Disappearing Cryptography, 2/e

Peter Wayner

  • 出版商: Morgan Kaufmann
  • 出版日期: 2002-05-13
  • 定價: $1,498
  • 售價: 5.0$749
  • 語言: 英文
  • 頁數: 413
  • 裝訂: Paperback
  • ISBN: 1558607692
  • ISBN-13: 9781558607699
  • 相關分類: SAP資訊安全
  • 立即出貨(限量)



Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.  
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.


Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index



前言。資訊的框架。加密。錯誤修正。秘密分享。壓縮。基本模仿。文法和模仿。圖靈和反轉。在噪音中的生活。匿名轉寄。秘密廣播。金鑰。排序和重排序。展開。合成世界。浮水印。隱察分析。結語。附錄A Java模仿程式碼。附錄B 棒球CFG。附錄C 可逆文法生成器。附錄D 軟體。進一步閱讀。參考文獻。索引。