Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Brief Table of Contents
Table of Contents
Copyright
About the Author
Preface
Book Notes
A Start
Chapter 1. Framing Information
1.1. Adding Context
Chapter 2. Encryption
2.1. Pure White
2.2. Encryption and White Noise
2.3. Measuring and Encrypting Information
2.4. Summary
Chapter 3. Error Correction
3.1. Close but No Cigar
3.2. Correcting Errors
3.3. Constructing Error-Correcting Codes
3.4. Summary
Chapter 4. Secret Sharing
4.1. Two out of Three Musketeers
4.2. Splitting Up Secrets
4.3. Building Secret-Sharing Schemes
4.4. Public-Key Secret Sharing
4.5. Steganographic File Systems and Secret Sharing
4.6. Summary
Chapter 5. Compression
5.1. Television Listing
5.2. Patterns and Compression
5.3. Building Compression Algorithms
5.4. Summary
Chapter 6. Basic Mimicry
6.1. Reading between the Lines
6.2. Running in Reverse
6.3. Implementing the Mimicry
6.4. Summary
Chapter 7. Grammars and Mimicry
7.1. Evolution of Everyday Things
7.2. Using Grammar for Mimicry
7.3. Creating Grammar-Based Mimicry
7.4. Summary
Chapter 8. Turing and Reverse
8.1. Doggie's Little Get Along
8.2. Running Backward
8.3. Building a Reversible Machine
8.4. Summary
Chapter 9. Life in the Noise
9.1. Boy-Zs in Noizy, Idaho
9.2. Hiding in the Noise
9.3. Bit Twiddling
9.4. Random Walks and Subsets
9.5. Putting JPEG to Use
9.6. Summary
Chapter 10. Anonymous Remailers
10.1. Dr. Anon to You
10.2. Anonymous Remailers
10.3. Remailer Guts
10.4. Anonymous Networks
10.5. Long term storage
10.6. Publius
10.7. Onion Routing
10.8. Anonymous Auction Protocols
10.9. The Future
10.10. Summary
Chapter 11. Secret Broadcasts
11.1. Table Talk
11.2. Secret Senders
11.3. Creating a DC Net
11.4. Summary
Chapter 12. Keys
12.1. The Key Vision
12.2. Extending Control
12.3. Signing Algorithms
12.4. Public-Key Algorithms
12.5. Zero Knowledge Approaches
12.6. Collusion Control
12.7. Summary
Chapter 13. Ordering and Reordering
13.1. Top 10 Reasons Why Top 10 Lists Fail
13.2. Introduction
13.3. Strength Against Scrambling
13.4. Invariant Forms
13.5. Canonical Forms
13.6. Packing in Multiple Messages
13.7. Sorting to Hide Information
13.8. Word Scrambling
13.9. Adding Extra Packets
13.10. Port Knocking
13.11. Continuous Use and Jamming
13.12. Summary
Chapter 14. Spreading
14.1. A New Job
14.2. Spreading the Information
14.3. Going Digital
14.4. Comparative Blocks
14.5. Fast Fourier Solutions
14.6. The Fast Fourier Transform
14.7. Hiding Information with FFTs and DCTs
14.8. Wavelets
14.9. Modifications
14.10. Summary
Chapter 15. Synthetic Worlds
15.1. Slam Dunks
15.2. Created Worlds
15.3. Text Position Encoding and OCR
15.4. Echo Hiding
15.5. Summary
Chapter 16. Watermarks
16.1. A Patent for Watermarking Humans
16.2. Tagging Digital Documents
16.3. A Basic Watermark
16.4. An Averaging Watermark
16.5. Summary
Chapter 17. Steganalysis
17.1. Code Words
17.2. Finding Hidden Messages
17.3. Typical Approaches
17.4. Visual and Aural Attacks
17.5. Structural Attacks
17.6. Statistical Attacks
17.7. Summary
Chapter 18. Obfuscation
18.1. Regulation
18.2. Code Rearrangement
18.3. Compiling Intelligence
18.4. Real Tools
18.5. Summary
Chapter 19. Synchronization
19.1. Stealing Baseball's Signs
19.2. Getting In Sync
19.3. Extending Other Tools
19.4. Summary
Chapter 20. Translucent Databases
20.1. Missed Connections
20.2. Hiding In Databases
20.3. Using Strong One-Way Functions
20.4. Summary
Chapter 21. Plain Sight
21.1. Laughtracks
21.2. Hiding in the Open
21.3. Other Formats
21.4. Summary
Chapter 22. Coda
Appendix A. Software
A.1. Commercial Packages
A.2. Open Packages
A.3. Steganalysis Software
Appendix Bibliographic Notes
Bibliography
Bibliography
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
← Prev
Back
Next →
← Prev
Back
Next →