Тёмный
No video :(

Lecture 32: Steganography (hidden messages) - Richard Buckland UNSW 

UNSW eLearning
Подписаться 67 тыс.
Просмотров 50 тыс.
50% 1

Extension lecture introducing steganography (hidden messages). Security via obscurity. Hidden messages in book Godel Escher Bach. In film Starship Troopers. In games. In cryptography. In teaching. Digital watermarking. SETI. Are we in a simulation?
Extension lectures are for first year computing students at UNSW. The topics covered are non-examinable, students attend only if they are interested. Richard generally raises more questions than he answers.

Опубликовано:

 

23 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 33   
@Starcraftmazter
@Starcraftmazter 16 лет назад
Finally had time to watch this, since I was MIA during that lecture. Absolutely brilliant!!!
@khadijahalsmiere3718
@khadijahalsmiere3718 4 года назад
Its 2020 and I am watching this, thank you very much
@ingdabit
@ingdabit 3 года назад
AWESOME - Thanks Richard, so lucid, perfectly explained.
@ILiveThereforeIAM
@ILiveThereforeIAM 13 лет назад
Very good job, from one instructor to another. You have class, and the ability to simply complicated subjects. Only one regret, wish I had you as an instructor. :)
@romeo8627
@romeo8627 15 лет назад
Thank you for the info. I had studied "Cryptography and Network Security: Principles and Practice, Second Edition. by William Stallings" in engineering and also went through few chapters of Applied Cryptography. Both of which I had liked a lot. Thank you for the recommendations. I will get "The Codebreakers" first. Have a nice day!
@rogerak80
@rogerak80 14 лет назад
I like how the smiley face game was not only about the finished drawing, but the way it was drew as well.
@BGroothedde
@BGroothedde 10 лет назад
Fascinating lecture, I've been toying with steganography in PureBasic and Assembly in combination with compression and encryption (1-bit or 2-bit per color value and optionally alpha channel). The stories in this lecture are amusing to say the least!
@NicolasTsagarides
@NicolasTsagarides 15 лет назад
I am so jealous of this class... In my school they teach as really ancient stuff (like pascal) I hope we'll learn in a more accelerated way @ uni
@unswelearning
@unswelearning 15 лет назад
Yes Kahn's brilliant book is "The Codebreakers" and is the best book on the history and principles of cryptography I've had the pleasure to read. The Code Book is another popular book on codes but i've not read it, quite a few of my students like it however. A book I can strong recommend is "Decrypted Secrets" by FL Bauer, and of course Applied Cryptography by Bruce Schneier is a brilliant introduction to the field since the second world war.
@hellobye3221
@hellobye3221 3 года назад
Gr8 teacher
@sabriath
@sabriath 14 лет назад
@XxAznDarknezZxX : As I stated, the chances of life in a universe smaller than our own becomes close to 0 (drake's equation works on the expanses of our universe, if moved to something smaller, the equation drops off). Recursion is even less likely due to information entropy. You can take out one of the universe "powers" (dimension, gravity, radiation, etc.) to make it simpler, but those creatures would have to reduce it again, and again (info entropy).
@sabriath
@sabriath 14 лет назад
@XxAznDarknezZxX : the name is simply "simulation", the magnitude he speaks of is one that simulates space-time itself with all the forces of the universe "in a bottle" so-to-speak. There is no _real_ way to do that (because it would take the power and size of the universe to simulate a universe), you can do a miniature one, but the chances of sentience becomes close to nil (as even out universe is pretty small on our own chance). I'm not sure of any books directly
@GirlsSociety2
@GirlsSociety2 11 лет назад
Security via obscurity is interesting, hiding things in plain view!
@filosophy42
@filosophy42 14 лет назад
where Can i find mOre infOrmation on the godeL eScHer bach book? I'm inTrigued
@AnanyaBhardwaj._.
@AnanyaBhardwaj._. 2 месяца назад
Can someone tell the name of the other book he said is very good? Couldn't get it
@mohammedalnaciri3880
@mohammedalnaciri3880 10 лет назад
Thanks sir and you speak vary good
@agentx3
@agentx3 16 лет назад
this has been taking me about 2 hours to finish since i kept pausing
@kkkkkiiiiisssss
@kkkkkiiiiisssss 15 лет назад
Can you please come to london and teach my Forensic course, i've learnt more in this 30mins than i have in a year at my uni, thanks!
@h7opolo
@h7opolo Год назад
21:03 it's called paralanguage
@headstrong440
@headstrong440 15 лет назад
Great Video,i subscribed!
@SaiKumar-cj1ib
@SaiKumar-cj1ib 6 лет назад
What is the difference between watermarking and steganography?
@moussamust9612
@moussamust9612 9 лет назад
Hi , i have a question : i have a picture, in this picture we have a hidden key using steganography LSB, how can i pick up the key
@BDfoxmore
@BDfoxmore 8 лет назад
WHAT IF you use Cryptography inside a Steganography? and the steganographys text is protected from a pass wich is unknown, but it can be seen on the picture itself which is hiding evrything?, and somethink more for example lets say that the way to see the pass remains hiden also on the pic, something like counting down thinks or mesure distance etc. etc. so you have to use logic/maths on the pic. this think becames somethink like a puzzle. but could it be posible to hack the pass? ther are some programs that Encrypt text in pics with pass, is it posible to hack that pass with some way? and if yes! how?
@BDfoxmore
@BDfoxmore 8 лет назад
+rtyuty htyhtyh lots of thems!!! i know. but if you follow my logic you will see how facinatic it is.
@chensam87
@chensam87 15 лет назад
thank you sooooooooooo much
@orion3253
@orion3253 10 лет назад
cool stuff
@auro_da
@auro_da 15 лет назад
Good Video. : )
@romeo8627
@romeo8627 15 лет назад
Shouldn't the book be "The Codebreaker" by David Khan.. And not "The Code Book"..?? I am confused..
@chelle1504
@chelle1504 13 лет назад
does anyone know the date of when this lecture was? I want to reference in in my essay
@_mvr_
@_mvr_ 12 лет назад
Nice guy :D
@CharIie83
@CharIie83 7 лет назад
LOL. And, why use numbers to encrypt when you could just use say, raw information, that when put into a 3D printer, would print a message, that the guy who got, would know was in arabian phonetics, that when pronounced backwards, could be deciphered into numbers. How would anyone know the specific steps necessary? This approach seems alot more safe than providing a key for decrypting
@0day_
@0day_ 13 лет назад
@Orione hahaha me too :D
@Ak7kid
@Ak7kid 15 лет назад
i swear people like this get paid per comment and rating?
Далее
33: Don't give up - Richard Buckland UNSW
1:06:04
Просмотров 15 тыс.
skibidi toilet multiverse 041
06:01
Просмотров 2,8 млн
Advanced JPEG Steganography and Detection by John Ortiz
1:03:28
NCM: Introduction to Steganography
20:03
Просмотров 7 тыс.
Lecture 35: Linked Lists - Richard Buckland UNSW
44:28
Просмотров 133 тыс.
Rust and RAII Memory Management - Computerphile
24:22
Просмотров 224 тыс.
Lecture 14: The Turing Test - Richard Buckland UNSW
37:15
Cracking Enigma in 2021 - Computerphile
21:20
Просмотров 2,5 млн
Noam Chomsky: On Power and Ideology | The New School
1:16:30
Jim Simons (full length interview) - Numberphile
1:00:43
Просмотров 974 тыс.
skibidi toilet multiverse 041
06:01
Просмотров 2,8 млн