Disappearing Cryptography : Information Hiding: Steganography & Watermarking (2 SUB)

Disappearing Cryptography : Information Hiding: Steganography & Watermarking (2 SUB)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 413 p.
  • 言語 ENG,ENG
  • 商品コード 9781558607699
  • DDC分類 005.82

Full Description


"Disappearing Cryptography, Second Edition" describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds.Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site contains implementations for hiding information in lists, sentences, and images. Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded, this book covers key concepts for non-technical readers. It goes into technical details for those wanting to create their own programs and implement algorithms. It features an up-to-date website containing the code samples from the book.

Table of Contents

Preface                                            xiii
Framing Information 1 (14)
Introduction 1 (2)
Reasons for Secrecy 3 (2)
How It Is Done 5 (2)
How Steganography Is Used 7 (2)
Attacks on Steganography 9 (4)
Adding Context 13 (2)
Encryption 15 (18)
Pure White 15 (1)
Encryption and White Noise 16 (11)
DES and Modern Ciphers 20 (4)
Public-Key Encryption 24 (2)
How Random Is the Noise? 26 (1)
Measuring Information and Encrypting It 27 (4)
Entropy 28 (1)
RSA Encryption 29 (2)
Summary 31 (2)
Error Correction 33 (16)
Close but No Cigar 33 (1)
Correcting Errors 33 (9)
Error Correction and White Noise 40 (1)
Error Correction and Secret Sharing 41 (1)
Constructing Error-Correcting Codes 42 (5)
Periodic Codes 45 (2)
Summary 47 (2)
Secret Sharing 49 (18)
Two out of Three Musketeers 49 (1)
Splitting Up Secrets 50 (7)
Requiring All Parts 51 (2)
Letting Parts Slide 53 (2)
A More Efficient Method 55 (1)
Providing Deniability 56 (1)
Building Secret-Sharing Schemes 57 (3)
Making Some More Equal 59 (1)
Public-Key Secret Sharing 60 (1)
Steganographic File Systems and Secret 61 (4)
Sharing
Summary 65 (2)
Compression 67 (14)
Television Listing 67 (1)
Patterns and Compression 68 (6)
Huffman Coding 71 (3)
Building Compression Algorithms 74 (6)
Huffman Compression 74 (2)
Dictionary Compression 76 (2)
JPEG Compression 78 (1)
GZSteg 79 (1)
Summary 80 (1)
Basic Mimicry 81 (16)
Reading between the Lines 81 (1)
Running in Reverse 82 (7)
Choosing the Next Letter 87 (2)
Implementing the Mimicry 89 (5)
Goosing with Extra Data 91 (2)
Regular Mimicry and Images 93 (1)
Summary 94 (3)
Grammars and Mimicry 97 (32)
Evolution of Everyday Things 97 (2)
Using Grammar for Mimicry 99 (8)
Parsing and Going Back 103 (2)
How Good Is It? 105 (2)
Creating Grammar-Based Mimicry 107 (19)
Parsing the Output 109 (2)
Suggestions for Building Grammars 111 (1)
Scrambled Grammars 112 (10)
Assessing the Theoretical Security of 122 (3)
Mimicry
Efficient Mimicry-Based Codes 125 (1)
Summary 126 (3)
Turing and Reverse 129 (20)
Doggie's Little Get Along 129 (1)
Running Backward 130 (9)
Reversing Gears 134 (5)
Building a Reversible Machine 139 (8)
Reversible Turing Machines 140 (1)
Reversible Grammar Generators 141 (4)
The Reversible Grammar Machine 145 (2)
Summary 147 (2)
Life in the Noise 149 (34)
Boy-Zs in Noizy, Idaho 149 (2)
Hiding in the Noise 151 (10)
Problems with the Noise 153 (1)
Good Noise? 153 (2)
Independence Problems 155 (2)
File Format Grief 157 (3)
Deniability 160 (1)
Bit Twiddling 161 (21)
Hide and Seek 162 (3)
EzStego 165 (2)
S-Tools 167 (3)
S-Tools and Sound Files 170 (1)
S-Tools and Empty Disk Space 170 (3)
Random Walks 173 (2)
Putting JPEG to Use 175 (2)
Hiding Information in JPEG Files 177 (1)
Outguess 178 (1)
F4 and F5 179 (3)
Summary 182 (1)
Anonymous Remailers 183 (22)
Dr. Anon to You 183 (2)
Anonymous Remailers 185 (6)
Enhancements 187 (1)
Using Remailers 188 (1)
Using Private Idaho 189 (1)
Web Remailers 190 (1)
Remailer Guts 191 (7)
Other Remailer Packages 195 (1)
Splitting Paths 196 (2)
Anonymous Networks 198 (5)
Freedom Network 199 (1)
PipeNet 200 (1)
Crowds 200 (1)
Freenet 201 (2)
OceanStore 203 (1)
The Future 203 (1)
Summary 204 (1)
Secret Broadcasts 205 (10)
Table Talk 205 (1)
Secret Senders 206 (4)
Creating a DC Net 210 (3)
Cheating DC Nets 212 (1)
Summary 213 (2)
Keys 215 (20)
The Key Vision 215 (1)
Extending Control 216 (2)
Signing Algorithms 218 (2)
Public-Key Algorithms 220 (6)
Constraining Hard Problems 220 (3)
Using Matrix Multiplication 223 (2)
Removing Parts 225 (1)
Zero-Knowledge Approaches 226 (6)
Discrete Logs for Proofs 230 (2)
Collusion Control 232 (1)
Summary 233 (2)
Ordering and Recording 235 (12)
Top 10 Reasons Why Top 10 Lists Fail 235 (1)
Introduction 236 (1)
Strength against Scrambling 237 (2)
Invariant Forms 239 (1)
Canonical Forms 240 (1)
Packing in Multiple Messages 241 (1)
Sorting to Hide Information 241 (3)
Adding Extra Packets 244 (1)
Summary 245 (2)
Spreading 247 (34)
A New Job 247 (2)
Spreading the Information 249 (3)
Going Digital 252 (8)
An Example 254 (3)
Synchronization 257 (1)
Strengthening the System 258 (1)
Packing Multiple Messages 259 (1)
Comparative Blocks 260 (2)
Minimizing Quantization Errors 261 (1)
Fast Fourier Solutions 262 (3)
Some Brief Calculus 264 (1)
The Fast Fourier Transform 265 (5)
Hiding Information with FFTs and DCTs 270 (5)
Tweaking a Number of Coefficients 271 (3)
Removing the Original from the Detection 274 (1)
Process
Tempering the Wake 275 (1)
Wavelets 275 (3)
Modifications 278 (2)
Identifying the Best Areas 278 (1)
Quantize the Coefficients to Hide 278 (1)
Information
Hide the Information in the Phase 279 (1)
Summary 280 (1)
Synthetic Worlds 281 (10)
Slam Dunks 281 (1)
Created Worlds 282 (2)
Text Position Encoding and OCR 284 (3)
Positioning 285 (2)
MandelSteg and Secrets 287 (1)
Echo Hiding 287 (2)
Summary 289 (2)
Watermarks 291 (12)
A Patent for Watermarking Humans 291 (1)
Embedding Ownerships Information 292 (5)
Fragility 294 (1)
Continuity 294 (1)
Watermark Size 295 (1)
Blind Detection 295 (1)
Resistance to Multiple Watermarks 295 (1)
Accuracy 296 (1)
Fidelity 296 (1)
Resistance to Framing 297 (1)
Keying 297 (1)
A Basic Watermark 297 (3)
Choosing the Coefficients 299 (1)
An Averaging Watermark 300 (2)
Effects of Distortion 301 (1)
Summary 302 (1)
Steganalysis 303 (12)
Code Words 303 (1)
Finding Hidden Messages 303 (2)
Typical Approaches 305 (1)
Visual Attacks 306 (3)
Aural Attacks 309 (1)
Structural Attacks 309 (2)
Statistical Attacks 311 (3)
Sophisticated Statistics 313 (1)
Summary 314 (1)
Afterword 315 (4)
Appendix A Java Mimic Code 319 (34)
Appendix B Baseball CFG 353 (14)
Appendix C Reversible Grammar Generator 367 (12)
Appendix D Software 379 (4)
Further Readings 383 (4)
Bibliography 387 (14)
Index 401