“…a very good book, giving cogent, lucid explanations…” (Technology & Society, 30 September 2003)
“…a good introduction to an emergent technology…” (ContentPeople, 19 September 2003)
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted messages in ordinary–looking data files, making the very existence of the messages practically undetectable. Although steganography is not a new field and has played a critical part in secret communication throughout history, few people understand exactly how it works today. This detailed, practical guide changes thatwhether your goal is to add an extra level of security to business or government communications or to detect and counter steganography when its used by criminals or terrorists.
By teaching you how to protect your vital data and detect information attacks against networks, Cole aims to expose security threats so you can take action to minimize the damage going forward. He explores such topics as:
The CD–ROM includes not only valuable original source code for steganography techniques discussed in the book, but also several popular steganography tools, and color versions of original and manipulated images from the book for you to compare.