Book description
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.
- Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs.
- Fully revised and expanded.
- Covers key concepts for non-technical readers.
- Goes into technical details for those wanting to create their own programs and implement algorithms.
Table of contents
- Front Cover
- Disappearing Cryptography
- Copyright Page
- Contents (1/2)
- Contents (2/2)
- Preface (1/2)
- Preface (2/2)
- Chapter 1. Framing Information
- Chapter 2. Encryption
- Chapter 3. Error Correction
- Chapter 4. Secret Sharing
- Chapter 5. Compression
- Chapter 6. Basic Mimicry
- Chapter 7. Grammars and Mimicry
- Chapter 8. Turing and Reverse
- Chapter 9. Life in the Noise
- Chapter 10. Anonymous Remailers
- Chapter 11. Secret Broadcasts
- Chapter 12. Keys
- Chapter 13. Ordering and Reordering
- Chapter 14. Spreading
- Chapter 15. Synthetic Worlds
- Chapter 16. Watermarks
- Chapter 17. Steganalysis
- Afterword
- Appendix A. Java Mimic Code (1/7)
- Appendix A. Java Mimic Code (2/7)
- Appendix A. Java Mimic Code (3/7)
- Appendix A. Java Mimic Code (4/7)
- Appendix A. Java Mimic Code (5/7)
- Appendix A. Java Mimic Code (6/7)
- Appendix A. Java Mimic Code (7/7)
- Appendix B. Baseball CFG (1/3)
- Appendix B. Baseball CFG (2/3)
- Appendix B. Baseball CFG (3/3)
- Appendix C. Reversible Grammar Generator (1/3)
- Appendix C. Reversible Grammar Generator (2/3)
- Appendix C. Reversible Grammar Generator (3/3)
- Appendix D. Software
- Further Readings
- Bibliography (1/3)
- Bibliography (2/3)
- Bibliography (3/3)
- Index (1/3)
- Index (2/3)
- Index (3/3)
Product information
- Title: Disappearing Cryptography, 2nd Edition
- Author(s):
- Release date: May 2002
- Publisher(s): Morgan Kaufmann
- ISBN: 9780080504650
You might also like
book
Disappearing Cryptography, 3rd Edition
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …
book
Noiseless Steganography
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its …
book
Cybercrime
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods …
book
A Course in Mathematical Cryptography
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are …