Abstract:
In article attempt on the basis of family of discretionary DP-models is realised to apply the theory of formal modelling of management of access and information streams to the analysis of conditions of safe functioning computer steganography systems.