Disappearing cryptography :: information hiding : steganography & watermarking /
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversa...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
MK/Morgan Kaufmann Publishers,
©2002.
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Morgan Kaufmann Series in Software Engineering and Programming.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book |
Beschreibung: | 1 online resource (xvii, 412 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 387-400) and index. |
ISBN: | 0585449929 9780585449920 9781558607699 1558607692 1281028592 9781281028594 9786611028596 6611028595 0080504655 9780080504650 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm52365946 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030604s2002 ne a ob 001 0 eng d | ||
010 | |z 2001099790 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCG |d OCLCQ |d E7B |d OCLCQ |d OCLCO |d OCLCF |d OCLCQ |d OPELS |d OCLCQ |d AGLDB |d OCLCA |d STF |d D6H |d OCLCQ |d VTS |d INT |d OCLCQ |d WYU |d LEAUB |d OL$ |d UMK |d VT2 |d UKEHC |d OCLCO |d VLY |d OCLCO |d OCLCQ |d COA |d OCLCO |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 162596263 |a 856952330 |a 961686409 |a 962567207 |a 1035658382 |a 1053044722 |a 1062885869 |a 1108909730 |a 1153022945 |a 1162244097 |a 1192329400 |a 1200069715 |a 1262683369 |a 1340115718 | ||
020 | |a 0585449929 |q (electronic bk.) | ||
020 | |a 9780585449920 |q (electronic bk.) | ||
020 | |a 9781558607699 | ||
020 | |a 1558607692 | ||
020 | |a 1281028592 | ||
020 | |a 9781281028594 | ||
020 | |a 9786611028596 | ||
020 | |a 6611028595 | ||
020 | |a 0080504655 | ||
020 | |a 9780080504650 | ||
024 | 8 | |a (WaSeSS)ssj0000139568 | |
035 | |a (OCoLC)52365946 |z (OCoLC)162596263 |z (OCoLC)856952330 |z (OCoLC)961686409 |z (OCoLC)962567207 |z (OCoLC)1035658382 |z (OCoLC)1053044722 |z (OCoLC)1062885869 |z (OCoLC)1108909730 |z (OCoLC)1153022945 |z (OCoLC)1162244097 |z (OCoLC)1192329400 |z (OCoLC)1200069715 |z (OCoLC)1262683369 |z (OCoLC)1340115718 | ||
037 | |a 97119:97119 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .W39 2002eb | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 7 | |a 005.8/2 |2 20 | |
049 | |a MAIN | ||
100 | 1 | |a Wayner, Peter, |d 1964- |1 https://id.oclc.org/worldcat/entity/E39PBJhX4b9bgx6pQTKXT9qhHC |0 http://id.loc.gov/authorities/names/n95006743 | |
245 | 1 | 0 | |a Disappearing cryptography : |b information hiding : steganography & watermarking / |c Peter Wayner. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b MK/Morgan Kaufmann Publishers, |c ©2002. | ||
300 | |a 1 online resource (xvii, 412 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002. | ||
490 | 1 | |a The Morgan Kaufmann Series in Software Engineering and Programming | |
504 | |a Includes bibliographical references (pages 387-400) and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. | |
520 | |a Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Internet. |0 http://id.loc.gov/authorities/subjects/sh92002816 | |
650 | 0 | |a Digital watermarking. |0 http://id.loc.gov/authorities/subjects/sh2002000575 | |
650 | 2 | |a Internet |0 https://id.nlm.nih.gov/mesh/D020407 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Cryptographie. | |
650 | 6 | |a Internet. | |
650 | 6 | |a Tatouage numérique. | |
650 | 7 | |a Internet. |2 aat | |
650 | 7 | |a digital watermarking. |2 aat | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Digital watermarking |2 fast | |
650 | 7 | |a Internet |2 fast | |
776 | 0 | 8 | |i Print version: |a Wayner, Peter, 1964- |t Disappearing cryptography. |b 2nd ed. |d Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002 |z 1558607692 |w (DLC) 2001099790 |w (OCoLC)49749227 |
830 | 0 | |a Morgan Kaufmann Series in Software Engineering and Programming. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781558607699 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81848 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 81848 | ||
938 | |a YBP Library Services |b YANK |n 2333231 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm52365946 |
---|---|
_version_ | 1816881607562231809 |
adam_text | |
any_adam_object | |
author | Wayner, Peter, 1964- |
author_GND | http://id.loc.gov/authorities/names/n95006743 |
author_facet | Wayner, Peter, 1964- |
author_role | |
author_sort | Wayner, Peter, 1964- |
author_variant | p w pw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .W39 2002eb |
callnumber-search | TK5105.59 .W39 2002eb |
callnumber-sort | TK 45105.59 W39 42002EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. |
ctrlnum | (OCoLC)52365946 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06175cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm52365946 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030604s2002 ne a ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2001099790</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">UMK</subfield><subfield code="d">VT2</subfield><subfield code="d">UKEHC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162596263</subfield><subfield code="a">856952330</subfield><subfield code="a">961686409</subfield><subfield code="a">962567207</subfield><subfield code="a">1035658382</subfield><subfield code="a">1053044722</subfield><subfield code="a">1062885869</subfield><subfield code="a">1108909730</subfield><subfield code="a">1153022945</subfield><subfield code="a">1162244097</subfield><subfield code="a">1192329400</subfield><subfield code="a">1200069715</subfield><subfield code="a">1262683369</subfield><subfield code="a">1340115718</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585449929</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585449920</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781558607699</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1558607692</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281028592</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281028594</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611028596</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611028595</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080504655</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080504650</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000139568</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52365946</subfield><subfield code="z">(OCoLC)162596263</subfield><subfield code="z">(OCoLC)856952330</subfield><subfield code="z">(OCoLC)961686409</subfield><subfield code="z">(OCoLC)962567207</subfield><subfield code="z">(OCoLC)1035658382</subfield><subfield code="z">(OCoLC)1053044722</subfield><subfield code="z">(OCoLC)1062885869</subfield><subfield code="z">(OCoLC)1108909730</subfield><subfield code="z">(OCoLC)1153022945</subfield><subfield code="z">(OCoLC)1162244097</subfield><subfield code="z">(OCoLC)1192329400</subfield><subfield code="z">(OCoLC)1200069715</subfield><subfield code="z">(OCoLC)1262683369</subfield><subfield code="z">(OCoLC)1340115718</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">97119:97119</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.W39 2002eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">20</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wayner, Peter,</subfield><subfield code="d">1964-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJhX4b9bgx6pQTKXT9qhHC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n95006743</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Disappearing cryptography :</subfield><subfield code="b">information hiding : steganography & watermarking /</subfield><subfield code="c">Peter Wayner.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">MK/Morgan Kaufmann Publishers,</subfield><subfield code="c">©2002.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 412 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rdaft</subfield><subfield code="0">http://rdaregistry.info/termList/fileType/1002.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The Morgan Kaufmann Series in Software Engineering and Programming</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 387-400) and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh92002816</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital watermarking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002000575</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Internet</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D020407</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tatouage numérique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">digital watermarking.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital watermarking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Wayner, Peter, 1964-</subfield><subfield code="t">Disappearing cryptography.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002</subfield><subfield code="z">1558607692</subfield><subfield code="w">(DLC) 2001099790</subfield><subfield code="w">(OCoLC)49749227</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Morgan Kaufmann Series in Software Engineering and Programming.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781558607699</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81848</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">81848</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2333231</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm52365946 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:24Z |
institution | BVB |
isbn | 0585449929 9780585449920 9781558607699 1558607692 1281028592 9781281028594 9786611028596 6611028595 0080504655 9780080504650 |
language | English |
oclc_num | 52365946 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 412 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | MK/Morgan Kaufmann Publishers, |
record_format | marc |
series | Morgan Kaufmann Series in Software Engineering and Programming. |
series2 | The Morgan Kaufmann Series in Software Engineering and Programming |
spelling | Wayner, Peter, 1964- https://id.oclc.org/worldcat/entity/E39PBJhX4b9bgx6pQTKXT9qhHC http://id.loc.gov/authorities/names/n95006743 Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. 2nd ed. Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002. 1 online resource (xvii, 412 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file rdaft http://rdaregistry.info/termList/fileType/1002. The Morgan Kaufmann Series in Software Engineering and Programming Includes bibliographical references (pages 387-400) and index. Print version record. Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book English. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cryptography. Internet. http://id.loc.gov/authorities/subjects/sh92002816 Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Internet https://id.nlm.nih.gov/mesh/D020407 Réseaux d'ordinateurs Sécurité Mesures. Cryptographie. Internet. Tatouage numérique. Internet. aat digital watermarking. aat COMPUTERS Security Cryptography. bisacsh Computer networks Security measures fast Cryptography fast Digital watermarking fast Internet fast Print version: Wayner, Peter, 1964- Disappearing cryptography. 2nd ed. Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002 1558607692 (DLC) 2001099790 (OCoLC)49749227 Morgan Kaufmann Series in Software Engineering and Programming. FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781558607699 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81848 Volltext |
spellingShingle | Wayner, Peter, 1964- Disappearing cryptography : information hiding : steganography & watermarking / Morgan Kaufmann Series in Software Engineering and Programming. Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cryptography. Internet. http://id.loc.gov/authorities/subjects/sh92002816 Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Internet https://id.nlm.nih.gov/mesh/D020407 Réseaux d'ordinateurs Sécurité Mesures. Cryptographie. Internet. Tatouage numérique. Internet. aat digital watermarking. aat COMPUTERS Security Cryptography. bisacsh Computer networks Security measures fast Cryptography fast Digital watermarking fast Internet fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh92002816 http://id.loc.gov/authorities/subjects/sh2002000575 https://id.nlm.nih.gov/mesh/D020407 |
title | Disappearing cryptography : information hiding : steganography & watermarking / |
title_auth | Disappearing cryptography : information hiding : steganography & watermarking / |
title_exact_search | Disappearing cryptography : information hiding : steganography & watermarking / |
title_full | Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. |
title_fullStr | Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. |
title_full_unstemmed | Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner. |
title_short | Disappearing cryptography : |
title_sort | disappearing cryptography information hiding steganography watermarking |
title_sub | information hiding : steganography & watermarking / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cryptography. Internet. http://id.loc.gov/authorities/subjects/sh92002816 Digital watermarking. http://id.loc.gov/authorities/subjects/sh2002000575 Internet https://id.nlm.nih.gov/mesh/D020407 Réseaux d'ordinateurs Sécurité Mesures. Cryptographie. Internet. Tatouage numérique. Internet. aat digital watermarking. aat COMPUTERS Security Cryptography. bisacsh Computer networks Security measures fast Cryptography fast Digital watermarking fast Internet fast |
topic_facet | Computer networks Security measures. Cryptography. Internet. Digital watermarking. Internet Réseaux d'ordinateurs Sécurité Mesures. Cryptographie. Tatouage numérique. digital watermarking. COMPUTERS Security Cryptography. Computer networks Security measures Cryptography Digital watermarking |
url | https://www.sciencedirect.com/science/book/9781558607699 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=81848 |
work_keys_str_mv | AT waynerpeter disappearingcryptographyinformationhidingsteganographywatermarking |