Sign in to turn on 1-Click ordering.
Trade in Yours
For a 0.25 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Tell the Publisher!
Id like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Disappearing Cryptography: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) [Paperback]

Peter Wayner

RRP: 41.99
Price: 38.67 & FREE Delivery in the UK. Details
You Save: 3.32 (8%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Wednesday, 23 April? Choose Express delivery at checkout. Details
Trade In this Item for up to 0.25
Trade in Disappearing Cryptography: Information Hiding: Steganography & Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) for an Amazon.co.uk gift card of up to 0.25, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

9 May 2002 1558607692 978-1558607699 2
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all.

This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data incomprehensible; steganography, embedding information into video, audio, or graphics files; watermarking, hiding data in the noise of image or sound files; mimicry, "dressing up" data and making it appear to be other data, and more. The second edition also includes an expanded discussion on hiding information with spread-spectrum algorithms, shuffling tricks, and synthetic worlds. Each chapter is divided into sections, first providing an introduction and high-level summary for those who want to understand the concepts without wading through technical explanations, and then presenting greater detail for those who want to write their own programs. To encourage exploration, the author's Web site www.wayner.org/books/discrypt2/ contains implementations for hiding information in lists, sentences, and images.

Each chapter is divided into sections, providing first an introduction and high-level summary for those who want to understand the concepts without wading through technical details, and then an introductory set of details, for those who want to write their own programs. Fully revised and expanded. Covers key concepts for non-technical readers. Goes into technical details for those wanting to create their own programs and implement algorithms. Up-to-date website containing the code samples from the book.

Customers Who Viewed This Item Also Viewed

Product details

More About the Author

Discover books, learn about writers, and more.

Product Description


"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for those who would like to begin learning about information hiding."
-Deepa Kundur, University of Toronto

About the Author

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.

Inside This Book (Learn More)
First Sentence
On its face, information in computers seems perfectly defined and certain. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  6 reviews
13 of 15 people found the following review helpful
5.0 out of 5 stars Accessible introduction to a fascinating topic 12 Aug 2006
By calvinnme - Published on Amazon.com
Format:Paperback|Verified Purchase
This is a very easy read that does not really assume much about the reader other than mathematical maturity at the precalculus level, knowledge of programming in a higher level language, and a curiosity about hiding information in such things as images. In fact, I bought this book to get a grasp on how to hide a watermark in an image. The early chapters are devoted to material that forms the basic toolkit for steganography - private key encryption, secret sharing, and error correcting codes. The later chapters describe how to apply these techniques in various ways to hide information.

Chapter 5 discusses common data compression algorithms, not to the point that you could write an encoder/decoder system, but so that you know which allow perfect reconstruction and which do not. Compression leads to the topic of mimicry, which is the subject of chapter 6. Basic mimicry produces text that looks statistically similar to the original text but is far from perfect. Chapter 7 shows methods of improving mimicry techniques so that the mimicked text not only passes statistical tests for similarity to the original, but passes rules for grammar. This leads to the concept of context free grammars and their role in mimicry. Thus, you can hide data in realistic sounding text.

Chapter 8 concentrates on a robust and complete model known as the Turing machine. Such a machine hides data as it "runs forward", while running the machine in reverse allows the hidden data to be recovered. Certain proofs show that this is a stronger data hiding model than those previously discussed.

Chapter nine discusses a more image-processing related data hiding topic - hiding in the noise. What appears as noise to the untrained eye can actually be a message. Of course, the flip side of this is "real" noise has the power to obscure the hidden message.

Chapter 10 discusses anonymous remailers, which is the deletion of the name of the originator of a message by an intermediate node. Such systems can range from very secure to very insecure depending on strategies involved. Chapter 11,"Secret Broadcasts", is a companion chapter on how to broadcast a message so that everyone can read it but nobody knows the source. The solution lies in the "Dining Cryptographers" algorithm, and this solution is discussed at length.

Chapter 12, "Keys", discusses message keys as extensions to the concept of keys in basic cryptography, which was discussed earlier in the book. Adding keys to any algorithm discussed up to this point makes that algorithm stronger. Chapter 13, "Ordering and Reordering", discusses how steganography strategies might be disrupted by reordering parts of a message, and discusses methods that might prevent this from being a problem.

Chapter 14, "Spreading", is a more mathematical chapter than the preceding ones and takes a different approach to the problem of information hiding. It takes ideas from spread spectrum radio and applies them to steganography. This is the one chapter where a knowledge of calculus, Fourier transforms, and even wavelets will be helpful.

The last three chapters, "Synthetic Worlds", "Watermarks", and "Steganalysis" are short and more subjective than previous ones, mainly giving the reader a broad overview of these topics.

The book has a wealth of algorithms, equations, and simple examples. There is even a very basic Java mimicry program in the appendix. However, this is not a programming book full of ready to implement solutions - you will have to do that yourself. There are numerous references to web addresses where you can find both executable and source code for implementing some of the algorithms mentioned in this book. I would say if you are interested in hiding information in data of any kind - text, sound, imagery, etc. - then this book is essential reading. I highly recommend it.
11 of 13 people found the following review helpful
5.0 out of 5 stars A broad introduction to an important topic 13 May 2002
By A Customer - Published on Amazon.com
This book is filled with mathematical magic tricks that teach you how to disguise information and make it look like something else. The tricks in this book are simple and provide a good understanding about why even numbers aren't what they seem to be. This is the broadest description of steganography and watermarking around.
6 of 8 people found the following review helpful
5.0 out of 5 stars You know you are a crypto geek when.... 30 Sep 2002
By A Customer - Published on Amazon.com
This book is a great introduction to learning how to hide data in places most people wouldn't think about looking. Sample code and various URL's are provided for places to start, this not the easiest subject to grasp, but the book helps put it at a manageable level.
A great place to start!...
9 of 13 people found the following review helpful
5.0 out of 5 stars Excelent book 12 Feb 2003
By SALVADOR SOSA - Published on Amazon.com
I read the entire book from first to last page and enjoyed the content absolutely. The book has theory and practice, clear examples and many references to free and open source software to make tests. The math part has razonable level (not too much, not to little). I have no found anything better in the area.
Good for Peter Wayner!
P.D. ...
10 of 15 people found the following review helpful
5.0 out of 5 stars One year after purchase, I keep opening this book 18 Aug 2003
By Kilgore Gagarin - Published on Amazon.com
Format:Paperback|Verified Purchase
All in all just a fascinating book on a fascinating topic. In general, the introductory parts of each chapter are accessible to anyone with a standard 12 year education. The mathematics are best understood by people with a background in algebra and statistics at the American High School level, but not much more. If you buy this book, expect John Ashcroft to put your name on a list of people buying dangerous published works (and with the Patriot Act in place, I am neither paranoid nor joking). The best chapter is the one about encoding information in ordered lists. This book taught me how to include a one line hidden message in a 50 item list of my favorite Country and Western Songs of all time (and THAT is a cool thing to do).
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category