Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
|
Buy Now
Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition)
Loot Price: R1,426
Discovery Miles 14 260
|
|
Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition)
Series: The Morgan Kaufmann Series in Software Engineering and Programming
Expected to ship within 12 - 17 working days
|
Cryptology is the practice of hiding digital information by means
of various obfuscatory and steganographic techniques. The
application of said techniques facilitates message confidentiality
and sender/receiver identity authentication, and helps to ensure
the integrity and security of computer passwords, ATM card
information, digital signatures, DVD and HDDVD content, and
electronic commerce. Cryptography is also central to digital rights
management (DRM), a group of techniques for technologically
controlling the use of copyrighted material that is being widely
implemented and deployed at the behest of corporations that own and
create revenue from the hundreds of thousands of mini-transactions
that take place daily on programs like iTunes.
This new edition of our best-selling book on cryptography and
information hiding delineates a number of different methods to hide
information in all types of digital media files. These methods
include encryption, compression, data embedding and watermarking,
data mimicry, and scrambling. During the last 5 years, the
continued advancement and exponential increase of computer
processing power have enhanced the efficacy and scope of electronic
espionage and content appropriation. Therefore, this edition has
amended and expanded outdated sections in accordance with new
dangers, and includes 5 completely new chapters that introduce
newer more sophisticated and refined cryptographic algorithms and
techniques (such as fingerprinting, synchronization, and
quantization) capable of withstanding the evolved forms of attack.
Each chapter is divided into sections, first providing an
introduction and high-level summary for those who wish to
understand theconcepts without wading through technical
explanations, and then presenting concrete examples and greater
detail for those who want to write their own programs. This
combination of practicality and theory allows programmers and
system designers to not only implement tried and true encryption
procedures, but also consider probable future developments in their
designs, thus fulfilling the need for preemptive caution that is
becoming ever more explicit as the transference of digital media
escalates.
* Includes 5 completely new chapters that delineate the most
current and sophisticated cryptographic algorithms, allowing
readers to protect their information against even the most evolved
electronic attacks.
* Conceptual tutelage in conjunction with detailed mathematical
directives allows the reader to not only understand encryption
procedures, but also to write programs which anticipate future
security developments in their design.
* Grants the reader access to online source code which can be used
to directly implement proven cryptographic procedures such as data
mimicry and reversible grammar generation into their own work.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.