Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Disappearing Cryptography
Information Hiding: Steganography and Watermarking
Taschenbuch von Peter Wayner
Sprache: Englisch

60,20 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 4-7 Werktage

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung
Conventional cryptography (enciphering and deciphering messages) is like shipping a safe in an armored car with a regiment of soldiers around it. Everyone knows that there's something secret inside. This book describes steganography, the science of hiding or disguising information so it can only be found by someone who knows where to look. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide and therefore protect information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers.
Conventional cryptography (enciphering and deciphering messages) is like shipping a safe in an armored car with a regiment of soldiers around it. Everyone knows that there's something secret inside. This book describes steganography, the science of hiding or disguising information so it can only be found by someone who knows where to look. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide and therefore protect information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers.
Über den Autor
Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.
Inhaltsverzeichnis
Chapter 1: Framing InformationChapter 2: EncryptionChapter 3: Error CorrectionChapter 4: Secret SharingChapter 5: CompressionChapter 6: Basic MimicryChapter 7: Grammars and MimicryChapter 8: Turing and ReverseChapter 9: Life in the NoiseChapter 10: Anonymous RemailersChapter 11: Secret BroadcastsChapter 12: KeysChapter 13: Ordering and ReorderingChapter 14: SpreadingChapter 15: Synthetic WorldsChapter 16: WatermarksChapter 17: SteganalysisChapter 18: Fingerprinting and Forensic WatermarkingChapter 19: SynchronizationChapter 20: ObfuscationChapter 21: TranslucencyChapter 22: QuantizationChapter 23: Forensics
Details
Erscheinungsjahr: 2008
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9780123744791
ISBN-10: 0123744792
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Wayner, Peter
Auflage: 3rd edition
Hersteller: Elsevier Science
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 235 x 195 x 25 mm
Von/Mit: Peter Wayner
Erscheinungsdatum: 03.12.2008
Gewicht: 0,783 kg
Artikel-ID: 132586608
Über den Autor
Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.
Inhaltsverzeichnis
Chapter 1: Framing InformationChapter 2: EncryptionChapter 3: Error CorrectionChapter 4: Secret SharingChapter 5: CompressionChapter 6: Basic MimicryChapter 7: Grammars and MimicryChapter 8: Turing and ReverseChapter 9: Life in the NoiseChapter 10: Anonymous RemailersChapter 11: Secret BroadcastsChapter 12: KeysChapter 13: Ordering and ReorderingChapter 14: SpreadingChapter 15: Synthetic WorldsChapter 16: WatermarksChapter 17: SteganalysisChapter 18: Fingerprinting and Forensic WatermarkingChapter 19: SynchronizationChapter 20: ObfuscationChapter 21: TranslucencyChapter 22: QuantizationChapter 23: Forensics
Details
Erscheinungsjahr: 2008
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
ISBN-13: 9780123744791
ISBN-10: 0123744792
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Wayner, Peter
Auflage: 3rd edition
Hersteller: Elsevier Science
Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de
Maße: 235 x 195 x 25 mm
Von/Mit: Peter Wayner
Erscheinungsdatum: 03.12.2008
Gewicht: 0,783 kg
Artikel-ID: 132586608
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte