• Complain

Peter Wayner - Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking

Here you can read online Peter Wayner - Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2008, publisher: Morgan Kaufmann, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Peter Wayner Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
  • Book:
    Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
  • Author:
  • Publisher:
    Morgan Kaufmann
  • Genre:
  • Year:
    2008
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes.
This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack.
Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
  • Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
  • Grants the reader access to online source code which can be used to directly implement proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

Peter Wayner: author's other books


Who wrote Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking? Find out the surname, the name of the author of the book and a list of all author's works by series.

Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Disappearing Cryptography Information Hiding Steganography Watermarking - photo 1
Disappearing Cryptography
Information Hiding:
Steganography & Watermarking
Peter Wayner
Brief Table of Contents
Table of Contents
Copyright

Morgan Kaufmann Publishers is an imprint of Elsevier.

30 Corporate Drive, Suite 400

Burlington, MA 01803, USA

This book is printed on acid-free paper.

Copyright 2009 by Peter Wayner. Published by Elsevier Inc.

Designations used by companies to distinguish their products are often claimed as trademarks or registered trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration.

), by selecting Support & Contact then Copyright and Permission and then Obtaining Permissions.

Library of Congress Cataloging-in-Publication Data

Wayner, Peter, 1964

Disappearing cryptography: Information hiding: Steganography & watermarking / Peter Wayner. 3rd ed.

p. cm.

Includes bibliographical references and index.

ISBN 978-0-12-374479-1 (alk. paper)

1. Computer networksSecurity measures. 2. Cryptography. 3. Internet.

I. Title.

TK5105.59.W39 2009

005.82dc22 2008044800

For information on all Morgan Kaufmann publications, visit our Web site at www.mkp.com or www.books.elsevier.com

Printed in the United States of America

8 9 10 11 12 10 9 8 7 6 5 4 3 2 1

About the Author

Peter Wayner is the author of more than a dozen books, if you include the different versions of this book, Disappearing Cryptography. This book is one of the best examples of a common theme in his work, the idea that information can hide from everyone. (The first edition came with the subtitle Being and Nothingness on the Net, a choice that lost out to the power of keyword searches on the Internet. It's one thing to hide when you want to hide, but not when someone is looking for a book to purchase on Amazon.)

Other books that follow in this theme are:

  • Digital Cash, An exploration of how to move money across the Internet by creating bits that can't be counterfeited. [Way95b]
  • Translucent DatabasesA manifesto on how to preserve privacy and increase security by creating databases that do useful work without having anything in them. [Way03]
  • Digital Copyright ProtectionHow to keep content on a flexible leash. [Way97b]
  • Policing Online Games How to enforce contracts and keep games honest and fair. [Way05]

He writes often on technical topics for venues like New York Times, InfoWorld, Byte, Wired and, on occasion, even a USENET newsgroup or two.

When he's not writing, he consults on these topics for a wide range of companies.

Preface

This book is a third edition and so that means more thanks for everyone. There is no doubt that I owe a debt of gratitude to the participants in the cypherpunks and coderpunks mailing lists. Their original contributions inspired me to write the first book and their continual curiosity makes it one of the best sources of information around.

Some newer mailing lists are more focused on the topic. The watermarking list and the stegano list both offer high quality discussions with a high signal-to-noise ratio. Other lists like the RISKS digest and Dave Farber's Interest People list helped contribute in unexpected ways. Of course, modern list-like web sites like Slashdot, Kuro5hin, and InfoAnarchy contributed by offering solid, moderated discussions that help the signal jump out of the noise. It is impossible to thank by name all of the members of the community who include plenty of solid information and deep thought in their high-quality postings.

The organizers of the Information Hiding Workshops brought some academic rigor to the area by sponsoring excellent workshops on the topic. The discipline of creating, editing, reviewing, presenting and publishing a manuscript advanced the state of the art in numerous ways. The collected papers published by Springer-Verlag are a great resource for anyone interested in the development of the field.

Some others have helped in other ways. Peter Neumann scanned the first manuscript and offered many good suggestions for improving it. Bruce Schneier was kind enough to give me an electronic version of the bibliography from his first book [Sch94]. I converted it into Bibtex format and used it for some of the references here. Ross Anderson's annotated bibliography on Information Hiding was also a great help.

Scott Craver, Frank Hartung, Deepa Kundur, Mike Sway, and three anonymous reviewers checked the second edition. Their comments helped fixed numerous errors and also provided many suggestions for improving the book.

The original book was originally published by AP Professional, a division of Harcourt-Brace that blended into Morgan Kaufmann. The team responsible for producing the first edition was: Chuck Glaser, Jeff Pepper, Mike Williams, Barbara Northcott, Don DeLand, Tom Ryan, Josh Mills, Gael Tannenbaum, and Dave Hannon.

The second edition would not exist without the vision and support of Tim Cox at Morgan Kaufmann. I would like to thank Tim and Stacie Pierce for all of their help and encouragement.

The third edition exists because Rick Adams, Gregory Chalson and Denise Penrose saw the value in the book and devoted their hard work and energy to bringing it to market again. Sherri Davidoff, Rakan El-Khalil, Philipp Ghring, Scott Guthery, J. Wren Hunt, John Marsh, Chris Peikert Leonard Popyack and Ray Wagner read portions of the book and provided invaluable help fixing the book.

October 2008

http://www.wayner.org

Book Notes

. The periods and commas are left outside of all quotes to prevent confusion.

Hyphens also cause problems when they're used for different tasks. LISP programmers often use hyphens to join words together into a single name like this: Do-Not-Call-This-Procedure. Unfortunately, this causes grief when these longer words occur at the end of a line. In these cases, there will be an extra hyphen included to specify that there was an original hyphen in the word. This isn't hyper-compatible with the standard rules that don't include the extra hyphen. But these rules are for readers who know that self-help is a word that should be hyphenated. No one knows what to think about A-Much-Too-Long-Procedure-That-Should--Be-Shortened-For-Everyone.

A Start

This book is about making information disappear. For some people, this topic is a parlor trick, an amazing intellectual exercise that rattles around about the foundations of knowledge. For others, the topic has immense practical importance. An enemy can only control your message if they can find it. If you hide data, you can protect your thoughts from censorship and discovery.

The book describes a number of different techniques that people can use to hide information. The sound files and images that float about the network today are great locations filled with possibilities. Large messages can be hidden in the noise of these images or sound files where no one can expect to find them. About one eighth of an image file can be used to hide information without any significant change in the quality of the image.

to turn data into something entirely innocent like the voice-over to a baseball game. Bad poetry is even easier to create.

show how a group of people can communicate without revealing who is talking. Completely anonymous conversations can let people speak their mind without endangering their lives.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking»

Look at similar books to Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking»

Discussion, reviews of the book Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.