logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Disappearing Cryptography Information Hiding Steganography Watermarking Peter Wayner Auth

  • SKU: BELL-4342036
Disappearing Cryptography Information Hiding Steganography Watermarking Peter Wayner Auth
$ 31.00 $ 45.00 (-31%)

5.0

28 reviews

Disappearing Cryptography Information Hiding Steganography Watermarking Peter Wayner Auth instant download after payment.

Publisher: MK/Morgan Kaufmann Publishers
File Extension: PDF
File size: 6.19 MB
Pages: 419
Author: Peter Wayner (Auth.)
ISBN: 9781558607699, 1558607692
Language: English
Year: 2002

Product desciption

Disappearing Cryptography Information Hiding Steganography Watermarking Peter Wayner Auth by Peter Wayner (auth.) 9781558607699, 1558607692 instant download after payment.

  • "Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for those who would like to begin learning about information hiding." ¿Deepa Kundur, University of Toronto

Content:
Preface, Pages xiii-xvii
Chapter one - Framing Information, Pages 1-14
Chapter two - Encryption, Pages 15-32
Chapter three - Error Correction, Pages 33-48
Chapter four - Secret Sharing, Pages 49-65
Chapter five - Compression, Pages 67-80
Chapter six - Basic Mimicry, Pages 81-95
Chapter seven - Grammars and Mimicry, Pages 97-128
Chapter eight - Turing and Reverse, Pages 129-148
Chapter nine - Life in the Noise, Pages 149-182
Chapter ten - Anonymous Remailers, Pages 183-204
Chapter eleven - Secret Broadcasts, Pages 205-213
Chapter twelve - Keys, Pages 215-233
Chapter thirteen - Ordering and Reordering, Pages 235-246
Chapter fourteen - Spreading, Pages 247-280
Chapter fifteen - Synthetic Worlds, Pages 281-289
Chapter sixteen - Watermarks, Pages 291-302
Chapter seventeen - Steganalysis, Pages 303-314
Afterword, Pages 315-318
appendix A - Java mimic code, Pages 319-352
appendix B - Baseball CFG, Pages 353-366
appendix C - Reversible grammar generator, Pages 367-377
appendix D - Software, Pages 379-382
Further Readings, Pages 383-385
Bibliography, Pages 387-400
Index, Pages 401-412
About the author, Page 413
Color Plates, Pages I-VIII

Related Products