What do you think?
Rate this book
If you want to understand how it works, start with Disappearing Cryptography, Second Edition. Peter Wayner explains each key concept and technique, including several new ones: locking hidden images so they can only be read by an authorized recipient; hiding messages simply by reordering lists (what s really in tonight s Letterman Top Ten?); and new spread spectrum techniques that draw on advanced concepts from wireless communications. He also introduces steganalysis, the science of identifying and compromising files that contain hidden messages. (Fortunately or unfortunately, many current stego algorithms are quite vulnerable.)
The book s code samples -- previously written in Pascal -- have been recast in Java, making them far more accessible (one s even online at Wayner s site, www.wayner.org/texts/mimic/, so you can try it for yourself right now). (Bill Camarda)
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
413 pages, Paperback
First published January 1, 1996