Close
Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Search
Disappearing Cryptography: Information Hiding: Steganography Watermarking
Foyalty 109

Disappearing Cryptography: Information Hiding: Steganography Watermarking (Paperback)

£35.99
To Order. Estimated despatch in 3-5 weeks.
Email me when back in stock

Synopsis

"Disappearing Cryptography, Second Edition" describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds.Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs.

To encourage exploration, the author's Web site contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded, this book covers key concepts for non-technical readers. It goes into technical details for those wanting to create their own programs and implement algorithms. It features an up-to-date website containing the code samples from the book.

Computing & ITComputer securityData encryption Publisher: Elsevier Science & Technology Publication Date: 29/04/2002 ISBN-13: 9781558607699  Details: Type: Paperback Format: Books
Availability: To Order. Estimated despatch in 3-5 weeks.  

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.

More books by Peter Wayner

Leave Review

Delivery

Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

The Mathematics of Secrets:...
(Paperback)
Joshua Holden
 
 
£14.99
 
Soft Computing Systems: Second...
(Paperback)
Ivan Zelinka; Roman Senkerik; ...
 
 
£99.99
 
Advances of DNA Computing in...
(Hardback)
Suyel Namasudra; Ganesh Chandra Deka
 
 
£110.00
 
Fundamentals of Digital Forensics:...
(Paperback)
Joakim Kavrestad
 
 
£32.99
 
© W&G Foyle Ltd
Foyles uses cookies to help ensure your experience on our site is the best possible. Click here if you’d like to find out more about the types of cookies we use.
Accept and Close