Information hiding in speech signals for secure communication: (Record no. 36058)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01910nam a22002297a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | KENaKMTC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240301110734.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240301b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128013281 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | dlc |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK7882.S65 W8 2015 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Relator code | Wu, Z. |
245 ## - TITLE STATEMENT | |
Title | Information hiding in speech signals for secure communication: |
Remainder of title | Telecommunications/ |
Statement of responsibility, etc | Compiled by Wu, Zhijun. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Oxford : |
Name of publisher, distributor, etc | Syngress, |
Date of publication, distribution, etc | Syngress, 2015. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvi, 183 pages. : |
Other physical details | illustrations ; |
Dimensions | 24 cm |
500 ## - GENERAL NOTE | |
General note | previously published as 1st ed., in 2015. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | <br/><br/> Includes bibliographical references and index.<br/> |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 : Introduction -- Chapter 2 : The Information hiding model for speech secure communication -- Chapter 3 : ABS speech information hiding algorithm based on filer similarity -- Chapter 4 : G.721-based speech information hiding approach -- Chapter 5 : G.728-based speech information hiding approach -- Chapter 6 : G.729-based speech information hiding approach -- Chapter 7 : GSM (RPE-LTP)-based speech information hiding approach -- Chapter 8 : Covert communication based on VoIP system -- Chapter 9 : Design of a real-time speech secure communication over PSTN -- Reference |
520 ## - SUMMARY, ETC. | |
Summary, etc | Chapter 1 : Introduction -- Chapter 2 : The Information hiding model for speech secure communication -- Chapter 3 : ABS speech information hiding algorithm based on filer similarity -- Chapter 4 : G.721-based speech information hiding approach -- Chapter 5 : G.728-based speech information hiding approach -- Chapter 6 : G.729-based speech information hiding approach -- Chapter 7 : GSM (RPE-LTP)-based speech information hiding approach -- Chapter 8 : Covert communication based on VoIP system -- Chapter 9 : Design of a real-time speech secure communication over PSTN -- References |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="uniform resource identifier.">uniform resource identifier.</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Intials | NJW |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | KMTC:KURIA CAMPUS | KMTC:KURIA CAMPUS | General Stacks | 10/10/2022 | Donation | TK7882.S65 W8 2015 | KUR/ 389 | 01/03/2024 | 01/03/2024 | Books |