Save Big On Open-Box & Pre-owned: Buy "Disappearing Cryptography, Third Edition: Informat...” from Amazon Warehouse Deals and save 23% off the $69.95 list price. Product is eligible for Amazon's 30-day returns policy and Prime or FREE Shipping. See all Open-Box & Pre-owned offers from Amazon Warehouse Deals.
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Disappearing Cryptography, Third Edition: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
Best Books of the Year So Far in fiction, nonfiction, mysteries, children's books, and much more.
Frequently Bought Together
Customers Who Bought This Item Also Bought
Special Offers and Product Promotions
From the Back Cover
In a time of electronic espionage, this new edition of our best-selling title ensures the security and confidentiality of your electronic content, communication and commerce!
Disappearing Cryptography, Third Edition delves deep into steganography by delineating a number of different methods to hide and therefore protect information in all types of digital media files. During the last five years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this new edition amends and expands on outdated sections by focusing on new dangers, and includes five completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the most evolved forms of attack.
Each chapter provides an introduction and a high-level summary enabling the reader to understand the concepts without wading through technical explanations, and presents detailed, concrete examples for those who want to implement the algorithms or write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also to consider future developments in their designs, thus fulfilling the need for preemptive caution that is becoming even more explicit as the transference of digital media escalates.
- Includes five new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
- Conceptual tutelage in conjunction with detailed mathematical directives allows readers to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
- Access to online source code for implementing proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.
About the Author
Top Customer Reviews
Please note that there are many things hopelessly out of date (such as a good part of chapter 10, devoted to anonymous remailers, many of which disappeared a long time ago -- But if you keep reading past the historic part, the same chapter reaches anonymizing proxies and more current stuff)... I don't know if it's a "for the laughs" action from the author or just very out-of-date parts, but as far as I remember all of the screenshots in the book sport a *Windows 3.x* style! They date at least from the first edition of the book.