Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features a Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.... 317, 354, 356, 369a376 2D, 373-376 correlation of pixels, 283, 297, 342 of video frames, 342 cover (in steganography), 245, 247, 250, 412, 431 as noise, 248 escrow, 248 CPT (data hiding in binary image), 329a332 CRC (cyclic redundancy code), x, ... 301a304, 309, 319, 342 discrete logarithm problem, 218 discrete wavelet transform (DWT), 314a317 discriminant of a polynomial, 222 distribution ofanbsp;...
|Title||:||Data Privacy and Security|
|Publisher||:||Springer Science & Business Media - 2012-12-06|