Cargando…

Disappearing cryptography : information hiding : steganography & watermarking /

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wayner, Peter, 1964-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, �2002.
Edición:2nd ed.
Colección:Morgan Kaufmann Series in Software Engineering and Programming.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm52365946
003 OCoLC
005 20231117015026.0
006 m o d
007 cr cn|||||||||
008 030604s2002 ne a ob 001 0 eng d
010 |z  2001099790 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCG  |d OCLCQ  |d E7B  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OPELS  |d OCLCQ  |d AGLDB  |d OCLCA  |d STF  |d D6H  |d OCLCQ  |d VTS  |d INT  |d OCLCQ  |d WYU  |d LEAUB  |d OL$  |d UMK  |d VT2  |d UKEHC  |d OCLCO  |d VLY  |d OCLCO  |d OCLCQ  |d COA  |d OCLCO 
019 |a 162596263  |a 856952330  |a 961686409  |a 962567207  |a 1035658382  |a 1053044722  |a 1062885869  |a 1108909730  |a 1153022945  |a 1162244097  |a 1192329400  |a 1200069715  |a 1262683369  |a 1340115718 
020 |a 0585449929  |q (electronic bk.) 
020 |a 9780585449920  |q (electronic bk.) 
020 |a 9781558607699 
020 |a 1558607692 
020 |a 1281028592 
020 |a 9781281028594 
020 |a 9786611028596 
020 |a 6611028595 
020 |a 0080504655 
020 |a 9780080504650 
024 8 |a (WaSeSS)ssj0000139568 
035 |a (OCoLC)52365946  |z (OCoLC)162596263  |z (OCoLC)856952330  |z (OCoLC)961686409  |z (OCoLC)962567207  |z (OCoLC)1035658382  |z (OCoLC)1053044722  |z (OCoLC)1062885869  |z (OCoLC)1108909730  |z (OCoLC)1153022945  |z (OCoLC)1162244097  |z (OCoLC)1192329400  |z (OCoLC)1200069715  |z (OCoLC)1262683369  |z (OCoLC)1340115718 
050 4 |a TK5105.59  |b .W39 2002eb 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 20 
100 1 |a Wayner, Peter,  |d 1964- 
245 1 0 |a Disappearing cryptography :  |b information hiding : steganography & watermarking /  |c Peter Wayner. 
250 |a 2nd ed. 
260 |a Amsterdam ;  |a Boston :  |b MK/Morgan Kaufmann Publishers,  |c �2002. 
300 |a 1 online resource (xvii, 412 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft  |0 http://rdaregistry.info/termList/fileType/1002. 
490 1 |a The Morgan Kaufmann Series in Software Engineering and Programming 
504 |a Includes bibliographical references (pages 387-400) and index. 
588 0 |a Print version record. 
505 0 |a Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. 
520 |a Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book 
546 |a English. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cryptography. 
650 0 |a Internet. 
650 0 |a Digital watermarking. 
650 2 |a Internet  |0 (DNLM)D020407 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Cryptographie.  |0 (CaQQLa)201-0039807 
650 6 |a Internet.  |0 (CaQQLa)201-0235884 
650 6 |a Tatouage num�erique.  |0 (CaQQLa)201-0335623 
650 7 |a Internet.  |2 aat  |0 (CStmoGRI)aat300265429 
650 7 |a digital watermarking.  |2 aat  |0 (CStmoGRI)aat300389942 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Cryptography  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Digital watermarking  |2 fast  |0 (OCoLC)fst00893746 
650 7 |a Internet  |2 fast  |0 (OCoLC)fst00977184 
776 0 8 |i Print version:  |a Wayner, Peter, 1964-  |t Disappearing cryptography.  |b 2nd ed.  |d Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, �2002  |z 1558607692  |w (DLC) 2001099790  |w (OCoLC)49749227 
830 0 |a Morgan Kaufmann Series in Software Engineering and Programming. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781558607699  |z Texto completo