1 / 510
文档名称:

Disappearing Cryptography - Information Hiding - Steganography and Watermarking 3rd ed. - P. Wayner (MK, 2009) [eCV] WW.pdf

格式:pdf   页数:510
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Disappearing Cryptography - Information Hiding - Steganography and Watermarking 3rd ed. - P. Wayner (MK, 2009) [eCV] WW.pdf

上传人:kuo08091 2014/9/19 文件大小:0 KB

下载得到文件列表

Disappearing Cryptography - Information Hiding - Steganography and Watermarking 3rd ed. - P. Wayner (MK, 2009) [eCV] WW.pdf

文档介绍

文档介绍:Disappearing Cryptography
Information Hiding:
Steganography & Watermarking
Peter Wayner
Brief Table of Contents
Copyright
About the Author
Preface
Book Notes
A Start
Chapter 1. Framing Information
Chapter 2. Encryption
Chapter 3. Error Correction
Chapter 4. Secret Sharing
Chapter 5. Compression
Chapter 6. Basic Mimicry
Chapter 7. Grammars and Mimicry
Chapter 8. Turing and Reverse
Chapter 9. Life in the Noise
Chapter 10. Anonymous Remailers
Chapter 11. Secret Broadcasts
Chapter 12. Keys
Chapter 13. Ordering and Reordering
Chapter 14. Spreading
Chapter 15. Synthetic Worlds
Chapter 16. Watermarks
Chapter 17. Steganalysis
Chapter 18. Obfuscation
Chapter 19. Synchronization
Chapter 20. Translucent Databases
Chapter 21. Plain Sight
Chapter 22. Coda
Appendix A. Software
Appendix Bibliographic Notes
Bibliography
Table of Contents
Copyright
About the Author
Preface
Book Notes
A Start
Chapter 1. Framing Information
. Reasons for Secrecy
. How It Is Done
. How Steganography Is Used
. Attacks on Steganography
. Adding Context
Chapter 2. Encryption
. Pure White
. Encryption and White Noise
. DES and Modern Ciphers
. Public-Key Encryption
. How Random Is the Noise?
. Measuring and Encrypting Information
. RSA Encryption
. Summary
Further Reading
Chapter 3. Error Correction
. Close but No Cigar
. Correcting Errors
. Error Correction and White Noise
. Error Correction and Secret Sharing
. Constructing Error-Correcting Codes
. Periodic Codes
. Summary
Further Reading
Chapter 4. Secret Sharing
. Two out of Three Musketeers
. Splitting Up Secrets
. Requiring All Parts
. Letting Parts Slide
. A More Efficient Method
. Providing Deniability
. Building Secret-Sharing Schemes
. Making Some More Equal
. Public-Key Secret Sharing