Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title page Table of Contents Copyright Page Preface Acknowledgments Overview Chapter 1: Introduction
Abstract 1.1. Background 1.2. Introduction to Speech Coding 1.3. Related Work 1.4. Analysis of Available Information Hiding Methods 1.5. Organization of This Book
Chapter 2: The Information Hiding Model for Speech Secure Communication
Abstract 2.1. Introduction and Motivation 2.2. Model of Information Hiding as a Communication Problem 2.3. Speech Information Hiding Model 2.4. Experiments and Results Analysis 2.5. Summary
Chapter 3: The ABS Speech Information Hiding Algorithm Based on Filter Similarity
Abstract 3.1. Introduction and Motivation 3.2. Filter Similarity 3.3. LPC Coefficient Substitution Based on Filter Similarity 3.4. Secret Speech Information Hiding and Extraction Algorithm 3.5. Experimental Results and Analysis 3.6. Summary
Chapter 4: The G.721-Based Speech Information Hiding Approach
Abstract 4.1. Introduction to the G.721 Coding Standard 4.2. The Approach to Hide Secret Speech in G.721 4.3. Experimental Results and Analysis 4.4. Summary
Chapter 5: The G.728-Based Speech Information Hiding Approach
Abstract 5.1. Code Excited Linear Prediction 5.2. Introduction to the G.728 Coding Standard 5.3. The CELP-Based Scheme of Speech Information Hiding and Extraction 5.4. Approach to Hide Secret Speech in G.728 5.5. Experimental Results and Analysis 5.6. Summary
Chapter 6: The G.729-Based Speech Information Hiding Approach
Abstract 6.1. Introduction to the G.729 Coding Standard 6.2. The ACELP-Based Scheme of Speech Information Hiding and Extraction 6.3. Approach to Hide Secret Speech in G.729 6.4. Experimental Results and Analysis 6.5. Summary
Chapter 7: The GSM (RPE-LTP)-Based Speech Information Hiding Approach
Abstract 7.1. Introduction to the GSM (RPE-LTP) Coding Standard 7.2. Approach to Hide Secret Speech in GSM (RPE-LTP) 7.3. Experimental Results and Analysis 7.4. Summary
Chapter 8: Covert Communication Based on the VoIP System
Abstract 8.1. Introduction to the VoIP-Based Covert Communication System 8.2. Modeling and Realization of VoIP-Based Covert Communication 8.3. Embedding Secret Speech into VoIP G.729 Speech Flows 8.4. Summary
Chapter 9: Design of Real-Time Speech Secure Communication over PSTN
Abstract 9.1. Secure Communication Plan 9.2. Design and Realization of a Secure Communication System Based on PC 9.3. Speech Information Hiding Telephony (SIHT) Based on PSTN 9.4. Summary
References Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion