In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.
This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
- Presents information hiding theory and the mathematical model used for information hiding in speech.
- Provides a number of methods to hide secret speech information using the most common digital speech coding standards.
- A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.
|Item Weight:||0 pounds|
|Item Size:||0.5 x 9 x 9 inches|
|Package Weight:||1 pounds|
|Package Size:||7.4 x 0.6 x 0.6 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Syngress, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
By Beigi, Homayoon
mpn: 9780387775913, ean: 9780387775913, isbn: 0387775919,
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition...
By Syngress Publishing
ean: 9780128113837, isbn: 0128113839,
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermark...
By Course Technology
ean: 9781435498839, isbn: 1435498836,
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech i...
By Auerbach Publications
ean: 9781439801963, isbn: 9781439801963,
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions o...