Information Hiding in Speech Signals for Secure Communication
Book Details:
Publisher: | Syngress Media,U.S. |
Series: |
Syngress
|
Author: | Zhijun Wu |
Edition: | 1 |
ISBN-10: | 0128013281 |
ISBN-13: | 9780128013281 |
Pages: | 200 |
Published: | Aug 29 2014 |
Posted: | Aug 12 2016 |
Language: | English |
Book format: | PDF |
Book size: | 11.03 MB |
Book Description:
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. * Presents information hiding theory and the mathematical model used for information hiding in speech.* Provides a number of methods to hide secret speech information using the most common digital speech coding standards.* A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.
Steganography and the Art of Covert Communication
Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guysFirst book to describe international terrorists' cybersecurity tool of choice in an accessible languageAuthor is a top security consultant for the CIA and provides gripping stories that show how steganography worksAppendix provides tools to help people detect and counteract stenanography...
Theory and Practice
An overview on the challenging new topic of phaseaware signal processing Speech communication technology is a key factor in humanmachine interaction, digital hearing aids, mobile telephony, and automatic speech/speaker recognition. With the proliferation of these applications, there is a growing requirement for advanced methodologies that can push the limits of the conventional solutions relying on processing the signal magnitude spectrum. SingleChannel PhaseAware Signal Processing in Speech Communication provides a comprehensive guide to phase signal processing and reviews the history of phase importance in the literature, basic problems in phase processing, fundamentals of phase estimation together with several applications to demonstrate the use...
This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:Image data hiding scheme based on vector quantization and image graph coloringThe copyright protection system for Android platformReversible data hidingICA-based image and video watermarkingContent-based invariant image watermarkingSingle bitmap block truncation coding of color images using cat swarm optimizationGenetic-based wavelet packet watermarking for copyright protectionLossless text steganography in compression codingFast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography schemeVideo watermarking with shot detection....
2007 - 2021 © eBooks-IT.org