Unavailable
Unavailable
Unavailable
Ebook352 pages8 hours
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
By Peter Wayner
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.
- Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs.
- Fully revised and expanded.
- Covers key concepts for non-technical readers.
- Goes into technical details for those wanting to create their own programs and implement algorithms.
Unavailable
Author
Peter Wayner
Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.
Read more from Peter Wayner
Compression Algorithms for Real Programmers Rating: 4 out of 5 stars4/5Agents Unleashed: A Public Domain Look at Agent Technology Rating: 0 out of 5 stars0 ratingsDisappearing Cryptography: Information Hiding: Steganography and Watermarking Rating: 5 out of 5 stars5/5
Related to Disappearing Cryptography
Related ebooks
Mobile 3D Graphics: with OpenGL ES and M3G Rating: 0 out of 5 stars0 ratingsJPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures Rating: 0 out of 5 stars0 ratingsData Mining: Multimedia, Soft Computing, and Bioinformatics Rating: 0 out of 5 stars0 ratingsAsynchronous Circuit Design Rating: 0 out of 5 stars0 ratingsAn Architecture for Combinator Graph Reduction Rating: 0 out of 5 stars0 ratingsDigital Logic Testing and Simulation Rating: 0 out of 5 stars0 ratingsSoftware Development Rhythms: Harmonizing Agile Practices for Synergy Rating: 0 out of 5 stars0 ratingsTask Scheduling for Parallel Systems Rating: 0 out of 5 stars0 ratingsiPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch Rating: 0 out of 5 stars0 ratingsAudio Signal Processing and Coding Rating: 0 out of 5 stars0 ratingsFORTRAN 90 for Scientists and Engineers Rating: 3 out of 5 stars3/5Smartphone Operating System Concepts with Symbian OS: A Tutorial Guide Rating: 0 out of 5 stars0 ratingsRandom Graphs for Statistical Pattern Recognition Rating: 0 out of 5 stars0 ratingsInnocent Code: A Security Wake-Up Call for Web Programmers Rating: 4 out of 5 stars4/5Metaheuristics: From Design to Implementation Rating: 0 out of 5 stars0 ratingsDigital Data Integrity: The Evolution from Passive Protection to Active Management Rating: 0 out of 5 stars0 ratingsOptimization Methods for Logical Inference Rating: 0 out of 5 stars0 ratingsSynchronization and Arbitration in Digital Systems Rating: 0 out of 5 stars0 ratingsCryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century Rating: 0 out of 5 stars0 ratingsBuilding and Solving Mathematical Programming Models in Engineering and Science Rating: 4 out of 5 stars4/5Design of Integrated Circuits for Optical Communications Rating: 0 out of 5 stars0 ratingsSensing, Intelligence, Motion: How Robots and Humans Move in an Unstructured World Rating: 0 out of 5 stars0 ratingsProgramming Mobile Devices: An Introduction for Practitioners Rating: 0 out of 5 stars0 ratingsParallel Computing Works! Rating: 0 out of 5 stars0 ratingsIntroduction to Parallel Programming Rating: 0 out of 5 stars0 ratingsGenerative Modeling for Computer Graphics and Cad: Symbolic Shape Design Using Interval Analysis Rating: 0 out of 5 stars0 ratings2-D and 3-D Image Registration: for Medical, Remote Sensing, and Industrial Applications Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: A New Synthesis Rating: 4 out of 5 stars4/5Principles of Modern Digital Design Rating: 0 out of 5 stars0 ratings
Software Development & Engineering For You
Adobe Illustrator CC For Dummies Rating: 5 out of 5 stars5/5Agile Practice Guide Rating: 4 out of 5 stars4/5Python For Dummies Rating: 4 out of 5 stars4/5Level Up! The Guide to Great Video Game Design Rating: 4 out of 5 stars4/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5Learn to Code. Get a Job. The Ultimate Guide to Learning and Getting Hired as a Developer. Rating: 5 out of 5 stars5/5How Do I Do That In InDesign? Rating: 5 out of 5 stars5/5Modern C++ for Absolute Beginners: A Friendly Introduction to C++ Programming Language and C++11 to C++20 Standards Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Hand Lettering on the iPad with Procreate: Ideas and Lessons for Modern and Vintage Lettering Rating: 4 out of 5 stars4/5Tiny Python Projects: Learn coding and testing with puzzles and games Rating: 5 out of 5 stars5/5Lua Game Development Cookbook Rating: 0 out of 5 stars0 ratingsGood Code, Bad Code: Think like a software engineer Rating: 5 out of 5 stars5/5PYTHON: Practical Python Programming For Beginners & Experts With Hands-on Project Rating: 5 out of 5 stars5/5Beginning Programming For Dummies Rating: 4 out of 5 stars4/5Git Essentials Rating: 4 out of 5 stars4/5Photoshop For Beginners: Learn Adobe Photoshop cs5 Basics With Tutorials Rating: 0 out of 5 stars0 ratingsHow Do I Do That in Photoshop?: The Quickest Ways to Do the Things You Want to Do, Right Now! Rating: 4 out of 5 stars4/5OneNote: The Ultimate Guide on How to Use Microsoft OneNote for Getting Things Done Rating: 1 out of 5 stars1/5Learning Python Rating: 5 out of 5 stars5/5Data Visualization: a successful design process Rating: 4 out of 5 stars4/5The Essential Persona Lifecycle: Your Guide to Building and Using Personas Rating: 4 out of 5 stars4/5SQL For Dummies Rating: 0 out of 5 stars0 ratingsCoding All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsAgile: What You Need to Know About Agile Project Management, the Kanban Process, Lean Thinking, and Scrum Rating: 5 out of 5 stars5/5Android App Development For Dummies Rating: 0 out of 5 stars0 ratings
Reviews for Disappearing Cryptography
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews