Information hiding in speech signals for secure communication:
While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication syst...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford, U.K. Beijing
Syngress Science Press
2015
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. -- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9780128014813 0128014814 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126666 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780128014813 |9 978-0-12-801481-3 | ||
020 | |a 0128014814 |9 0-12-801481-4 | ||
035 | |a (ZDB-33-ESD)ocn892917687 | ||
035 | |a (OCoLC)892917687 | ||
035 | |a (DE-599)BVBBV046126666 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 621.382 | |
100 | 1 | |a Wu, Zhijun |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information hiding in speech signals for secure communication |c Zhijun Wu |
250 | |a 1st ed | ||
264 | 1 | |a Oxford, U.K. |a Beijing |b Syngress |b Science Press |c 2015 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. -- | ||
650 | 7 | |a Digital communications |2 fast | |
650 | 7 | |a Signals and signaling |2 fast | |
650 | 7 | |a Speech |2 fast | |
650 | 7 | |a Telecommunication systems |2 fast | |
650 | 4 | |a Digital communications | |
650 | 4 | |a Signals and signaling | |
650 | 4 | |a Speech | |
650 | 4 | |a Telecommunication systems | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128013281 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128013281 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128014813 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128013281 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507120 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128013281 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180446988206080 |
---|---|
any_adam_object | |
author | Wu, Zhijun |
author_facet | Wu, Zhijun |
author_role | aut |
author_sort | Wu, Zhijun |
author_variant | z w zw |
building | Verbundindex |
bvnumber | BV046126666 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn892917687 (OCoLC)892917687 (DE-599)BVBBV046126666 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02616nmm a2200481zc 4500</leader><controlfield tag="001">BV046126666</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128014813</subfield><subfield code="9">978-0-12-801481-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128014814</subfield><subfield code="9">0-12-801481-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn892917687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)892917687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126666</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Zhijun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information hiding in speech signals for secure communication</subfield><subfield code="c">Zhijun Wu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford, U.K.</subfield><subfield code="a">Beijing</subfield><subfield code="b">Syngress</subfield><subfield code="b">Science Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital communications</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Signals and signaling</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Speech</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signals and signaling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Speech</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128013281</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128013281</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128014813</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128013281</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507120</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128013281</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126666 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:54Z |
institution | BVB |
isbn | 9780128014813 0128014814 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507120 |
oclc_num | 892917687 |
open_access_boolean | |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress Science Press |
record_format | marc |
spelling | Wu, Zhijun Verfasser aut Information hiding in speech signals for secure communication Zhijun Wu 1st ed Oxford, U.K. Beijing Syngress Science Press 2015 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. -- Digital communications fast Signals and signaling fast Speech fast Telecommunication systems fast Digital communications Signals and signaling Speech Telecommunication systems Erscheint auch als Druck-Ausgabe 0128013281 Erscheint auch als Druck-Ausgabe 9780128013281 Erscheint auch als Druck-Ausgabe 9780128014813 http://www.sciencedirect.com/science/book/9780128013281 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Wu, Zhijun Information hiding in speech signals for secure communication Digital communications fast Signals and signaling fast Speech fast Telecommunication systems fast Digital communications Signals and signaling Speech Telecommunication systems |
title | Information hiding in speech signals for secure communication |
title_auth | Information hiding in speech signals for secure communication |
title_exact_search | Information hiding in speech signals for secure communication |
title_full | Information hiding in speech signals for secure communication Zhijun Wu |
title_fullStr | Information hiding in speech signals for secure communication Zhijun Wu |
title_full_unstemmed | Information hiding in speech signals for secure communication Zhijun Wu |
title_short | Information hiding in speech signals for secure communication |
title_sort | information hiding in speech signals for secure communication |
topic | Digital communications fast Signals and signaling fast Speech fast Telecommunication systems fast Digital communications Signals and signaling Speech Telecommunication systems |
topic_facet | Digital communications Signals and signaling Speech Telecommunication systems |
url | http://www.sciencedirect.com/science/book/9780128013281 |
work_keys_str_mv | AT wuzhijun informationhidinginspeechsignalsforsecurecommunication |