Save Big On Open-Box & Preowned: Buy "Disappearing Cryptography, Third Edition: Informat...” from Amazon Warehouse Deals and save 51% off the $69.95 list price. Product is eligible for Amazon's 30-day returns policy and Prime or FREE Shipping. See all Open-Box & Preowned offers from Amazon Warehouse Deals.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
Frequently Bought Together
Customers Who Viewed This Item Also Viewed
Special Offers and Product Promotions
From the Back Cover
In a time of electronic espionage, this new edition of our best-selling title ensures the security and confidentiality of your electronic content, communication and commerce!
Disappearing Cryptography, Third Edition delves deep into steganography by delineating a number of different methods to hide and therefore protect information in all types of digital media files. During the last five years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this new edition amends and expands on outdated sections by focusing on new dangers, and includes five completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the most evolved forms of attack.
Each chapter provides an introduction and a high-level summary enabling the reader to understand the concepts without wading through technical explanations, and presents detailed, concrete examples for those who want to implement the algorithms or write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also to consider future developments in their designs, thus fulfilling the need for preemptive caution that is becoming even more explicit as the transference of digital media escalates.
- Includes five new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
- Conceptual tutelage in conjunction with detailed mathematical directives allows readers to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
- Access to online source code for implementing proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.
About the Author
More About the Author
Top Customer Reviews
Please note that there are many things hopelessly out of date (such as a good part of chapter 10, devoted to anonymous remailers, many of which disappeared a long time ago -- But if you keep reading past the historic part, the same chapter reaches anonymizing proxies and more current stuff)... I don't know if it's a "for the laughs" action from the author or just very out-of-date parts, but as far as I remember all of the screenshots in the book sport a *Windows 3.x* style! They date at least from the first edition of the book.