Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Brief Table of Contents Table of Contents Copyright About the Author Preface Book Notes A Start Chapter 1. Framing Information
1.1. Adding Context
Chapter 2. Encryption
2.1. Pure White 2.2. Encryption and White Noise 2.3. Measuring and Encrypting Information 2.4. Summary
Chapter 3. Error Correction
3.1. Close but No Cigar 3.2. Correcting Errors 3.3. Constructing Error-Correcting Codes 3.4. Summary
Chapter 4. Secret Sharing
4.1. Two out of Three Musketeers 4.2. Splitting Up Secrets 4.3. Building Secret-Sharing Schemes 4.4. Public-Key Secret Sharing 4.5. Steganographic File Systems and Secret Sharing 4.6. Summary
Chapter 5. Compression
5.1. Television Listing 5.2. Patterns and Compression 5.3. Building Compression Algorithms 5.4. Summary
Chapter 6. Basic Mimicry
6.1. Reading between the Lines 6.2. Running in Reverse 6.3. Implementing the Mimicry 6.4. Summary
Chapter 7. Grammars and Mimicry
7.1. Evolution of Everyday Things 7.2. Using Grammar for Mimicry 7.3. Creating Grammar-Based Mimicry 7.4. Summary
Chapter 8. Turing and Reverse
8.1. Doggie's Little Get Along 8.2. Running Backward 8.3. Building a Reversible Machine 8.4. Summary
Chapter 9. Life in the Noise
9.1. Boy-Zs in Noizy, Idaho 9.2. Hiding in the Noise 9.3. Bit Twiddling 9.4. Random Walks and Subsets 9.5. Putting JPEG to Use 9.6. Summary
Chapter 10. Anonymous Remailers
10.1. Dr. Anon to You 10.2. Anonymous Remailers 10.3. Remailer Guts 10.4. Anonymous Networks 10.5. Long term storage 10.6. Publius 10.7. Onion Routing 10.8. Anonymous Auction Protocols 10.9. The Future 10.10. Summary
Chapter 11. Secret Broadcasts
11.1. Table Talk 11.2. Secret Senders 11.3. Creating a DC Net 11.4. Summary
Chapter 12. Keys
12.1. The Key Vision 12.2. Extending Control 12.3. Signing Algorithms 12.4. Public-Key Algorithms 12.5. Zero Knowledge Approaches 12.6. Collusion Control 12.7. Summary
Chapter 13. Ordering and Reordering
13.1. Top 10 Reasons Why Top 10 Lists Fail 13.2. Introduction 13.3. Strength Against Scrambling 13.4. Invariant Forms 13.5. Canonical Forms 13.6. Packing in Multiple Messages 13.7. Sorting to Hide Information 13.8. Word Scrambling 13.9. Adding Extra Packets 13.10. Port Knocking 13.11. Continuous Use and Jamming 13.12. Summary
Chapter 14. Spreading
14.1. A New Job 14.2. Spreading the Information 14.3. Going Digital 14.4. Comparative Blocks 14.5. Fast Fourier Solutions 14.6. The Fast Fourier Transform 14.7. Hiding Information with FFTs and DCTs 14.8. Wavelets 14.9. Modifications 14.10. Summary
Chapter 15. Synthetic Worlds
15.1. Slam Dunks 15.2. Created Worlds 15.3. Text Position Encoding and OCR 15.4. Echo Hiding 15.5. Summary
Chapter 16. Watermarks
16.1. A Patent for Watermarking Humans 16.2. Tagging Digital Documents 16.3. A Basic Watermark 16.4. An Averaging Watermark 16.5. Summary
Chapter 17. Steganalysis
17.1. Code Words 17.2. Finding Hidden Messages 17.3. Typical Approaches 17.4. Visual and Aural Attacks 17.5. Structural Attacks 17.6. Statistical Attacks 17.7. Summary
Chapter 18. Obfuscation
18.1. Regulation 18.2. Code Rearrangement 18.3. Compiling Intelligence 18.4. Real Tools 18.5. Summary
Chapter 19. Synchronization
19.1. Stealing Baseball's Signs 19.2. Getting In Sync 19.3. Extending Other Tools 19.4. Summary
Chapter 20. Translucent Databases
20.1. Missed Connections 20.2. Hiding In Databases 20.3. Using Strong One-Way Functions 20.4. Summary
Chapter 21. Plain Sight
21.1. Laughtracks 21.2. Hiding in the Open 21.3. Other Formats 21.4. Summary
Chapter 22. Coda Appendix A. Software
A.1. Commercial Packages A.2. Open Packages A.3. Steganalysis Software
Appendix Bibliographic Notes Bibliography
Bibliography
Index
A B C D E F G H I J K L M N O P Q R S T U V W X Y
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion