Author: Peter Wayner
Edition: 2
Binding: Paperback
ISBN: 1558607692
Publisher: Morgan Kaufmann
Features:
Edition: 2
Binding: Paperback
ISBN: 1558607692
Publisher: Morgan Kaufmann
Features:
Disappearing Cryptography, Second Edition: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. Search and download computer ebooks Disappearing Cryptography, Second Edition: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) for free.
Click Here to Visit our eBay Store! This book is in Good Condition: This book has very minimal damage to the cover (no holes or tears, only minimal scuff marks), minimal wear to binding, majority of pages undamaged (minimal creases or tears), minimal pencil underlining of text, no highlighting of text, no writing in margins, no missing pages. Item Notes (If any): Checkout is provided by the eBay Shopping cart. Payment options include PayPal and credit card. Your purchase is tax free. Please ref. Download Disappearing Cryptography, Second Edition: Information Hiding computer ebooks
When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files;
Disappearing Cryptography, Second Edition: Information Hiding: Steganography & Watermarking (the Morgan Kaufmann Series in Software Engineering and Programming)
Categories: Cryptography, Computer networks->Security measures. Contributors: Peter Wayner - Author. Format: Paperback
Categories: Cryptography, Computer networks->Security measures. Contributors: Peter Wayner - Author. Format: Paperback
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible;
This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible;
Disappearing Cryptography, Second Edition: Information Hiding Free
These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files;