TY - GEN
AU - Wayner, Peter
TI - Disappearing cryptography information hiding, steganography & watermarking
ET - 3. ed.
PB - Morgan Kaufmann Publishers/Elsevier
SN - 0123744792
SN - 9780080922706
SN - 0080922708
SN - 9780123744791
KW - Computer networks Security measures
KW - Cryptography
KW - Internet
KW - Computer networks Security measures. Cryptography. Internet
KW - Computer networks / Security measures
KW - COMPUTERS ; Security ; Cryptography
KW - Computer networks ; Security measures
KW - Electronic books
KW - Kryptologie
KW - Computersicherheit
KW - Steganographie
PY - 2009
N2 - Includes bibliographical references (p. 403-430) and index. - Description based on print version record
N2 - Includes bibliographical references (p. 403-430) and index
N2 - Front Cover; Disappearing Cryptography: Information Hiding: Steganography & Watermarking; Copyright Page; Contents; About the Author; Preface; Book Notes; 0.1 Notes On the Third Edition; 0.2 Notes On the Second Edition; Chapter 1 Framing Information; 1.1 Adding Context; Chapter 2 Encryption; 2.1 Pure White; 2.2 Encryption and White Noise; 2.3 Measuring and Encrypting Information; 2.4 Summary; Chapter 3 Error Correction; 3.1 Close but No Cigar; 3.2 Correcting Errors; 3.3 Constructing Error-Correcting Codes; 3.4 Summary; Chapter 4 Secret Sharing; 4.1 Two out of Three Musketeers
N2 - 4.2 Splitting Up Secrets4.3 Building Secret-Sharing Schemes; 4.4 Public-Key Secret Sharing; 4.5 Steganographic File Systems and Secret Sharing; 4.6 Summary; Chapter 5 Compression; 5.1 Television Listing; 5.2 Patterns and Compression; 5.3 Building Compression Algorithms; 5.4 Summary; Chapter 6 Basic Mimicry; 6.1 Reading between the Lines; 6.2 Running in Reverse; 6.3 Implementing the Mimicry; 6.4 Summary; Chapter 7 Grammars and Mimicry; 7.1 Evolution of Everyday Things; 7.2 Using Grammar for Mimicry; 7.3 Creating Grammar-Based Mimicry; 7.4 Summary; Chapter 8 Turing and Reverse
N2 - 8.1 Doggie's Little Get Along8.2 Running Backward; 8.3 Building a Reversible Machine; 8.4 Summary; Chapter 9 Life in the Noise; 9.1 Boy-Zs in Noizy, Idaho; 9.2 Hiding in the Noise; 9.3 Bit Twiddling; 9.4 Random Walks and Subsets; 9.5 Putting JPEG to Use; 9.6 Summary; Chapter 10 Anonymous Remailers; 10.1 Dr. Anon to You; 10.2 Anonymous Remailers; 10.3 Remailer Guts; 10.4 Anonymous Networks; 10.5 Long term storage; 10.6 Publius; 10.7 Onion Routing; 10.8 Anonymous Auction Protocols; 10.9 The Future; 10.10 Summary; Chapter 11 Secret Broadcasts; 11.1 Table Talk; 11.2 Secret Senders
N2 - 11.3 Creating a DC Net11.4 Summary; Chapter 12 Keys; 12.1 The Key Vision; 12.2 Extending Control; 12.3 Signing Algorithms; 12.4 Public-Key Algorithms; 12.5 Zero Knowledge Approaches; 12.6 Collusion Control; 12.7 Summary; Chapter 13 Ordering and Reordering; 13.1 Top 10 Reasons Why Top 10 Lists Fail; 13.2 Introduction; 13.3 Strength Against Scrambling; 13.4 Invariant Forms; 13.5 Canonical Forms; 13.6 Packing in Multiple Messages; 13.7 Sorting to Hide Information; 13.8 Word Scrambling; 13.9 Adding Extra Packets; 13.10 Port Knocking; 13.11 Continuous Use and Jamming; 13.12 Summary
N2 - Chapter 14 Spreading14.1 A New Job; 14.2 Spreading the Information; 14.3 Going Digital; 14.4 Comparative Blocks; 14.5 Fast Fourier Solutions; 14.6 The Fast Fourier Transform; 14.7 Hiding Information with FFTs and DCTs; 14.8 Wavelets; 14.9 Modifications; 14.10 Summary; Chapter 15 Synthetic Worlds; 15.1 Slam Dunks; 15.2 Created Worlds; 15.3 Text Position Encoding and OCR; 15.4 Echo Hiding; 15.5 Summary; Chapter 16 Watermarks; 16.1 A Patent for Watermarking Humans; 16.2 Tagging Digital Documents; 16.4 An Averaging Watermark; 16.5 Summary; Chapter 17 Steganalysis; 17.1 Code Words
N2 - 17.2 Finding Hidden Messages
BT - The Morgan Kaufmann Series in Software Engenieering and Programming
CY - Amsterdam [u.a.]
UR - http://slubdd.de/katalog?TN_libero_mab2
ER -
Download citation