£45.19

Morgan Kaufmann Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)

Illustrated

Price data last checked 10 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 81 days • 81 data points (No recent data available)

Historical
Generating forecast...
£45.29 £44.96 £45.03 £45.10 £45.18 £45.25 £45.32 24 January 2026 13 February 2026 05 March 2026 25 March 2026 14 April 2026

Price Distribution

Price distribution over 81 days • 1 price levels

Days at Price
81 days 0 20 41 61 81 £45 Days at Price

Price Analysis

Most common price: £45 (81 days, 100.0%)

Price range: £45 - £45

Price levels: 1 different prices over 81 days

Description

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design

Key Features

New

Mint Condition

Dispatch same day for order received before 12 noon

Guaranteed packaging

No quibbles returns

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
27 January 2009
Listed Since
18 July 2008

Barcode

No barcode data available

Similar Products You Might Like

Partially Homomorphic Encryption
98% match

Partially Homomorphic Encryption

Springer

£97.13 13 Apr 2026
Applied Cryptography: Protocols, Algorithms and Source Code in C
98% match

Applied Cryptography: Protocols, Algorithms and Source Code in C

Wiley

£39.37 13 Apr 2026
Practical Cryptography: Algorithms and Implementations Using C++
98% match

Practical Cryptography: Algorithms and Implementations Using C++

CRC Press

£58.99 05 Apr 2026
Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May ... 921 (Lecture Notes in Computer Science, 921)
98% match

Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May ... 921 (Lecture Notes in Computer Science, 921)

Springer

£44.91 18 Apr 2026
Sicherheit für Videodaten (Multimedia-Engineering)
98% match

Sicherheit für Videodaten (Multimedia-Engineering)

Vieweg+Teubner Verlag

£45.60 14 Apr 2026
Protecting Privacy through Homomorphic Encryption
98% match

Protecting Privacy through Homomorphic Encryption

Springer

£85.74 17 Apr 2026
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
98% match

Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation

Springer

£91.15 04 Apr 2026
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: 3156 (Lecture Notes in Computer Science, 3156)
98% match

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: 3156 (Lecture Notes in Computer Science, 3156)

Springer

£44.79 14 Apr 2026
Physical and Data-Link Security Techniques for Future Communication Systems: 358 (Lecture Notes in Electrical Engineering, 358)
98% match

Physical and Data-Link Security Techniques for Future Communication Systems: 358 (Lecture Notes in Electrical Engineering, 358)

Springer

£107.61 15 Apr 2026
Physical-Layer Security and Quantum Key Distribution
98% match

Physical-Layer Security and Quantum Key Distribution

Springer

£49.20 05 Apr 2026
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, ... (Lecture Notes in Computer Science, 14081)
98% match

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, ... (Lecture Notes in Computer Science, 14081)

Springer

£92.35 18 Apr 2026
Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, ... (Lecture Notes in Computer Science, 12827)
98% match

Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, ... (Lecture Notes in Computer Science, 12827)

Springer

£91.60 10 Apr 2026
A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy (Material Readings in Early Modern Culture)
98% match

A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy (Material Readings in Early Modern Culture)

Routledge

£117.50 09 Apr 2026
Protocols for Authentication and Key Establishment (Information Security and Cryptography)
98% match

Protocols for Authentication and Key Establishment (Information Security and Cryptography)

Springer

£86.38 05 Apr 2026
Multimedia Security Handbook: 04 (Internet and Communications)
98% match

Multimedia Security Handbook: 04 (Internet and Communications)

CRC Press

£57.03 02 Apr 2026
Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe
98% match

Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe

Springer

£48.85 15 Apr 2026
Codes, Cryptology and Curves with Computer Algebra
98% match

Codes, Cryptology and Curves with Computer Algebra

Cambridge University Press

£44.40 31 Mar 2026
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
98% match

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

Springer

£39.90 20 Apr 2026
Developing and Securing the Cloud
98% match

Developing and Securing the Cloud

CRC Press

£59.27 10 Apr 2026
Data-driven Block Ciphers for Fast Telecommunication Systems
98% match

Data-driven Block Ciphers for Fast Telecommunication Systems

CRC Press

£67.34 14 Apr 2026
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
98% match

Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)

Springer

£107.73 12 Apr 2026
Cryptographic Security Architecture: Design and Verification
98% match

Cryptographic Security Architecture: Design and Verification

Springer

£82.38 04 Apr 2026
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
98% match

Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)

CRC Press

£40.48 30 Mar 2026
System-on-Chip Architectures and Implementations for Private-Key Data Encryption
98% match

System-on-Chip Architectures and Implementations for Private-Key Data Encryption

Springer

£76.14 05 Apr 2026