recommend book⇒Disappearing Cryptography, third edition: Information Hiding: Steganography & Watermarking | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
by | Peter Wayner | 978-0-12-374479-1 | paperback | |||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
publisher | Morgan Kaufmann | 978-0-08-092270-6 | eBook | |||||||||||||||||||||||||||||||||||||||||||||||||||||
published | 2008-12-17 | 978-0-08-092270-6 | WebBook | |||||||||||||||||||||||||||||||||||||||||||||||||||||
B002ZJSUYM | kindle | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
How to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Greyed out stores probably do not have the item in stock. Try looking for it with a bookfinder. |
This page is posted |
http://mindprod.com/jgloss/watermark.html | |
Optional Replicator mirror
|
J:\mindprod\jgloss\watermark.html | |
Please read the feedback from other visitors,
or send your own feedback about the site. Contact Roedy. Please feel free to link to this page without explicit permission. | ||
Canadian
Mind
Products
IP:[65.110.21.43] Your face IP:[3.135.218.90] |
| |
Feedback |
You are visitor number | |