Cargando…

Disappearing cryptography : information hiding : steganography & watermarking /

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wayner, Peter, 1964-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002.
Edición:2nd ed.
Colección:Morgan Kaufmann Series in Software Engineering and Programming.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm52365946
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 030604s2002 ne a ob 001 0 eng d
010 |z  2001099790 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCG  |d OCLCQ  |d E7B  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OPELS  |d OCLCQ  |d AGLDB  |d OCLCA  |d STF  |d D6H  |d OCLCQ  |d VTS  |d INT  |d OCLCQ  |d WYU  |d LEAUB  |d OL$  |d UMK  |d VT2  |d UKEHC  |d OCLCO  |d VLY  |d OCLCO  |d OCLCQ  |d COA 
019 |a 162596263  |a 856952330  |a 961686409  |a 962567207  |a 1035658382  |a 1053044722  |a 1062885869  |a 1108909730  |a 1153022945  |a 1162244097  |a 1192329400  |a 1200069715  |a 1262683369  |a 1340115718 
020 |a 0585449929  |q (electronic bk.) 
020 |a 9780585449920  |q (electronic bk.) 
020 |a 9781558607699 
020 |a 1558607692 
020 |a 1281028592 
020 |a 9781281028594 
020 |a 9786611028596 
020 |a 6611028595 
020 |a 0080504655 
020 |a 9780080504650 
024 8 |a (WaSeSS)ssj0000139568 
029 1 |a AU@  |b 000051556427 
029 1 |a AU@  |b 000051860762 
029 1 |a CHNEW  |b 001004541 
029 1 |a DEBBG  |b BV039832265 
029 1 |a DEBBG  |b BV042307623 
029 1 |a DEBBG  |b BV043105434 
029 1 |a DEBSZ  |b 405312415 
029 1 |a DEBSZ  |b 422432067 
029 1 |a NZ1  |b 12435556 
035 |a (OCoLC)52365946  |z (OCoLC)162596263  |z (OCoLC)856952330  |z (OCoLC)961686409  |z (OCoLC)962567207  |z (OCoLC)1035658382  |z (OCoLC)1053044722  |z (OCoLC)1062885869  |z (OCoLC)1108909730  |z (OCoLC)1153022945  |z (OCoLC)1162244097  |z (OCoLC)1192329400  |z (OCoLC)1200069715  |z (OCoLC)1262683369  |z (OCoLC)1340115718 
037 |a 97119:97119  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .W39 2002eb 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 20 
049 |a UAMI 
100 1 |a Wayner, Peter,  |d 1964- 
245 1 0 |a Disappearing cryptography :  |b information hiding : steganography & watermarking /  |c Peter Wayner. 
250 |a 2nd ed. 
260 |a Amsterdam ;  |a Boston :  |b MK/Morgan Kaufmann Publishers,  |c ©2002. 
300 |a 1 online resource (xvii, 412 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft  |0 http://rdaregistry.info/termList/fileType/1002. 
490 1 |a The Morgan Kaufmann Series in Software Engineering and Programming 
504 |a Includes bibliographical references (pages 387-400) and index. 
588 0 |a Print version record. 
505 0 |a Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. 
520 |a Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cryptography. 
650 0 |a Internet. 
650 0 |a Digital watermarking. 
650 2 |a Internet 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Cryptographie. 
650 6 |a Internet. 
650 6 |a Tatouage numérique. 
650 7 |a Internet.  |2 aat 
650 7 |a digital watermarking.  |2 aat 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Digital watermarking.  |2 fast  |0 (OCoLC)fst00893746 
650 7 |a Internet.  |2 fast  |0 (OCoLC)fst00977184 
776 0 8 |i Print version:  |a Wayner, Peter, 1964-  |t Disappearing cryptography.  |b 2nd ed.  |d Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002  |z 1558607692  |w (DLC) 2001099790  |w (OCoLC)49749227 
830 0 |a Morgan Kaufmann Series in Software Engineering and Programming. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81848  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 81848 
938 |a YBP Library Services  |b YANK  |n 2333231 
994 |a 92  |b IZTAP