Wayner | Disappearing Cryptography | E-Book | www.sack.de
E-Book

E-Book, Englisch, 413 Seiten, Web PDF

Wayner Disappearing Cryptography

Information Hiding: Steganography & Watermarking
2. Auflage 2002
ISBN: 978-0-08-050465-0
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

Information Hiding: Steganography & Watermarking

E-Book, Englisch, 413 Seiten, Web PDF

ISBN: 978-0-08-050465-0
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible, steganography, embedding information into video, audio, or graphics files, watermarking, hiding data in the noise of image or sound files, mimicry, dressing up data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book.

Wayner Disappearing Cryptography jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Disappearing Cryptography;2
3;Copyright Page;5
4;Contents;6
5;Preface ;12
6;Chapter 1. Framing Information;18
6.1;1.1 Introduction;18
6.2;1.2 Reasons for Secrecy;20
6.3;1.3 How It Is Done;22
6.4;1.4 How Steganography Is Used;24
6.5;1.5 Attacks on Steganography;26
6.6;1.6 Adding Context;30
7;Chapter 2. Encryption;32
7.1;Pure White;32
7.2;2.1 Encryption and White Noise;33
7.3;2.2 Measuring Information and Encrypting It;44
7.4;2.3 Summary;48
8;Chapter 3. Error Correction;50
8.1;Close but No Cigar;50
8.2;3.1 Correcting Errors;50
8.3;3.2 Constructing Error-Correcting Codes;59
8.4;3.3 Summary;64
9;Chapter 4. Secret Sharing;66
9.1;Two out of Three Musketeers;66
9.2;4.1 Splitting Up Secrets;67
9.3;4.2 Building Secret-Sharing Schemes;74
9.4;4.3 Public-Key Secret Sharing;77
9.5;4.4 Steganographic File Systems and Secret Sharing;78
9.6;4.5 Summary;82
10;Chapter 5. Compression;84
10.1;Television Listing;84
10.2;5.1 Patterns and Compression;85
10.3;5.2 Building Compression Algorithms;91
10.4;5.3 Summary;97
11;Chapter 6. Basic Mimicry;98
11.1;Reading between the Lines;98
11.2;6.1 Running in Reverse;99
11.3;6.2 Implementing the Mimicry;106
11.4;6.3 Summary;111
12;Chapter 7. Grammars and Mimicry;114
12.1;Evolution of Everyday Things;114
12.2;7.1 Using Grammar for Mimicry;116
12.3;7.2 Creating Grammar-Based Mimicry;124
12.4;7.3 Summary;143
13;Chapter 8. Turing and Reverse;146
13.1;Doggie’s Little Get Along;146
13.2;8.1 Running Backward;147
13.3;8.2 Building a Reversible Machine;156
13.4;8.3 Summary;164
14;Chapter 9. Life in the Noise;166
14.1;Boy-Zs in Noizy, Idaho;166
14.2;9.1 Hiding in the Noise;168
14.3;9.2 Bit Twiddling;178
14.4;9.3 Summary;199
15;Chapter 10. Anonymous Remailers;200
15.1;Dr. Anon to You;200
15.2;10.1 Anonymous Remailers;202
15.3;10.2 Remailer Guts;208
15.4;10.3 Anonymous Networks;215
15.5;10.4 The Future;220
15.6;10.5 Summary;221
16;Chapter 11. Secret Broadcasts;222
16.1;Table Talk;222
16.2;11.1 Secret Senders;223
16.3;11.2 Creating a DC Net;227
16.4;11.3 Summary;230
17;Chapter 12. Keys;232
17.1;The Key Vision;232
17.2;12.1 Extending Control;233
17.3;12.2 Signing Algorithms;235
17.4;12.3 Public-Key Algorithms;237
17.5;12.4 Zero-Knowledge Approaches;243
17.6;12.5 Collusion Control;249
17.7;12.6 Summary;250
18;Chapter 13. Ordering and Reordering;252
18.1;Top 10 Reasons Why Top 10 Lists Fail;252
18.2;13.1 Introduction;253
18.3;13.2 Strength against Scrambling;254
18.4;13.3 Invariant Forms;256
18.5;13.4 Canonical Forms;257
18.6;13.5 Packing in Multiple Messages;258
18.7;13.6 Sorting to Hide Information;258
18.8;13.7 Adding Extra Packets;261
18.9;13.8 Summary;262
19;Chapter 14. Spreading;264
19.1;A New Job;264
19.2;14.1 Spreading the Information;266
19.3;14.2 Going Digital;269
19.4;14.3 Comparative Blocks;277
19.5;14.4 Fast Fourier Solutions;279
19.6;14.5 The Fast Fourier Transform;282
19.7;14.6 Hiding Information with FFTs and DCTs;287
19.8;14.7 Wavelets;292
19.9;14.8 Modifications;295
19.10;14.9 Summary;297
20;Chapter 15. Synthetic Worlds;298
20.1;Slam Dunks;298
20.2;15.1 Created Worlds;299
20.3;15.2 Text Position Encoding and OCR;301
20.4;15.3 Echo Hiding;304
20.5;15.4 Summary;306
21;Chapter 16. Watermarks;308
21.1;A Patent for Watermarking Humans;308
21.2;16.1 Embedding Ownerships Information;309
21.3;16.2 A Basic Watermark;314
21.4;16.3 An Averaging Watermark;317
21.5;16.4 Summary;319
22;Chapter 17. Steganalysis;320
22.1;Code Words;320
22.2;17.1 Finding Hidden Messages;320
22.3;17.2 Typical Approaches;322
22.4;17.3 Visual Attacks;323
22.5;17.4 Structural Attacks;326
22.6;17.5 Statistical Attacks;328
22.7;17.6 Summary;331
23;Afterword;332
24;Appendix A. Java Mimic Code;336
25;Appendix B. Baseball CFG;370
26;Appendix C. Reversible Grammar Generator;384
27;Appendix D. Software;396
28;Further Readings;400
29;Bibliography;404
30;Index;418



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.