Disappearing Cryptography -  Peter Wayner

Disappearing Cryptography (eBook)

Information Hiding: Steganography & Watermarking

(Autor)

eBook Download: PDF
2002 | 2. Auflage
413 Seiten
Elsevier Science (Verlag)
978-0-08-050465-0 (ISBN)
Systemvoraussetzungen
50,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible, steganography, embedding information into video, audio, or graphics files, watermarking, hiding data in the noise of image or sound files, mimicry, dressing up data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book.
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "e;dressing up"e; data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms.

Front Cover 1
Disappearing Cryptography 2
Copyright Page 5
Contents 6
Preface 12
Chapter 1. Framing Information 18
1.1 Introduction 18
1.2 Reasons for Secrecy 20
1.3 How It Is Done 22
1.4 How Steganography Is Used 24
1.5 Attacks on Steganography 26
1.6 Adding Context 30
Chapter 2. Encryption 32
Pure White 32
2.1 Encryption and White Noise 33
2.2 Measuring Information and Encrypting It 44
2.3 Summary 48
Chapter 3. Error Correction 50
Close but No Cigar 50
3.1 Correcting Errors 50
3.2 Constructing Error-Correcting Codes 59
3.3 Summary 64
Chapter 4. Secret Sharing 66
Two out of Three Musketeers 66
4.1 Splitting Up Secrets 67
4.2 Building Secret-Sharing Schemes 74
4.3 Public-Key Secret Sharing 77
4.4 Steganographic File Systems and Secret Sharing 78
4.5 Summary 82
Chapter 5. Compression 84
Television Listing 84
5.1 Patterns and Compression 85
5.2 Building Compression Algorithms 91
5.3 Summary 97
Chapter 6. Basic Mimicry 98
Reading between the Lines 98
6.1 Running in Reverse 99
6.2 Implementing the Mimicry 106
6.3 Summary 111
Chapter 7. Grammars and Mimicry 114
Evolution of Everyday Things 114
7.1 Using Grammar for Mimicry 116
7.2 Creating Grammar-Based Mimicry 124
7.3 Summary 143
Chapter 8. Turing and Reverse 146
Doggie’s Little Get Along 146
8.1 Running Backward 147
8.2 Building a Reversible Machine 156
8.3 Summary 164
Chapter 9. Life in the Noise 166
Boy-Zs in Noizy, Idaho 166
9.1 Hiding in the Noise 168
9.2 Bit Twiddling 178
9.3 Summary 199
Chapter 10. Anonymous Remailers 200
Dr. Anon to You 200
10.1 Anonymous Remailers 202
10.2 Remailer Guts 208
10.3 Anonymous Networks 215
10.4 The Future 220
10.5 Summary 221
Chapter 11. Secret Broadcasts 222
Table Talk 222
11.1 Secret Senders 223
11.2 Creating a DC Net 227
11.3 Summary 230
Chapter 12. Keys 232
The Key Vision 232
12.1 Extending Control 233
12.2 Signing Algorithms 235
12.3 Public-Key Algorithms 237
12.4 Zero-Knowledge Approaches 243
12.5 Collusion Control 249
12.6 Summary 250
Chapter 13. Ordering and Reordering 252
Top 10 Reasons Why Top 10 Lists Fail 252
13.1 Introduction 253
13.2 Strength against Scrambling 254
13.3 Invariant Forms 256
13.4 Canonical Forms 257
13.5 Packing in Multiple Messages 258
13.6 Sorting to Hide Information 258
13.7 Adding Extra Packets 261
13.8 Summary 262
Chapter 14. Spreading 264
A New Job 264
14.1 Spreading the Information 266
14.2 Going Digital 269
14.3 Comparative Blocks 277
14.4 Fast Fourier Solutions 279
14.5 The Fast Fourier Transform 282
14.6 Hiding Information with FFTs and DCTs 287
14.7 Wavelets 292
14.8 Modifications 295
14.9 Summary 297
Chapter 15. Synthetic Worlds 298
Slam Dunks 298
15.1 Created Worlds 299
15.2 Text Position Encoding and OCR 301
15.3 Echo Hiding 304
15.4 Summary 306
Chapter 16. Watermarks 308
A Patent for Watermarking Humans 308
16.1 Embedding Ownerships Information 309
16.2 A Basic Watermark 314
16.3 An Averaging Watermark 317
16.4 Summary 319
Chapter 17. Steganalysis 320
Code Words 320
17.1 Finding Hidden Messages 320
17.2 Typical Approaches 322
17.3 Visual Attacks 323
17.4 Structural Attacks 326
17.5 Statistical Attacks 328
17.6 Summary 331
Afterword 332
Appendix A. Java Mimic Code 336
Appendix B. Baseball CFG 370
Appendix C. Reversible Grammar Generator 384
Appendix D. Software 396
Further Readings 400
Bibliography 404
Index 418

Erscheint lt. Verlag 9.5.2002
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Informatik Software Entwicklung User Interfaces (HCI)
Informatik Theorie / Studium Kryptologie
Technik
ISBN-10 0-08-050465-5 / 0080504655
ISBN-13 978-0-08-050465-0 / 9780080504650
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 5,2 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90