Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $7.99
Usually ships in 1-2 business days
(Save 88%)
Other sellers (Paperback)
  • All (9) from $7.99   
  • New (2) from $62.29   
  • Used (7) from $7.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Sort by


Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded.Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book.

Audience: General readers, Programmers, Cryptographers, Computer Scientists working in government and industry.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Are Osama bin Laden and his buddies exchanging information hidden in the “digital noise” of photos or audio clips? That’s what the rumors say. So far the rumors are just rumors, but steganography -- the art of hiding information -- is rapidly gaining recognition as a key information security weapon. If bin Laden isn’t using it, the RIAA and MPAA likely will, to digitally watermark their music and movies.

If you want to understand how it works, start with Disappearing Cryptography, Second Edition. Peter Wayner explains each key concept and technique, including several new ones: locking hidden images so they can only be read by an authorized recipient; hiding messages simply by reordering lists (what’s really in tonight’s Letterman Top Ten?); and new “spread spectrum” techniques that draw on advanced concepts from wireless communications. He also introduces steganalysis, the science of identifying and compromising files that contain hidden messages. (Fortunately or unfortunately, many current stego algorithms are quite vulnerable.)

The book’s code samples -- previously written in Pascal -- have been recast in Java, making them far more accessible (one’s even online at Wayner’s site, www.wayner.org/texts/mimic/, so you can try it for yourself right now). (Bill Camarda)

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Read More Show Less

Product Details

Meet the Author

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.
Read More Show Less

Table of Contents

1 Framing Information 1
Reasons for Secrecy 3
How It Is Done 5
How Steganography Is Used 7
Attacks on Steganography 9
Adding Context 13
2 Encryption 15
Encryption and White Noise 16
Measuring Information and Encrypting It 27
3 Error Correction 33
Correcting Errors 33
Constructing Error-Correcting Codes 42
4 Secret Sharing 49
Splitting Up Secrets 50
Building Secret-Sharing Schemes 57
Public-Key Secret Sharing 60
Steganographic File Systems and Secret Sharing 61
5 Compression 67
Patterns and Compression 68
Building Compression Algorithms 74
6 Basic Mimicry 81
Running in Reverse 82
Implementing the Mimicry 89
7 Grammars and Mimicry 97
Using Grammar for Mimicry 99
Creating Grammar-Based Mimicry 107
8 Turing and Reverse 129
Running Backward 130
Building a Reversible Machine 139
9 Life in the Noise 149
Hiding in the Noise 151
Bit Twiddling 161
10 Anonymous Remailers 183
Anonymous Remailers 185
Remailer Guts 191
Anonymous Networks 198
The Future 203
11 Secret Broadcasts 205
Secret Senders 206
Creating a DC Net 210
12 Keys 215
Extending Control 216
Signing Algorithms 218
Public-Key Algorithms 220
Zero-Knowledge Approaches 226
Collusion Control 232
13 Ordering and Reordering 235
Strength against Scrambling 237
Invariant Forms 239
Canonical Forms 240
Packing in Multiple Messages 241
Sorting to Hide Information 241
Adding Extra Packets 244
14 Spreading 247
Spreading the Information 249
Going Digital 252
Comparative Blocks 260
Fast Fourier Solutions 262
The Fast Fourier Transform 265
Hiding Information with FFTs and DCTs 270
Wavelets 275
Modifications 278
15 Synthetic Worlds 281
Created Worlds 282
Text Position Encoding and OCR 284
Echo Hiding 287
16 Watermarks 291
Embedding Ownerships Information 292
A Basic Watermark 297
An Averaging Watermark 300
17 Steganalysis 303
Finding Hidden Messages 303
Typical Approaches 305
Visual Attacks 306
Structural Attacks 309
Statistical Attacks 311
Afterword 315
App. A Java Mimic Code 319
App. B Baseball CFG 353
App. C Reversible Grammar Generator 367
App. D Software 379
Further Readings 383
Bibliography 387
Index 401
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)