Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking

Buy
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for those who would like to begin learning about information hiding."
Deepa Kundur, University of Toronto

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site (www.wayner.org/books/discrypt2) contains implementations for hiding information in lists, sentences, and images.

About the Author

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.

(HTML tags aren't allowed.)

The Catalogue of Shipwrecked Books: Christopher Columbus, His Son, and the Quest to Build the World's Greatest Library
The Catalogue of Shipwrecked Books: Christopher Columbus, His Son, and the Quest to Build the World's Greatest Library
“Like a Renaissance wonder cabinet, full of surprises and opening up into a lost world.” —Stephen Greenblatt

“A captivating adventure…For lovers of history, Wilson-Lee offers a thrill on almost every page…Magnificent.” —The New York Times Book Review...
IP Address Management Principles and Practice (IEEE Press Series on Network Management)
IP Address Management Principles and Practice (IEEE Press Series on Network Management)

The practice of IP address management (IPAM) entails the application of network management disciplines to Internet Protocol (IP) address space and associated network services, namely Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). The linkages among an IP address plan and configurations of DHCP and DNS servers are...

Distributed Event-Based Systems
Distributed Event-Based Systems

In today’s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.

Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific...


SilverStripe: The Complete Guide to CMS Development (Wiley)
SilverStripe: The Complete Guide to CMS Development (Wiley)

Co-author of this book, and early member of the SilverStripe open source community.

It wasn’t too long ago when a fellow developer at work asked me to look at his screen. He had stumbled across some new technology, and asked: ‘Hey, have you heard about this?’ All too often such questions are answered with a...

The Nuclear Imperative: A Critical Look at the Approaching Energy Crisis (Topics in Safety, Risk, Reliability and Quality)
The Nuclear Imperative: A Critical Look at the Approaching Energy Crisis (Topics in Safety, Risk, Reliability and Quality)
Part of this book was originally written in 1976 when some thirty copies were printed and distributed to interested parties. A wider distribution was planned but never carried out. In re-reading the first edition written 29 years ago, I am struck by the fact that arguments for a nuclear-powered future and a need to develop portable synfuels and new...
Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice, Second Edition provides over 100 tested, instantly useful techniques that will help you conquer big data, using Hadoop. This revised new edition covers changes and new features in the Hadoop core architecture, including MapReduce 2. Brand new chapters cover YARN and integrating...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy