Disappearing cryptography: information hiding : steganography & watermarking
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
MK/Morgan Kaufmann Publishers
©2002
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (pages 387-400) and index Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book |
Beschreibung: | 1 Online-Ressource (xvii, 412 pages) |
ISBN: | 0585449929 1558607692 9780585449920 9781558607699 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043105434 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2002 |||| o||u| ||||||eng d | ||
020 | |a 0585449929 |9 0-585-44992-9 | ||
020 | |a 1558607692 |9 1-55860-769-2 | ||
020 | |a 9780585449920 |9 978-0-585-44992-0 | ||
020 | |a 9781558607699 |9 978-1-55860-769-9 | ||
035 | |a (OCoLC)52365946 | ||
035 | |a (DE-599)BVBBV043105434 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 20 | |
100 | 1 | |a Wayner, Peter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Disappearing cryptography |b information hiding : steganography & watermarking |c Peter Wayner |
250 | |a 2nd ed | ||
264 | 1 | |a Amsterdam |b MK/Morgan Kaufmann Publishers |c ©2002 | |
300 | |a 1 Online-Ressource (xvii, 412 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 387-400) and index | ||
500 | |a Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index | ||
500 | |a Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
650 | 7 | |a Internet |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Internet | |
650 | 4 | |a Digital watermarking | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028529625 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175519606898688 |
---|---|
any_adam_object | |
author | Wayner, Peter |
author_facet | Wayner, Peter |
author_role | aut |
author_sort | Wayner, Peter |
author_variant | p w pw |
building | Verbundindex |
bvnumber | BV043105434 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)52365946 (DE-599)BVBBV043105434 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04525nmm a2200553zc 4500</leader><controlfield tag="001">BV043105434</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585449929</subfield><subfield code="9">0-585-44992-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1558607692</subfield><subfield code="9">1-55860-769-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585449920</subfield><subfield code="9">978-0-585-44992-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781558607699</subfield><subfield code="9">978-1-55860-769-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52365946</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043105434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">20</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wayner, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Disappearing cryptography</subfield><subfield code="b">information hiding : steganography & watermarking</subfield><subfield code="c">Peter Wayner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">MK/Morgan Kaufmann Publishers</subfield><subfield code="c">©2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 412 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 387-400) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028529625</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043105434 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:35Z |
institution | BVB |
isbn | 0585449929 1558607692 9780585449920 9781558607699 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028529625 |
oclc_num | 52365946 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvii, 412 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | MK/Morgan Kaufmann Publishers |
record_format | marc |
spelling | Wayner, Peter Verfasser aut Disappearing cryptography information hiding : steganography & watermarking Peter Wayner 2nd ed Amsterdam MK/Morgan Kaufmann Publishers ©2002 1 Online-Ressource (xvii, 412 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 387-400) and index Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book COMPUTERS / Security / Cryptography bisacsh Computer networks / Security measures fast Cryptography fast Digital watermarking fast Internet fast Computer networks Security measures Cryptography Internet Digital watermarking Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wayner, Peter Disappearing cryptography information hiding : steganography & watermarking COMPUTERS / Security / Cryptography bisacsh Computer networks / Security measures fast Cryptography fast Digital watermarking fast Internet fast Computer networks Security measures Cryptography Internet Digital watermarking Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Disappearing cryptography information hiding : steganography & watermarking |
title_auth | Disappearing cryptography information hiding : steganography & watermarking |
title_exact_search | Disappearing cryptography information hiding : steganography & watermarking |
title_full | Disappearing cryptography information hiding : steganography & watermarking Peter Wayner |
title_fullStr | Disappearing cryptography information hiding : steganography & watermarking Peter Wayner |
title_full_unstemmed | Disappearing cryptography information hiding : steganography & watermarking Peter Wayner |
title_short | Disappearing cryptography |
title_sort | disappearing cryptography information hiding steganography watermarking |
title_sub | information hiding : steganography & watermarking |
topic | COMPUTERS / Security / Cryptography bisacsh Computer networks / Security measures fast Cryptography fast Digital watermarking fast Internet fast Computer networks Security measures Cryptography Internet Digital watermarking Kryptologie (DE-588)4033329-2 gnd |
topic_facet | COMPUTERS / Security / Cryptography Computer networks / Security measures Cryptography Digital watermarking Internet Computer networks Security measures Kryptologie |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=81848 |
work_keys_str_mv | AT waynerpeter disappearingcryptographyinformationhidingsteganographywatermarking |