Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking

Buy
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for those who would like to begin learning about information hiding."
Deepa Kundur, University of Toronto

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site (www.wayner.org/books/discrypt2) contains implementations for hiding information in lists, sentences, and images.

About the Author

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.

(HTML tags aren't allowed.)

Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
FOR THE FIRST TIME EVER, YOU’LL LEARN ALL THREE ASPECTS OF WHAT IT TAKES TO CREATE STUNNING PORTRAITS
(HINT: IT’S NOT JUST THE LIGHTING)

Scott Kelby, the world’s #1 best-selling author of photography books, Editor-in-Chief and Publisher of Photoshop User...

CCNA Security 640-554 Official Cert Guide
CCNA Security 640-554 Official Cert Guide

Congratulations! If you are reading this, you have in your possession a powerful tool that can help you to

Improve your awareness and knowledge of network security 

Increase your skill level related to the implementation of that security 

Prepare for the CCNA Security...

iOS 7 in Action
iOS 7 in Action

Summary

iOS 7 in Action is a detailed, hands-on guide that teaches you how to create amazing native iOS apps. You'll dive into key topics by exploring thoroughly explained real-world code examples you can expand and reuse. Learn about Collection Views, Storyboarding, Twitter & Facebook Integration,...


Advances in Imaging and Electron Physics, Volume 151
Advances in Imaging and Electron Physics, Volume 151

Advances in Imaging and Electron Physics merges two long-running serials-Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. This series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image...

Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

Agile Project Management: How to Succeed in the Face of Changing Project Requirements
Agile Project Management: How to Succeed in the Face of Changing Project Requirements

In a fast-paced environment filled with uncertainty, successfully completing projects on time can feel like running an obstacle course. An emphasis on speed often forces project teams to make decisions without crucial data, leading to frequent changes of direction once more information becomes known. If people aren’t light on their feet,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy