Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title page
Table of Contents
Copyright Page
Preface
Acknowledgments
Overview
Chapter 1: Introduction
Abstract
1.1. Background
1.2. Introduction to Speech Coding
1.3. Related Work
1.4. Analysis of Available Information Hiding Methods
1.5. Organization of This Book
Chapter 2: The Information Hiding Model for Speech Secure Communication
Abstract
2.1. Introduction and Motivation
2.2. Model of Information Hiding as a Communication Problem
2.3. Speech Information Hiding Model
2.4. Experiments and Results Analysis
2.5. Summary
Chapter 3: The ABS Speech Information Hiding Algorithm Based on Filter Similarity
Abstract
3.1. Introduction and Motivation
3.2. Filter Similarity
3.3. LPC Coefficient Substitution Based on Filter Similarity
3.4. Secret Speech Information Hiding and Extraction Algorithm
3.5. Experimental Results and Analysis
3.6. Summary
Chapter 4: The G.721-Based Speech Information Hiding Approach
Abstract
4.1. Introduction to the G.721 Coding Standard
4.2. The Approach to Hide Secret Speech in G.721
4.3. Experimental Results and Analysis
4.4. Summary
Chapter 5: The G.728-Based Speech Information Hiding Approach
Abstract
5.1. Code Excited Linear Prediction
5.2. Introduction to the G.728 Coding Standard
5.3. The CELP-Based Scheme of Speech Information Hiding and Extraction
5.4. Approach to Hide Secret Speech in G.728
5.5. Experimental Results and Analysis
5.6. Summary
Chapter 6: The G.729-Based Speech Information Hiding Approach
Abstract
6.1. Introduction to the G.729 Coding Standard
6.2. The ACELP-Based Scheme of Speech Information Hiding and Extraction
6.3. Approach to Hide Secret Speech in G.729
6.4. Experimental Results and Analysis
6.5. Summary
Chapter 7: The GSM (RPE-LTP)-Based Speech Information Hiding Approach
Abstract
7.1. Introduction to the GSM (RPE-LTP) Coding Standard
7.2. Approach to Hide Secret Speech in GSM (RPE-LTP)
7.3. Experimental Results and Analysis
7.4. Summary
Chapter 8: Covert Communication Based on the VoIP System
Abstract
8.1. Introduction to the VoIP-Based Covert Communication System
8.2. Modeling and Realization of VoIP-Based Covert Communication
8.3. Embedding Secret Speech into VoIP G.729 Speech Flows
8.4. Summary
Chapter 9: Design of Real-Time Speech Secure Communication over PSTN
Abstract
9.1. Secure Communication Plan
9.2. Design and Realization of a Secure Communication System Based on PC
9.3. Speech Information Hiding Telephony (SIHT) Based on PSTN
9.4. Summary
References
Index
← Prev
Back
Next →
← Prev
Back
Next →