Disappearing Cryptography, 2/e
Peter Wayner
- 出版商: Morgan Kaufmann
- 出版日期: 2002-05-13
- 定價: $1,498
- 售價: 5.0 折 $749
- 語言: 英文
- 頁數: 413
- 裝訂: Paperback
- ISBN: 1558607692
- ISBN-13: 9781558607699
-
相關分類:
SAP、資訊安全
立即出貨(限量)
買這商品的人也買了...
-
$1,250$1,225 -
$1,029Fundamentals of Data Structures in C
-
$640$608 -
$2,620$2,489 -
$650$553 -
$1,029Fundamentals of Logic Design, 4/e
-
$980$774 -
$960$912 -
$1,900$1,805 -
$880$695 -
$650$553 -
$1,860$1,767 -
$780$741 -
$650$553 -
$590$466 -
$650$618 -
$750$675 -
$720$569 -
$620$558 -
$560$504 -
$390$304 -
$490$417 -
$580$458 -
$580$458 -
$650$553
相關主題
商品描述
Disappearing Cryptography, Second
Edition describes how to take words, sounds, or images and hide them in
digital data so they look like other words, sounds, or images. When used
properly, this powerful technique makes it almost impossible to trace the author
and the recipient of a message. Conversations can be submerged in the flow of
information through the Internet so that no one can know if a conversation
exists at all.
This full revision of the best-selling first
edition describes a number of different techniques to hide information. These
include encryption, making data incomprehensible; steganography, embedding
information into video, audio, or graphics files; watermarking, hiding data in
the noise of image or sound files; mimicry, "dressing up" data and making it
appear to be other data, and more. The second edition also includes an expanded
discussion on hiding information with spread-spectrum algorithms, shuffling
tricks, and synthetic worlds. Each chapter is divided into sections, first
providing an introduction and high-level summary for those who want to
understand the concepts without wading through technical explanations, and then
presenting greater detail for those who want to write their own programs. To
encourage exploration, the author's Web site www.wayner.org/books/discrypt2/
contains implementations for hiding information in lists, sentences, and
images.
Preface. Framing Information. Encryption. Error Correction. Secret Sharing. Compression. Basic Mimicry. Grammars and Mimicry. Turing and Reverse. Life in the Noise. Anonymous Remailers. Secret Broadcasts. Keys. Ordering and Reordering. Spreading. Synthetic Worlds. Watermarks. Steganalysis. Afterword. Appendix A Java Mimic Code. Appendix B Baseball CFG. Appendix C Reversible Grammar Generator. Appendix D Software. Further Readings. Bibliography. Index
商品描述(中文翻譯)
《消失的密碼學,第二版》描述了如何將文字、聲音或圖像隱藏在數字資料中,使其看起來像其他文字、聲音或圖像。當正確使用時,這種強大的技術幾乎不可能追蹤訊息的作者和接收者。對話可以在網際網路的資訊流中隱藏,以至於沒有人知道是否存在對話。這本暢銷書的全面修訂描述了多種不同的隱藏資訊技術,包括加密(使資料變得難以理解)、隱寫術(將資訊嵌入視頻、音頻或圖像檔案中)、浮水印(將資料隱藏在圖像或聲音檔案的噪音中)、模仿(將資料“打扮”起來,使其看起來像其他資料)等等。第二版還包括了關於使用展頻算法、洗牌技巧和合成世界隱藏資訊的擴展討論。每個章節分為幾個部分,首先提供了介紹和高層次摘要,以便那些希望理解概念而不想深入技術解釋的人,然後為那些希望撰寫自己的程式的人提供更多細節。為了鼓勵探索,作者的網站www.wayner.org/books/discrypt2/上提供了在列表、句子和圖像中隱藏資訊的實現。
目錄:
前言。資訊的框架。加密。錯誤修正。秘密分享。壓縮。基本模仿。文法和模仿。圖靈和反轉。在噪音中的生活。匿名轉寄。秘密廣播。金鑰。排序和重排序。展開。合成世界。浮水印。隱察分析。結語。附錄A Java模仿程式碼。附錄B 棒球CFG。附錄C 可逆文法生成器。附錄D 軟體。進一步閱讀。參考文獻。索引。