Disappearing Cryptography, 2/e
暫譯: 消失的密碼學,第二版

Peter Wayner

  • 出版商: Morgan Kaufmann
  • 出版日期: 2002-05-13
  • 定價: $1,498
  • 售價: 5.0$749
  • 語言: 英文
  • 頁數: 413
  • 裝訂: Paperback
  • ISBN: 1558607692
  • ISBN-13: 9781558607699
  • 相關分類: SAP資訊安全
  • 立即出貨(限量)

買這商品的人也買了...

商品描述

Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.  
 
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Contents


Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index

商品描述(中文翻譯)

《消失的密碼學,第二版》描述了如何將文字、聲音或影像隱藏在數位數據中,使其看起來像其他的文字、聲音或影像。當正確使用時,這種強大的技術幾乎使得追蹤消息的發送者和接收者變得不可能。對話可以在互聯網的信息流中被淹沒,讓任何人都無法知道是否存在對話。

這本暢銷第一版的全面修訂版描述了多種隱藏信息的技術。這些技術包括加密,使數據變得不可理解;隱寫術,將信息嵌入視頻、音頻或圖形文件中;水印技術,將數據隱藏在影像或聲音文件的噪聲中;模仿,將數據“打扮”成其他數據,等等。第二版還擴展了有關使用擴頻算法、洗牌技巧和合成世界隱藏信息的討論。每一章都分為幾個部分,首先為那些希望理解概念而不想深入技術解釋的讀者提供介紹和高層次的摘要,然後為那些希望編寫自己程序的讀者提供更詳細的內容。為了鼓勵探索,作者的網站 www.wayner.org/books/discrypt2/ 包含了隱藏信息在列表、句子和影像中的實現。

目錄
前言。框架信息。加密。錯誤修正。秘密分享。壓縮。基本模仿。文法與模仿。圖靈與反向。噪聲中的生活。匿名重寄者。秘密廣播。密鑰。排序與重新排序。擴散。合成世界。水印。隱寫分析。後記。附錄A Java模仿代碼。附錄B 棒球CFG。附錄C 可逆文法生成器。附錄D 軟體。進一步閱讀。參考文獻。索引。