Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Disappearing Cryptography -  Peter Wayner

Disappearing Cryptography (eBook)

Information Hiding: Steganography and Watermarking

(Autor)

eBook Download: EPUB
2009 | 3. Auflage
456 Seiten
Elsevier Science (Verlag)
978-0-08-092270-6 (ISBN)
Systemvoraussetzungen
50,84 inkl. MwSt
(CHF 49,65)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes.

This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack.

Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.



  • Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.

  • Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.

  • Grants the reader access to online source code which can be used to directly implement proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. - Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks- Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design

Front Cover 1
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Copyright Page 3
Contents 4
About the Author 12
Preface 14
Book Notes 16
0.1 Notes On the Third Edition 19
0.2 Notes On the Second Edition 20
Chapter 1 Framing Information 22
1.1 Adding Context 33
Chapter 2 Encryption 36
2.1 Pure White 36
2.2 Encryption and White Noise 37
2.3 Measuring and Encrypting Information 48
2.4 Summary 52
Chapter 3 Error Correction 54
3.1 Close but No Cigar 54
3.2 Correcting Errors 54
3.3 Constructing Error-Correcting Codes 63
3.4 Summary 68
Chapter 4 Secret Sharing 72
4.1 Two out of Three Musketeers 72
4.2 Splitting Up Secrets 73
4.3 Building Secret-Sharing Schemes 80
4.4 Public-Key Secret Sharing 83
4.5 Steganographic File Systems and Secret Sharing 84
4.6 Summary 88
Chapter 5 Compression 90
5.1 Television Listing 90
5.2 Patterns and Compression 91
5.3 Building Compression Algorithms 96
5.4 Summary 102
Chapter 6 Basic Mimicry 104
6.1 Reading between the Lines 104
6.2 Running in Reverse 105
6.3 Implementing the Mimicry 111
6.4 Summary 117
Chapter 7 Grammars and Mimicry 120
7.1 Evolution of Everyday Things 120
7.2 Using Grammar for Mimicry 122
7.3 Creating Grammar-Based Mimicry 131
7.4 Summary 149
Chapter 8 Turing and Reverse 154
8.1 Doggie’s Little Get Along 154
8.2 Running Backward 155
8.3 Building a Reversible Machine 164
8.4 Summary 172
Chapter 9 Life in the Noise 174
9.1 Boy-Zs in Noizy, Idaho 174
9.2 Hiding in the Noise 176
9.3 Bit Twiddling 187
9.4 Random Walks and Subsets 195
9.5 Putting JPEG to Use 200
9.6 Summary 208
Chapter 10 Anonymous Remailers 210
10.1 Dr. Anon to You 210
10.2 Anonymous Remailers 212
10.3 Remailer Guts 217
10.4 Anonymous Networks 224
10.5 Long term storage 229
10.6 Publius 232
10.7 Onion Routing 234
10.8 Anonymous Auction Protocols 244
10.9 The Future 245
10.10 Summary 246
Chapter 11 Secret Broadcasts 248
11.1 Table Talk 248
11.2 Secret Senders 248
11.3 Creating a DC Net 252
11.4 Summary 255
Chapter 12 Keys 258
12.1 The Key Vision 258
12.2 Extending Control 259
12.3 Signing Algorithms 261
12.4 Public-Key Algorithms 262
12.5 Zero Knowledge Approaches 269
12.6 Collusion Control 275
12.7 Summary 276
Chapter 13 Ordering and Reordering 278
13.1 Top 10 Reasons Why Top 10 Lists Fail 278
13.2 Introduction 279
13.3 Strength Against Scrambling 280
13.4 Invariant Forms 282
13.5 Canonical Forms 282
13.6 Packing in Multiple Messages 283
13.7 Sorting to Hide Information 284
13.8 Word Scrambling 286
13.9 Adding Extra Packets 287
13.10 Port Knocking 288
13.11 Continuous Use and Jamming 291
13.12 Summary 292
Chapter 14 Spreading 294
14.1 A New Job 294
14.2 Spreading the Information 296
14.3 Going Digital 300
14.4 Comparative Blocks 307
14.5 Fast Fourier Solutions 311
14.6 The Fast Fourier Transform 314
14.7 Hiding Information with FFTs and DCTs 316
14.8 Wavelets 324
14.9 Modifications 326
14.10 Summary 328
Chapter 15 Synthetic Worlds 330
15.1 Slam Dunks 330
15.2 Created Worlds 331
15.3 Text Position Encoding and OCR 333
15.4 Echo Hiding 337
15.5 Summary 338
Chapter 16 Watermarks 340
16.1 A Patent for Watermarking Humans 340
16.2 Tagging Digital Documents 341
16.4 An Averaging Watermark 348
16.5 Summary 352
Chapter 17 Steganalysis 354
17.1 Code Words 354
17.2 Finding Hidden Messages 354
17.3 Typical Approaches 356
17.4 Visual and Aural Attacks 357
17.5 Structural Attacks 361
17.6 Statistical Attacks 365
17.7 Summary 368
Chapter 18 Obfuscation 372
18.1 Regulation 372
18.2 Code Rearrangement 373
18.3 Compiling Intelligence 374
18.4 Real Tools 379
18.5 Summary 380
Chapter 19 Synchronization 382
19.1 Stealing Baseball’s Signs 382
19.2 Getting In Sync 383
19.3 Extending Other Tools 384
19.4 Summary 387
Chapter 20 Translucent Databases 390
20.1 Missed Connections 390
20.2 Hiding In Databases 390
20.3 Using Strong One-Way Functions 393
20.4 Summary 394
Chapter 21 Plain Sight 396
21.1 Laughtracks 396
21.2 Hiding in the Open 397
21.3 Other Formats 398
21.4 Summary 402
Chapter 22 Coda 404
A Software 408
A.1 Commercial Packages 408
A.2 Open Packages 409
A.3 Steganalysis Software 414
Bibliographic Notes 416
Bibliography 420
Index 448

Erscheint lt. Verlag 12.6.2009
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-08-092270-8 / 0080922708
ISBN-13 978-0-08-092270-6 / 9780080922706
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95