Disappearing Cryptography, 2/e
Peter Wayner
- 出版商: Morgan Kaufmann
- 出版日期: 2002-05-13
- 定價: $1,498
- 售價: 5.0 折 $749
- 語言: 英文
- 頁數: 413
- 裝訂: Paperback
- ISBN: 1558607692
- ISBN-13: 9781558607699
-
相關分類:
SAP、資訊安全
立即出貨(限量)
買這商品的人也買了...
-
$1,250$1,225 -
$1,029Fundamentals of Data Structures in C
-
$640$608 -
$2,640$2,508 -
$650$553 -
$1,029Fundamentals of Logic Design, 4/e
-
$980$774 -
$960$912 -
$1,920$1,824 -
$880$695 -
$650$429 -
$1,880$1,786 -
$780$741 -
$650$553 -
$590$466 -
$650$618 -
$750$638 -
$720$569 -
$620$527 -
$560$476 -
$390$304 -
$490$417 -
$580$458 -
$580$458 -
$650$553
相關主題
商品描述
Disappearing Cryptography, Second
Edition describes how to take words, sounds, or images and hide them in
digital data so they look like other words, sounds, or images. When used
properly, this powerful technique makes it almost impossible to trace the author
and the recipient of a message. Conversations can be submerged in the flow of
information through the Internet so that no one can know if a conversation
exists at all.
This full revision of the best-selling first
edition describes a number of different techniques to hide information. These
include encryption, making data incomprehensible; steganography, embedding
information into video, audio, or graphics files; watermarking, hiding data in
the noise of image or sound files; mimicry, "dressing up" data and making it
appear to be other data, and more. The second edition also includes an expanded
discussion on hiding information with spread-spectrum algorithms, shuffling
tricks, and synthetic worlds. Each chapter is divided into sections, first
providing an introduction and high-level summary for those who want to
understand the concepts without wading through technical explanations, and then
presenting greater detail for those who want to write their own programs. To
encourage exploration, the author's Web site www.wayner.org/books/discrypt2/
contains implementations for hiding information in lists, sentences, and
images.
Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index