文档介绍:Disappearing Cryptography
Information Hiding:
Steganography & Watermarking
Peter Wayner
Brief Table of Contents
Copyright
About the Author
Preface
Book Notes
A Start
Chapter 1. Framing Information
Chapter 2. Encryption
Chapter 3. Error Correction
Chapter 4. Secret Sharing
Chapter 5. Compression
Chapter 6. Basic Mimicry
Chapter 7. Grammars and Mimicry
Chapter 8. Turing and Reverse
Chapter 9. Life in the Noise
Chapter 10. Anonymous Remailers
Chapter 11. Secret Broadcasts
Chapter 12. Keys
Chapter 13. Ordering and Reordering
Chapter 14. Spreading
Chapter 15. Synthetic Worlds
Chapter 16. Watermarks
Chapter 17. Steganalysis
Chapter 18. Obfuscation
Chapter 19. Synchronization
Chapter 20. Translucent Databases
Chapter 21. Plain Sight
Chapter 22. Coda
Appendix A. Software
Appendix Bibliographic Notes
Bibliography
Table of Contents
Copyright
About the Author
Preface
Book Notes
A Start
Chapter 1. Framing Information
. Reasons for Secrecy
. How It Is Done
. How Steganography Is Used
. Attacks on Steganography
. Adding Context
Chapter 2. Encryption
. Pure White
. Encryption and White Noise
. DES and Modern Ciphers
. Public-Key Encryption
. How Random Is the Noise?
. Measuring and Encrypting Information
. RSA Encryption
. Summary
Further Reading
Chapter 3. Error Correction
. Close but No Cigar
. Correcting Errors
. Error Correction and White Noise
. Error Correction and Secret Sharing
. Constructing Error-Correcting Codes
. Periodic Codes
. Summary
Further Reading
Chapter 4. Secret Sharing
. Two out of Three Musketeers
. Splitting Up Secrets
. Requiring All Parts
. Letting Parts Slide
. A More Efficient Method
. Providing Deniability
. Building Secret-Sharing Schemes
. Making Some More Equal
. Public-Key Secret Sharing