Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) / Edition 2

Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) / Edition 2

by Peter Wayner
     
 

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through

See more details below

Overview

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded.Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book.

Read More

Product Details

ISBN-13:
9781558607699
Publisher:
Morgan Kaufmann Publishers
Publication date:
04/28/2002
Series:
The Morgan Kaufmann Series in Software Engineering and Programming
Edition description:
REV
Pages:
413
Product dimensions:
7.38(w) x 9.26(h) x 0.81(d)

Table of Contents

Preface
1Framing Information1
Reasons for Secrecy3
How It Is Done5
How Steganography Is Used7
Attacks on Steganography9
Adding Context13
2Encryption15
Encryption and White Noise16
Measuring Information and Encrypting It27
3Error Correction33
Correcting Errors33
Constructing Error-Correcting Codes42
4Secret Sharing49
Splitting Up Secrets50
Building Secret-Sharing Schemes57
Public-Key Secret Sharing60
Steganographic File Systems and Secret Sharing61
5Compression67
Patterns and Compression68
Building Compression Algorithms74
6Basic Mimicry81
Running in Reverse82
Implementing the Mimicry89
7Grammars and Mimicry97
Using Grammar for Mimicry99
Creating Grammar-Based Mimicry107
8Turing and Reverse129
Running Backward130
Building a Reversible Machine139
9Life in the Noise149
Hiding in the Noise151
Bit Twiddling161
10Anonymous Remailers183
Anonymous Remailers185
Remailer Guts191
Anonymous Networks198
The Future203
11Secret Broadcasts205
Secret Senders206
Creating a DC Net210
12Keys215
Extending Control216
Signing Algorithms218
Public-Key Algorithms220
Zero-Knowledge Approaches226
Collusion Control232
13Ordering and Reordering235
Strength against Scrambling237
Invariant Forms239
Canonical Forms240
Packing in Multiple Messages241
Sorting to Hide Information241
Adding Extra Packets244
14Spreading247
Spreading the Information249
Going Digital252
Comparative Blocks260
Fast Fourier Solutions262
The Fast Fourier Transform265
Hiding Information with FFTs and DCTs270
Wavelets275
Modifications278
15Synthetic Worlds281
Created Worlds282
Text Position Encoding and OCR284
Echo Hiding287
16Watermarks291
Embedding Ownerships Information292
A Basic Watermark297
An Averaging Watermark300
17Steganalysis303
Finding Hidden Messages303
Typical Approaches305
Visual Attacks306
Structural Attacks309
Statistical Attacks311
Afterword315
App. AJava Mimic Code319
App. BBaseball CFG353
App. CReversible Grammar Generator367
App. DSoftware379
Further Readings383
Bibliography387
Index401

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >