• Media type: E-Book
  • Title: Disappearing cryptography : information hiding, steganography & watermarking
  • Contains: Includes bibliographical references (p. 403-430) and index
    Front Cover; Disappearing Cryptography: Information Hiding: Steganography & Watermarking; Copyright Page; Contents; About the Author; Preface; Book Notes; 0.1 Notes On the Third Edition; 0.2 Notes On the Second Edition; Chapter 1 Framing Information; 1.1 Adding Context; Chapter 2 Encryption; 2.1 Pure White; 2.2 Encryption and White Noise; 2.3 Measuring and Encrypting Information; 2.4 Summary; Chapter 3 Error Correction; 3.1 Close but No Cigar; 3.2 Correcting Errors; 3.3 Constructing Error-Correcting Codes; 3.4 Summary; Chapter 4 Secret Sharing; 4.1 Two out of Three Musketeers
    4.2 Splitting Up Secrets4.3 Building Secret-Sharing Schemes; 4.4 Public-Key Secret Sharing; 4.5 Steganographic File Systems and Secret Sharing; 4.6 Summary; Chapter 5 Compression; 5.1 Television Listing; 5.2 Patterns and Compression; 5.3 Building Compression Algorithms; 5.4 Summary; Chapter 6 Basic Mimicry; 6.1 Reading between the Lines; 6.2 Running in Reverse; 6.3 Implementing the Mimicry; 6.4 Summary; Chapter 7 Grammars and Mimicry; 7.1 Evolution of Everyday Things; 7.2 Using Grammar for Mimicry; 7.3 Creating Grammar-Based Mimicry; 7.4 Summary; Chapter 8 Turing and Reverse
    8.1 Doggie's Little Get Along8.2 Running Backward; 8.3 Building a Reversible Machine; 8.4 Summary; Chapter 9 Life in the Noise; 9.1 Boy-Zs in Noizy, Idaho; 9.2 Hiding in the Noise; 9.3 Bit Twiddling; 9.4 Random Walks and Subsets; 9.5 Putting JPEG to Use; 9.6 Summary; Chapter 10 Anonymous Remailers; 10.1 Dr. Anon to You; 10.2 Anonymous Remailers; 10.3 Remailer Guts; 10.4 Anonymous Networks; 10.5 Long term storage; 10.6 Publius; 10.7 Onion Routing; 10.8 Anonymous Auction Protocols; 10.9 The Future; 10.10 Summary; Chapter 11 Secret Broadcasts; 11.1 Table Talk; 11.2 Secret Senders
    11.3 Creating a DC Net11.4 Summary; Chapter 12 Keys; 12.1 The Key Vision; 12.2 Extending Control; 12.3 Signing Algorithms; 12.4 Public-Key Algorithms; 12.5 Zero Knowledge Approaches; 12.6 Collusion Control; 12.7 Summary; Chapter 13 Ordering and Reordering; 13.1 Top 10 Reasons Why Top 10 Lists Fail; 13.2 Introduction; 13.3 Strength Against Scrambling; 13.4 Invariant Forms; 13.5 Canonical Forms; 13.6 Packing in Multiple Messages; 13.7 Sorting to Hide Information; 13.8 Word Scrambling; 13.9 Adding Extra Packets; 13.10 Port Knocking; 13.11 Continuous Use and Jamming; 13.12 Summary
    Chapter 14 Spreading14.1 A New Job; 14.2 Spreading the Information; 14.3 Going Digital; 14.4 Comparative Blocks; 14.5 Fast Fourier Solutions; 14.6 The Fast Fourier Transform; 14.7 Hiding Information with FFTs and DCTs; 14.8 Wavelets; 14.9 Modifications; 14.10 Summary; Chapter 15 Synthetic Worlds; 15.1 Slam Dunks; 15.2 Created Worlds; 15.3 Text Position Encoding and OCR; 15.4 Echo Hiding; 15.5 Summary; Chapter 16 Watermarks; 16.1 A Patent for Watermarking Humans; 16.2 Tagging Digital Documents; 16.4 An Averaging Watermark; 16.5 Summary; Chapter 17 Steganalysis; 17.1 Code Words
    17.2 Finding Hidden Messages
  • Contributor: Wayner, Peter [Author]
  • imprint: Amsterdam [u.a.]: Morgan Kaufmann Publishers/Elsevier, 2009
  • Published in: The Morgan Kaufmann Series in Software Engenieering and Programming
  • Issue: 3. ed.
  • Extent: Online Ressource (xv, 439 p.)
  • Language: English
  • ISBN: 0123744792; 9780080922706; 0080922708; 9780123744791
  • RVK notation: ST 276 : Datensicherung (physik.) und angewandte Kryptographie, Computerviren
    ST 273 : Kommunikationssysteme allgemein (A-Z)
  • Keywords: Kryptologie
    Kryptologie
    Computersicherheit > Kryptologie > Steganographie
  • Origination:
  • Footnote: Includes bibliographical references (p. 403-430) and index. - Description based on print version record
  • Description: Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Turing and reverse -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis -- Obfuscation -- Synchronization -- Translucent databases -- Plain sight -- Coda

    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates