Library Catalogue

Information hiding in speech signals for secure communication: (Record no. 36058)

MARC details
000 -LEADER
fixed length control field 01910nam a22002297a 4500
003 - CONTROL NUMBER IDENTIFIER
control field KENaKMTC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240301110734.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240301b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128013281
040 ## - CATALOGING SOURCE
Transcribing agency dlc
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7882.S65 W8 2015
100 ## - MAIN ENTRY--PERSONAL NAME
Relator code Wu, Z.
245 ## - TITLE STATEMENT
Title Information hiding in speech signals for secure communication:
Remainder of title Telecommunications/
Statement of responsibility, etc Compiled by Wu, Zhijun.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Oxford :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc Syngress, 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 183 pages. :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note previously published as 1st ed., in 2015.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc <br/><br/> Includes bibliographical references and index.<br/>
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 : Introduction -- Chapter 2 : The Information hiding model for speech secure communication -- Chapter 3 : ABS speech information hiding algorithm based on filer similarity -- Chapter 4 : G.721-based speech information hiding approach -- Chapter 5 : G.728-based speech information hiding approach -- Chapter 6 : G.729-based speech information hiding approach -- Chapter 7 : GSM (RPE-LTP)-based speech information hiding approach -- Chapter 8 : Covert communication based on VoIP system -- Chapter 9 : Design of a real-time speech secure communication over PSTN -- Reference
520 ## - SUMMARY, ETC.
Summary, etc Chapter 1 : Introduction -- Chapter 2 : The Information hiding model for speech secure communication -- Chapter 3 : ABS speech information hiding algorithm based on filer similarity -- Chapter 4 : G.721-based speech information hiding approach -- Chapter 5 : G.728-based speech information hiding approach -- Chapter 6 : G.729-based speech information hiding approach -- Chapter 7 : GSM (RPE-LTP)-based speech information hiding approach -- Chapter 8 : Covert communication based on VoIP system -- Chapter 9 : Design of a real-time speech secure communication over PSTN -- References
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="uniform resource identifier.">uniform resource identifier.</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Intials NJW
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     KMTC:KURIA CAMPUS KMTC:KURIA CAMPUS General Stacks 10/10/2022 Donation   TK7882.S65 W8 2015 KUR/ 389 01/03/2024 01/03/2024 Books

© 2024, Kenya Medical Training College | All Rights Reserved