This concise survey of code-breaking or arcane code-writing explains technological applications including encryption, steganography, watermarking, print security, authentication, digital rights management, and covert communication systems. The book includes the mathematical models, computational methods, and source codes from numerous applied areas, providing readers with skills for developing their own "homespun" cryptographical systems and chaotic fields.