Disappearing Cryptography, 2nd Edition

Book description

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.
  • Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs.
  • Fully revised and expanded.
  • Covers key concepts for non-technical readers.
  •  Goes into technical details for those wanting to create their own programs and implement algorithms.

Table of contents

  1. Front Cover
  2. Disappearing Cryptography
  3. Copyright Page
  4. Contents (1/2)
  5. Contents (2/2)
  6. Preface (1/2)
  7. Preface (2/2)
  8. Chapter 1. Framing Information
    1. 1.1 Introduction
    2. 1.2 Reasons for Secrecy
    3. 1.3 How It Is Done
    4. 1.4 How Steganography Is Used
    5. 1.5 Attacks on Steganography
    6. 1.6 Adding Context
  9. Chapter 2. Encryption
    1. Pure White
    2. 2.1 Encryption and White Noise (1/3)
    3. 2.1 Encryption and White Noise (2/3)
    4. 2.1 Encryption and White Noise (3/3)
    5. 2.2 Measuring Information and Encrypting It
    6. 2.3 Summary
  10. Chapter 3. Error Correction
    1. Close but No Cigar
    2. 3.1 Correcting Errors
    3. 3.2 Constructing Error-Correcting Codes
    4. 3.3 Summary
  11. Chapter 4. Secret Sharing
    1. Two out of Three Musketeers
    2. 4.1 Splitting Up Secrets (1/2)
    3. 4.1 Splitting Up Secrets (2/2)
    4. 4.2 Building Secret-Sharing Schemes
    5. 4.3 Public-Key Secret Sharing
    6. 4.4 Steganographic File Systems and Secret Sharing
    7. 4.5 Summary
  12. Chapter 5. Compression
    1. Television Listing
    2. 5.1 Patterns and Compression (1/2)
    3. 5.1 Patterns and Compression (2/2)
    4. 5.2 Building Compression Algorithms (1/2)
    5. 5.2 Building Compression Algorithms (2/2)
    6. 5.3 Summary
  13. Chapter 6. Basic Mimicry
    1. Reading between the Lines
    2. 6.1 Running in Reverse (1/2)
    3. 6.1 Running in Reverse (2/2)
    4. 6.2 Implementing the Mimicry
    5. 6.3 Summary
  14. Chapter 7. Grammars and Mimicry
    1. Evolution of Everyday Things
    2. 7.1 Using Grammar for Mimicry (1/2)
    3. 7.1 Using Grammar for Mimicry (2/2)
    4. 7.2 Creating Grammar-Based Mimicry (1/4)
    5. 7.2 Creating Grammar-Based Mimicry (2/4)
    6. 7.2 Creating Grammar-Based Mimicry (3/4)
    7. 7.2 Creating Grammar-Based Mimicry (4/4)
    8. 7.3 Summary
  15. Chapter 8. Turing and Reverse
    1. Doggie’s Little Get Along
    2. 8.1 Running Backward (1/2)
    3. 8.1 Running Backward (2/2)
    4. 8.2 Building a Reversible Machine (1/2)
    5. 8.2 Building a Reversible Machine (2/2)
    6. 8.3 Summary
  16. Chapter 9. Life in the Noise
    1. Boy-Zs in Noizy, Idaho
    2. 9.1 Hiding in the Noise (1/2)
    3. 9.1 Hiding in the Noise (2/2)
    4. 9.2 Bit Twiddling (1/5)
    5. 9.2 Bit Twiddling (2/5)
    6. 9.2 Bit Twiddling (3/5)
    7. 9.2 Bit Twiddling (4/5)
    8. 9.2 Bit Twiddling (5/5)
    9. 9.3 Summary
  17. Chapter 10. Anonymous Remailers
    1. Dr. Anon to You
    2. 10.1 Anonymous Remailers (1/2)
    3. 10.1 Anonymous Remailers (2/2)
    4. 10.2 Remailer Guts (1/2)
    5. 10.2 Remailer Guts (2/2)
    6. 10.3 Anonymous Networks
    7. 10.4 The Future
    8. 10.5 Summary
  18. Chapter 11. Secret Broadcasts
    1. Table Talk
    2. 11.1 Secret Senders
    3. 11.2 Creating a DC Net
    4. 11.3 Summary
  19. Chapter 12. Keys
    1. The Key Vision
    2. 12.1 Extending Control
    3. 12.2 Signing Algorithms
    4. 12.3 Public-Key Algorithms (1/2)
    5. 12.3 Public-Key Algorithms (2/2)
    6. 12.4 Zero-Knowledge Approaches (1/2)
    7. 12.4 Zero-Knowledge Approaches (2/2)
    8. 12.5 Collusion Control
    9. 12.6 Summary
  20. Chapter 13. Ordering and Reordering
    1. Top 10 Reasons Why Top 10 Lists Fail
    2. 13.1 Introduction
    3. 13.2 Strength against Scrambling
    4. 13.3 Invariant Forms
    5. 13.4 Canonical Forms
    6. 13.5 Packing in Multiple Messages
    7. 13.6 Sorting to Hide Information
    8. 13.7 Adding Extra Packets
    9. 13.8 Summary
  21. Chapter 14. Spreading
    1. A New Job
    2. 14.1 Spreading the Information
    3. 14.2 Going Digital (1/2)
    4. 14.2 Going Digital (2/2)
    5. 14.3 Comparative Blocks
    6. 14.4 Fast Fourier Solutions
    7. 14.5 The Fast Fourier Transform
    8. 14.6 Hiding Information with FFTs and DCTs
    9. 14.7 Wavelets
    10. 14.8 Modifications
    11. 14.9 Summary
  22. Chapter 15. Synthetic Worlds
    1. Slam Dunks
    2. 15.1 Created Worlds
    3. 15.2 Text Position Encoding and OCR
    4. 15.3 Echo Hiding
    5. 15.4 Summary
  23. Chapter 16. Watermarks
    1. A Patent for Watermarking Humans
    2. 16.1 Embedding Ownerships Information
    3. 16.2 A Basic Watermark
    4. 16.3 An Averaging Watermark
    5. 16.4 Summary
  24. Chapter 17. Steganalysis
    1. Code Words
    2. 17.1 Finding Hidden Messages
    3. 17.2 Typical Approaches
    4. 17.3 Visual Attacks
    5. 17.4 Structural Attacks
    6. 17.5 Statistical Attacks
    7. 17.6 Summary
  25. Afterword
  26. Appendix A. Java Mimic Code (1/7)
  27. Appendix A. Java Mimic Code (2/7)
  28. Appendix A. Java Mimic Code (3/7)
  29. Appendix A. Java Mimic Code (4/7)
  30. Appendix A. Java Mimic Code (5/7)
  31. Appendix A. Java Mimic Code (6/7)
  32. Appendix A. Java Mimic Code (7/7)
  33. Appendix B. Baseball CFG (1/3)
  34. Appendix B. Baseball CFG (2/3)
  35. Appendix B. Baseball CFG (3/3)
  36. Appendix C. Reversible Grammar Generator (1/3)
  37. Appendix C. Reversible Grammar Generator (2/3)
  38. Appendix C. Reversible Grammar Generator (3/3)
  39. Appendix D. Software
  40. Further Readings
  41. Bibliography (1/3)
  42. Bibliography (2/3)
  43. Bibliography (3/3)
  44. Index (1/3)
  45. Index (2/3)
  46. Index (3/3)

Product information

  • Title: Disappearing Cryptography, 2nd Edition
  • Author(s): Peter Wayner
  • Release date: May 2002
  • Publisher(s): Morgan Kaufmann
  • ISBN: 9780080504650