图书介绍
语音信息隐藏 面向网络的实时语音保密通信方法 英文版PDF|Epub|txt|kindle电子书版本网盘下载
- 吴志军著 著
- 出版社: 北京:科学出版社
- ISBN:9787030421258
- 出版时间:2014
- 标注页数:183页
- 文件大小:23MB
- 文件页数:200页
- 主题词:计算机网络-语音加密-保密通信-英文
PDF下载
下载说明
语音信息隐藏 面向网络的实时语音保密通信方法 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
CHAPTER 1 Introduction1
1.1 Background1
1.1.1 Progress in Secure Communication2
1.1.2 A New Technique for Secure Communication:Information Hiding4
1.2 Introduction to Speech Coding9
1.2.1 Basic Principles of Speech Coding10
1.2.2 Speech Coding Standards11
1.3 Related Work14
1.4 Analysis of Available Information Hiding Methods19
1.4.1 Least Significant Bit19
1.4.2 Phase Hiding Method20
1.4.3 Echo Hiding Method20
1.4.4 Hiding Method Based on Statistics21
1.4.5 Transform Domain Method21
1.5 Organization of This Book23
CHAPTER 2 The Information Hiding Model for Speech Secure Communication27
2.1 Introduction and Motivation27
2.2 Model of Information Hiding as a Communication Problem29
2.3 Speech Information Hiding Model31
2.3.1 Hiding Capacity33
2.3.2 Security33
2.3.3 Speech Quality35
2.4 Experiments and Results Analysis37
2.4.1 Hiding Capacity37
2.4.2 Security37
2.4.3 Speech Quality38
2.5 Summary40
CHAPTER 3 The ABS Speech Information Hiding Algorithm Based on Filter Similarity41
3.1 Introduction and Motivation41
3.1.1 Brief Introduction to the ABS Scheme41
3.1.2 Analysis of the ABS Scheme44
3.2 Filter Similarity46
3.3 LPC Coefficient Substitution Based on Filter Similarity50
3.3.1 LPC Substitution Algorithm51
3.3.2 Multicodebook52
3.4 Secret Speech Information Hiding and Extraction A1gorithm52
3.4.1 Speech Information Hiding Algorithm54
3.4.2 Speech Information Extraction Algorithm55
3.5 Experimental Results and Analysis55
3.5.1 Selection of Test Parameters56
3.5.2 Experimental Results57
3.5.3 Calculation Complexity58
3.5.4 Speech Quality59
3.6 Summary59
CHAPTER 4 The G.721-Based Speech Information Hiding Approach65
4.1 Introduction to the G.721 Coding Standard65
4.1.1 Differential Pulse Code Modulation65
4.1.2 Adaptive Schemes66
4.2 The Approach to Hide Secret Speech in G.72171
4.2.1 Embedding Algorithm71
4.2.2 Extraction Algorithm76
4.3 Experimental Results and Analysis77
4.3.1 Hiding Capacity77
4.3.2 Speech Quality78
4.4 Summary80
CHAPTER 5 The G.728-Based Speech Information Hiding Approach81
5.1 Code Excited Linear Prediction81
5.1.1 The CELP Speech Production Model81
5.1.2 Coding Principles82
5.1.3 Encoder Operation83
5.1.4 Perceptual Weighting84
5.1.5 Vector Quantization85
5.2 Introduction to the G.728 Coding Standard85
5.3 The CELP-Based Scheme of Speech Information Hiding and Extraction87
5.3.1 Embedding Scheme87
5.3.2 Extraction Scheme90
5.4 Approach to Hide Secret Speech in G.72890
5.4.1 Embedding Algorithm91
5.4.2 Extraction Algorithm92
5.5 Experimental Results and Analysis93
5.6 Summary94
CHAPTER 6 The G.729-Based Speech Information Hiding Approach97
6.1 Introduction to the G.729 Coding Standard97
6.1.1 Algebraic Codebook Structure97
6.1.2 Adaptive Codebook98
6.1.3 G.729 Coding Scheme102
6.2 Thc ACELP-Based Scheme of Speech Information Hiding and Extraction104
6.2.1 Embedding Scheme104
6.2.2 Extraction Scheme108
6.3 Approach to Hide Secret Speech in G.729108
6.3.1 Embedding Algorithm108
6.3.2 Extraction Algorithm110
6.4 Experimental Results and Analysis110
6.5 Summary111
CHAPTER 7 The GSM(RPE-LTP)-Based Speech Information Hiding Approach113
7.1 Introduction to the GSM (RPE-LTP) Coding Standard113
7.1.1 RPE-LTP Coding Scheme114
7.1.2 GSM Coding Scheme116
7.2 Approach to Hide Secret Speech in GSM (RPE-LTP)120
7.2.1 Embedding Algorithm120
7.2.2 Extraction Algorithm121
7.3 Experimental Results and Analysis122
7.4 Summary126
CHAPTER 8 Covert Communication Based on the VoIP System127
8.1 Introduction to the VoIP-Based Covert Communication System127
8.1.1 Introduction to the VoIP System127
8.1.2 An Outline for VoIP Steganography128
8.1.3 Classifications of the Embedding Method129
8.2 Modeling and Realization of VoIP-Based Covert Communication130
8.3 Embedding Secret Speech into VoIP G.729 Speech Flows131
8.3.1 The CNT of G.729 Parameters132
8.3.2 Embedding Approach Based on Matrix Coding134
8.3.3 Embedding Procedure136
8.3.4 Experimental Results and Analysis138
8.4 Summary142
CHAPTER 9 Design of Real-Time Speech Secure Communication over PSTN143
9.1 Secure Communication Plan143
9.1.1 Introduction143
9.1.2 Requirements Analysis144
9.2 Design and Realization of a Secure Communication System Based on PC145
9.2.1 Framework for Design145
9.2.2 Coding Scheme Selection147
9.2.3 Multimedia Programming147
9.2.4 System Realization150
9.3 Speech Information Hiding Telephony(SIHT)Based on PSTN152
9.3.1 Introduction152
9.3.2 Description of the SIHT153
9.3.3 Speech Information Hiding Scheme155
9.3.4 SIHT Module156
9.3.5 SIHT Operating Modes160
9.3.6 Architecture of SIHT161
9.4 Summary163
References165
Index175