• Complain

Wu - Information Hiding in Speech Signals for Secure Communication

Here you can read online Wu - Information Hiding in Speech Signals for Secure Communication full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Beijing;Oxford;U.K, year: 2015, publisher: Elsevier Science;Science Press, Syngress, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Information Hiding in Speech Signals for Secure Communication
  • Author:
  • Publisher:
    Elsevier Science;Science Press, Syngress
  • Genre:
  • Year:
    2015
  • City:
    Beijing;Oxford;U.K
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Information Hiding in Speech Signals for Secure Communication: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Information Hiding in Speech Signals for Secure Communication" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. --

Information Hiding in Speech Signals for Secure Communication — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Information Hiding in Speech Signals for Secure Communication" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Information Hiding in Speech Signals for Secure Communication Zhijun Wu - photo 1
Information Hiding in Speech Signals for Secure Communication
Zhijun Wu
Table of Contents Copyright Page Syngress is an imprint of Elsevier The - photo 2
Table of Contents
Copyright Page
Syngress is an imprint of Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, UK
225 Wyman Street, Waltham, MA 02451, USA
First edition 2015
Copyright 2015 Science Press. Published by Elsevier Inc. All rights reserved
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher
Permissions may be sought directly from Elseviers Science & Technology Rights.
Department in Oxford, UK: phone (+44) (0) 1865 843830; fax (+44) (0) 1865 853333; email: , and selecting Obtaining permission to use Elsevier material

Notice

No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is availabe from the Library of Congress
ISBN13: 978-0-12-801328-1
For information on all Syngress publications visit our website at http://store.elsevier.com/
Printed and bound in the US
14 15 16 17 18 10 9 8 7 6 5 4 3 2 1
Preface In the information communication field speech communication via - photo 3
Preface
In the information communication field, speech communication via network becomes an important way to transfer information. With the development of information technology, speech communication is widely used for military, diplomatic, and economic purposes as well as in cultural life and scientific research. Therefore, speech secure communication and the security of communication information have attracted more and more attention. The rapid growth of the Internet as both an individual and business communication channel has created a growing demand for security and privacy in the network communication channel. Security and privacy are essential for individual communication to continue and for e-commerce to thrive in cyberspace.
Any type of multimedia datafor example speech, transmitted via networkneeds to be protected from manipulation, forgery, and theft. More sophisticated attacks require that more advanced security technologies be avoided, which have to be optimized for the particular requirements of each application scenario. As a development tendency of information security and a fresh-born technique, information hiding breaks the mentality of traditional cryptology. Information hiding technology carefully examines information security from a new perspective. Traditional secure communication approaches cannot satisfy current security requirements, and the garbled bits are likely to attract attention, or even encounter attacks from others. It is urgent to introduce a new mechanism for secure communication; thus the author undertakes it as his task to investigate a more secure communication, based on information hiding technology, which has many distinguishing characteristics. The most important characteristic is that there are univocal and continuous plain text speech signals on the communication line, so the secure communication will be more covert and safe.
Objectives
This book intends to develop the theory and system of real-time secure speech communication over a network based on information hiding technology, and to provide an overview of the research area of information hiding in secure communication. In the book, the author attempts to break the massive subject into comprehensible parts and to build, piece by piece, a development of information hiding technology in secure communication. The book emphasizes the fundamentals of algorithms and approaches concerning the technology and architecture of a secure communication field, providing a detailed discussion of leading-edge topics such as filter similarity and linear predictive coding (LPC) parameters substitution.
Organization of the Book
This book introduces several methods to hide secret speech information in different types of digital speech coding standards. In the past 10 years, the continued advancement and exponential increase of network processing ability have enhanced the efficiency and scope of speech communication over the network. Therefore, the author summarizes his years of research achievements in the speech information hiding realm to form this book, including a mathematical model for information hiding, the scheme of speech secure communication, an ABS-based information hiding algorithm, and an implemented speech secure communication system, which are organized into different sections in accordance with the security situation of the network. This book includes nine chapters, which introduce speech information hiding algorithms and techniques (embedding and extracting) capable of withstanding the evolved forms of attacks.
The four parts of this book are as follows:
I. Introduction , includes . This book begins with an introductory chapter, where the approaches of secure communication and their realization are discussed in general terms. This chapter ends with an overview of speech coding standards. This part provides a source of motivation for interested readers to wade through the rich history of the subject. The concept and algorithms involved in this part are explained in details in subsequent chapters.
II. Theory , consists of . This part proposes a mathematical model, and embedding and extracting algorithms of secure communication based on information hiding. The design of a speech information hiding model and algorithm for secure communication focuses on security, hiding capacity, and speech quality. The model and algorithm may help readers to develop a deep understanding of what information-hiding-based secure communication is all about.
III. Approaches , consists of . This part presents a detailed embedding secret speech coded in MELP 2.4 K, with the secret speech coded in accordance with five important families of the speech coding standard, such as G.721, G.728, G.729, and GSM, which are used in Voice over Internet Protocol (VoIP) or Public Switched Telephone Network (PSTN). Next is the introduction of the process of extracting secret speech coded in MELP 2.4 K in the G.721, G.728, G.729, and GSM standards. The procedure of the realization of secure communication based on specific speech coding standards is developed.
IV. Realization , consists of . This part gives two applications of secure communication based on the technology of information hiding. Each chapter sets up one example to show how to implement secure communication over VoIP and PSTN by using the information-hiding-based model and algorithm individually.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Information Hiding in Speech Signals for Secure Communication»

Look at similar books to Information Hiding in Speech Signals for Secure Communication. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Information Hiding in Speech Signals for Secure Communication»

Discussion, reviews of the book Information Hiding in Speech Signals for Secure Communication and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.