The Book Cipher

This is an old and basic cipher.

John Doe has a copy of a book. The first number is a page, the second number is a line on the page, third number is the word inside that line. (though it can also be just Page & Word, if you want to make it easy). Richard Roe has an exact copy which he can use to decipher the code.

Big and well-known books make better sources as you have more words to choose from (thus The Bible is often the source), and no one will react if you're walking around with a pocket version of "The Da Vinci Code". If you're walking around with an Older Than Radio edition of a book, however... people will get suspicious (especially the detective who's after you).

Ottendorf Cipher is the one with Page, Word and Letter.

Alternate Reality Game

 * In Lost: Mystery of the Island, a series of four jigsaw puzzles released in 2007, Ottendorf cipher was used on each puzzle's box to hide spoilers and reveal information about the show to the fans.

Anime and Manga

 * In Naruto, Jiraiya uses a book cipher referring to his own novels to convey information about Pain.

Comic Books

 * A Detective Comics story "And the Executioner Wore Stiletto Heels" involved the villain, Stiletto, using an obscure book about shoes for a cipher (the villain chose this book as a pun on his name--think "stiletto heels"). When Batman goes to the bookstore, the owner mentions how strange it is that he just sold several copies of a book nobody would buy normally. Batman asks him who bought the book in order to learn who's in on the plot.

Film

 * In National Treasure, the hero discovers various numbers hidden on the back of the Declaration of Independence; these correspond.
 * In the film Unknown, Prof. Bressler's are obscured by an Ottendorf cipher.

Literature

 * This is described and used in The Curse of Chalion by Lois McMaster Bujold.
 * In The Valley of Fear, Sherlock Holmes decrypts a message enciphered with a book cipher by deducing which book had been used as a key text.
 * The name of Ken Follet's World War II thriller The Key to Rebecca refers to a German spy in Cairo using Daphne du Maurier's novel Rebecca as the basis of a code.
 * In A Presumption of Death, Lord Peter Wimsey, on assignment for British Intelligence in WWII Nazi-occupied Europe, uses a code based on the works of John Donne. The Germans, suspecting that an intelligence service in which Oxonians have a major role would choose a classical work of English literature, systematically try such works until hitting the right one and breaking the code, coming near to catching the spy. Wimsey then improvises a new code, based on an unpublished text known only to himself and his wife.
 * Another Wimsey example at one remove is in Have His Carcase, using a Playfair Cipher with the keyword (the tenth word on page 583 of the latest edition of a Chambers' Dictionary) disclosed this way.
 * Graham Greene's heroes often use book codes. In The Human Factor, several books are used, and an edition of Charles Lamb's Tales from Shakespeare is used in Our Man in Havana.
 * The heroes of the Matthew Reilly novel Six Sacred Stones used a book cipher to send confidential messages to each other. The key text was, but the messages were sent via.
 * The German spy uses this kind of encryption in The Death of Achilles.

Live Action TV

 * In the second episode of The BBC's Sherlock, they encounter a number . This turns out to be.
 * In the Season 2 finale of BBC's Luther, the numbers in a notebook is revealed to be this. The book they use to decipher is
 * A book cipher plays an important role in the TV version of Sharpe's Sword. The key text is.
 * "The Fisher King", a two-part episode of Criminal Minds, features an Ottendorf cipher part of a larger puzzle to find . The key text was.
 * Burn Notice uses this, especially in the, where it becomes part of the season-long plot when Michael Westen steals a
 * In The Unit episode "Paradise Lost", Jonas Blane uses a book code from.

Real Life

 * The infamously unsolved Taman Shud case seems to involve a "one-time pad" cipher using the edition-and-page method with a specific edition of the Rubaiyat of Omar Khayyam. Unfortunately, there's some other element of the key that has never been determined, so the cipher remains unsolved.
 * The Beale Ciphers are possibly a case of this. At the least, the second of the three documents, the one indicating the contents of the treasure, maps to the letters in the Declaration of Independence. Of course, there's also some evidence that it was a hoax from the start.