tunnel message for each value of T in the interval; selecting a value of T corresponding to the maximum transmission speed; determining the volume of a packet with false data Q; sending from the client a packet with false data with volume Q, T seconds after last transmission of false data via an HTTP tunnel; receiving the tunnel message at the server; disconnecting the Nagle algorithm for a TCP connection in network modules of the client and the server; disconnecting the TCP delayed acknowledgment algorithm in network modules of the client and the server.

EFFECT: high speed of transmitting data between a client and a server.

FIELD: information technology.

SUBSTANCE: method for incorporation of information into an image compressed by a fractal method based on a formed library of domains, which involves formation stages of a vector of image compression parameters, input of hidden information, extraction of domains and rank areas, correlation of rank areas and domains, formation of a terminal archive; besides, at the image compression stage, bits of hidden information are coded with coordinates of domains.

EFFECT: providing a possibility of hidden transmission of confidential data.

7 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering. The information protection method is based on two-way transmission and subsequent detection of probing radio signals carrying their emission timestamps, associated with predetermined time scales, and originating from communication devices located at both ends of a radio link, performing irreversible mathematical transformations over number sequences, encryption and decryption of messages using a key, while performing mutual recognition of communication participants and synchronising the time scale of the communication devices of the participants. The method also includes setting the operating time interval of information protection means and accumulating two matching sets of binary equivalents.

EFFECT: high reliability of protecting information during communication.

1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: existing single-channel method of receiving navigation safety information through narrow-band direct printing in the short-wave range with an allowable error threshold thereof of 4% can be replaced with extended verbal instructions of message symbols by a digital selective call, wherein a shipborne receiver may collect symbol-by-symbol even a message that is received distorted on all transmission channels thereof.

EFFECT: high reliability of receiving navigation safety information, shorter time for multichannel transmission of messages owing to compression of text, compatibility of the disclosed method with the existing level of usage of shipborne digital selective call receivers/controllers.

9 dwg

FIELD: information technologies.

SUBSTANCE: method of secure information transmission based on addition of the secured signal and the signal being a function of the secured signal and the masking signal, differing by that, for the purpose of increase of hiding and accuracy of recovery of the secured signal, the stego-container containing two components is formed, for this purpose the first signal is allocated which is equal to a half of the secured signal, and the second signal equal to a difference of the value of the first key and the first signal, the first component of the container is defined by the first signal, to which the product of masking signal and the sum of value of the second key and the first signal is added, the second component of the container is defined by the second signal, to which the product of masking signal and the sum of value of the third key and the second signal is added, to recover the secured signal four coefficients are determined, the first coefficient is equal to the doubled sum of values of the first and third keys, the second coefficient is equal to the doubled value of the second key, the third coefficient is equal to the doubled product of values of the first and second keys, the fourth coefficient is equal to the sum of values of the second and third keys, the readings of the secured signal are found by adding of the third coefficient to the product of the first container components and the first coefficient, and subtracting the product of the second container components and the second coefficient, the obtained result is divided by the sum of the first and second components of the container and the fourth coefficient.

EFFECT: improvement of security and accuracy of recovery of the secured signal.

11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: jamming method includes measuring coordinates of the characteristic location, determining the composition a global navigation satellite system (GNSS) orbital group used in a given area, and the number of operating satellites therein; simultaneously receiving navigation message signals from the operating satellites for all GNSS users in the given area; storing the received messages; distorting the navigation messages therein by delaying by different time intervals, after which a resultant interfering signal with distorted navigation messages is generated; synchronising the resultant interfering signal with signals of navigation messages of GNSS satellites; emitting the resultant interfering signal with power higher than that of legitimate signals of the GNSS satellites, wherein during prolonged operation, stored navigation messages are periodically updated. To generate the interfering signal, the method includes predetermining classes of GNSS users, accurately setting coordinates of false routes and traffic speed thereon for each class of GNSS users, and during operation, determining the class of GNSS users located in the given area, for each current moment in time ti and the corresponding jth point of the assigned false route with an interval Δt, Δt=ti-ti-1, calculating the required delay of navigation messages for each operating GNSS satellite.

EFFECT: prolonged concealed distortion of navigation parameters for radio navigators of a group of users located in a spatially limited but known area.

3 cl, 10 dwg

FIELD: radio engineering, communication.

SUBSTANCE: apparatus for protecting computers comprises: a printed-circuit board 14 with circuit components, power supply contacts of the apparatus for protecting computers 1 and 2, power supply contacts GShS 3 and 4, an output contact 1 GShS 5, an output contact 2 GShS 6, GShS7, a low frequency amplifier 8, a mid-frequency amplifier 9, a high frequency amplifier 10, a high-pass filter 11, an amplitude detector 12, an audio signalling device 13, an electrodynamic audio signal emitter 15, variable resistors R2, R3, R4, R5, separating capacitors C1, C2, C3, installed jumper contacts P1, P2, P3.

EFFECT: higher reliability of protecting information from unauthorised access and loss of information due to secondary electromagnetic radiations and stray pickup.

3 cl, 2 dwg, 1 tbl

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to radio engineering and specifically to electronic jamming of electronic equipment, particularly radio communication equipment with pseudo-random operating frequency adjustment, and can be used to jam shipborne and airborne radio communication equipment. The electronic jamming system comprises airborne receiving antenna, input microwave amplifier, microwave splitter, amplitude detector, probing signal analysis unit, interference former, microwave switch, power amplifier and transmitting antenna, carrier frequency meter, phase-shift keying detector, memory unit, switching control signal, satellite radio navigation system signal receiver, device for determining coordinates of carriers of the transmitter and receiver of the jammed radio communication system and a computer.

EFFECT: high efficiency of electronic jamming and low requirements for energy potential of the system.

2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to radio engineering and can be used to jam shipborne and airborne radio communication equipment. The method for electronic jamming of a radio communication system is based on receiving a probing information signal a jammed system, reproducing the carrier frequency of the signal, generating an interfering signal, amplifying and emitting the signal towards the jammed equipment. The method includes continuously measuring coordinates of carriers of the transmitter and receiver of the jammed system; the carrier of the jamming system used is an aircraft, wherein said carrier is held at a point in space on the "transmitter - receiver" line with the shortest possible distance from the receiver; upon detecting, in the received probing information signal of the transmitter, information radio pulses of a phase-shift keyed signal with carrier frequency which abruptly varies from pulse to pulse according to a random law, the duration, repetition period and carrier frequencies of said pulses are measured; if the measurement results match catalogue values of parameters of the probing information signal of the jammed system, interfering signals are generated, which are radio pulses with the same duration, repetition period and carrier frequency as the received probing information pulses, but delayed by about 0.2 mcs relative to the received pulses and without phase-shift keying, wherein each of the interference pulses are generated in form of a non-modulated radio pulse of the same duration as the received probing information radio pulses.

EFFECT: high efficiency of electronic jamming.

1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: electronic jamming system comprises a satellite radio navigation system signal receiver 4, a determiner 5 of the coordinates of carriers of the transmitter and the receiver of the system to be jammed, a computer 6, series-connected receiving antenna 7, input microwave amplifier 8, microwave splitter 9, amplitude detector 10 and probing signal analysing unit 11, a storage unit 12, a carrier frequency measuring device 13, a phase-shift keying detector 14, a leading edge pulse former 15 and series-connected interference former 16, microwave switch 17, power amplifier 18 and transmitting antenna 19. The interference former 16 comprises forward frequency shift unit, an intermediate radio frequency pulse stretcher 21 and a reverse frequency shift unit 22.

EFFECT: jamming shipborne and airborne radio communication equipment.

2 cl, 3 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to communication equipment and can be used for complex technical control. A mobile complex includes automated workstations for automated execution of tasks of ground visual, photographic, optic and electronic, radiation control, control of information protection efficiency and consisting of receiving and direction-finding antennas connected to a commutator connected to a radio receiving module in series connected to a digital signal processing device, a personal computer, a navigation device and a local area network connected to all personal computers, an automated air control workstation intended for execution of tasks of air photographic, television, thermal imaging control, detection of optic systems and devices at execution of tasks of complex technical control for detection of their technical give-away factors, which consists of an airborne platform and an unmanned aircraft, which are connected with control radio channels and telemetry radio channels to control equipment of unmanned aircrafts, to which there parallel connected is a navigation device and a personal computer, an automated workstation of control and communication, which contains a personal computer.

EFFECT: enlarging functional capabilities when using unmanned aircrafts as a part of a mobile complex as carriers of technical control means.

2 dwg

Jamming device // 2525299

FIELD: radio engineering, communication.

SUBSTANCE: known device, having a receiving and a transmitting path, series-connected reference generator and amplifier, further includes series-connected spacecraft signal delay calculating path and clock signal generating path, wherein the first group of data inputs of the spacecraft signal delay calculating path is the adjustment bus of the device, N spacecraft signal generating paths, an adder and a digital-to-analogue converter, the output of which is connected to the data input of the transmitting path, the reference input of which is combined with the reference input of the receiving path, the output of the amplifier and the reference input of the clock signal generating path, the output of which is connected to clock inputs of the N spacecraft signal generating paths, the adder, the digital-to-analogue converter and the spacecraft signal delay calculating path, the n-th group of data outputs of which, where n=1, 2, …, N, is connected to the group of data inputs of the n-th spacecraft signal generating path, the first and second groups of data outputs of which are connected to corresponding groups of data inputs of the adder, the first and second groups of data outputs of which are connected to corresponding groups of data inputs of the digital-to-analogue converter, and the second data input of the spacecraft signal delay calculating path is connected to the data output of the receiving path.

EFFECT: distortion of navigation parameters for radio navigators of a group of users located in a spatially confined but known region.

10 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to radio engineering and can be used for radio-electronic protection of an object dislocation area from radar surveillance. The retransmitted jamming method includes receiving probing signals of the side-looking radar of each jamming station arranged around the periphery of the protected area; measuring the duration and repetition period of probing signals; generating repeatedly radiated interference, correlated with probing, in form of patterns of the received signals; introducing radiation delay of the patterns of the received signals and interference carrier frequency shift, measured according to a program from period to period of the repetition of probing signals; receiving signals of the radio navigation space-based system GLONASS; radiating said interference with oblique polarisation; picking up code signals from the structure of space radio signals; generating, when picking up code signals, reference pulse sequences and use thereof in jamming and synchronising jamming stations operating collectively.

EFFECT: reducing radar contrast of an object relative to false targets and underlying surfaces owing to radio-electronic imitation of the latter, facilitating the speckle effect which disrupts the radar image of the object.

1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to radio engineering and can be used to jam shipborne and airborne radio communication equipment. The method for electronic jamming a radio communication system involves using an aircraft as a jamming system carrier which is maintained on a "receiver-transmitter" line at the shortest possible distance from the receiver. The jamming system receives a probing information signal of the jammed system, reproduces carrier frequencies of the signal based on the signal and generates a noise signal, which is amplified and radiated towards the equipment being jammed. When radiating periodically with a period of about 3 s, pauses with duration of about 3 ms are made, during which the probing information signal of the transmitter is received and frequencies of the noise signals are refined when new carrier frequencies emerge.

EFFECT: high efficiency of electronic jamming.

1 dwg

FIELD: technologies for preventing interception of data.

SUBSTANCE: transferred signal is concealed via adding noises to communication line in speech frequency range with linear addition of speech data signal with noise signal of higher level. Concealment is removed via adaptive filtration of received signal with compensation of noise component and separation of data component. Addition of noises to communication line is performed from the side of sensor. Noise signal during addition of noises and adaptive filtration is formed of a sum of counts of several noise series with nonevent sizes via their random querying. At the beginning of each communication session a signal is sent to side of receiver, characterizing order of querying of series, and starting signal, providing for synchronism of noises addition and filtering processes. All operations are performed by means of microprocessors, mounted on both sides of communication line, dependently of loaded software providing for change of direction of transmission and protection of speech data signal. Invention allows to simplify protection while providing for absolute confidentiality of transmitted data.

EFFECT: higher reliability.

6 cl, 4 dwg

Up!