图书介绍

语音信息隐藏 面向网络的实时语音保密通信方法 英文版pdf电子书版本下载

语音信息隐藏  面向网络的实时语音保密通信方法  英文版
  • 吴志军著 著
  • 出版社: 北京:科学出版社
  • ISBN:9787030421258
  • 出版时间:2014
  • 标注页数:183页
  • 文件大小:23MB
  • 文件页数:200页
  • 主题词:计算机网络-语音加密-保密通信-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
下载压缩包 [复制下载地址] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页

下载说明

语音信息隐藏 面向网络的实时语音保密通信方法 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 Introduction 1

1.1 Background 1

1.1.1 Progress in Secure Communication 2

1.1.2 A New Technique for Secure Communication:Information Hiding 4

1.2 Introduction to Speech Coding 9

1.2.1 Basic Principles of Speech Coding 10

1.2.2 Speech Coding Standards 11

1.3 Related Work 14

1.4 Analysis of Available Information Hiding Methods 19

1.4.1 Least Significant Bit 19

1.4.2 Phase Hiding Method 20

1.4.3 Echo Hiding Method 20

1.4.4 Hiding Method Based on Statistics 21

1.4.5 Transform Domain Method 21

1.5 Organization of This Book 23

CHAPTER 2 The Information Hiding Model for Speech Secure Communication 27

2.1 Introduction and Motivation 27

2.2 Model of Information Hiding as a Communication Problem 29

2.3 Speech Information Hiding Model 31

2.3.1 Hiding Capacity 33

2.3.2 Security 33

2.3.3 Speech Quality 35

2.4 Experiments and Results Analysis 37

2.4.1 Hiding Capacity 37

2.4.2 Security 37

2.4.3 Speech Quality 38

2.5 Summary 40

CHAPTER 3 The ABS Speech Information Hiding Algorithm Based on Filter Similarity 41

3.1 Introduction and Motivation 41

3.1.1 Brief Introduction to the ABS Scheme 41

3.1.2 Analysis of the ABS Scheme 44

3.2 Filter Similarity 46

3.3 LPC Coefficient Substitution Based on Filter Similarity 50

3.3.1 LPC Substitution Algorithm 51

3.3.2 Multicodebook 52

3.4 Secret Speech Information Hiding and Extraction A1gorithm 52

3.4.1 Speech Information Hiding Algorithm 54

3.4.2 Speech Information Extraction Algorithm 55

3.5 Experimental Results and Analysis 55

3.5.1 Selection of Test Parameters 56

3.5.2 Experimental Results 57

3.5.3 Calculation Complexity 58

3.5.4 Speech Quality 59

3.6 Summary 59

CHAPTER 4 The G.721-Based Speech Information Hiding Approach 65

4.1 Introduction to the G.721 Coding Standard 65

4.1.1 Differential Pulse Code Modulation 65

4.1.2 Adaptive Schemes 66

4.2 The Approach to Hide Secret Speech in G.721 71

4.2.1 Embedding Algorithm 71

4.2.2 Extraction Algorithm 76

4.3 Experimental Results and Analysis 77

4.3.1 Hiding Capacity 77

4.3.2 Speech Quality 78

4.4 Summary 80

CHAPTER 5 The G.728-Based Speech Information Hiding Approach 81

5.1 Code Excited Linear Prediction 81

5.1.1 The CELP Speech Production Model 81

5.1.2 Coding Principles 82

5.1.3 Encoder Operation 83

5.1.4 Perceptual Weighting 84

5.1.5 Vector Quantization 85

5.2 Introduction to the G.728 Coding Standard 85

5.3 The CELP-Based Scheme of Speech Information Hiding and Extraction 87

5.3.1 Embedding Scheme 87

5.3.2 Extraction Scheme 90

5.4 Approach to Hide Secret Speech in G.728 90

5.4.1 Embedding Algorithm 91

5.4.2 Extraction Algorithm 92

5.5 Experimental Results and Analysis 93

5.6 Summary 94

CHAPTER 6 The G.729-Based Speech Information Hiding Approach 97

6.1 Introduction to the G.729 Coding Standard 97

6.1.1 Algebraic Codebook Structure 97

6.1.2 Adaptive Codebook 98

6.1.3 G.729 Coding Scheme 102

6.2 Thc ACELP-Based Scheme of Speech Information Hiding and Extraction 104

6.2.1 Embedding Scheme 104

6.2.2 Extraction Scheme 108

6.3 Approach to Hide Secret Speech in G.729 108

6.3.1 Embedding Algorithm 108

6.3.2 Extraction Algorithm 110

6.4 Experimental Results and Analysis 110

6.5 Summary 111

CHAPTER 7 The GSM(RPE-LTP)-Based Speech Information Hiding Approach 113

7.1 Introduction to the GSM (RPE-LTP) Coding Standard 113

7.1.1 RPE-LTP Coding Scheme 114

7.1.2 GSM Coding Scheme 116

7.2 Approach to Hide Secret Speech in GSM (RPE-LTP) 120

7.2.1 Embedding Algorithm 120

7.2.2 Extraction Algorithm 121

7.3 Experimental Results and Analysis 122

7.4 Summary 126

CHAPTER 8 Covert Communication Based on the VoIP System 127

8.1 Introduction to the VoIP-Based Covert Communication System 127

8.1.1 Introduction to the VoIP System 127

8.1.2 An Outline for VoIP Steganography 128

8.1.3 Classifications of the Embedding Method 129

8.2 Modeling and Realization of VoIP-Based Covert Communication 130

8.3 Embedding Secret Speech into VoIP G.729 Speech Flows 131

8.3.1 The CNT of G.729 Parameters 132

8.3.2 Embedding Approach Based on Matrix Coding 134

8.3.3 Embedding Procedure 136

8.3.4 Experimental Results and Analysis 138

8.4 Summary 142

CHAPTER 9 Design of Real-Time Speech Secure Communication over PSTN 143

9.1 Secure Communication Plan 143

9.1.1 Introduction 143

9.1.2 Requirements Analysis 144

9.2 Design and Realization of a Secure Communication System Based on PC 145

9.2.1 Framework for Design 145

9.2.2 Coding Scheme Selection 147

9.2.3 Multimedia Programming 147

9.2.4 System Realization 150

9.3 Speech Information Hiding Telephony(SIHT)Based on PSTN 152

9.3.1 Introduction 152

9.3.2 Description of the SIHT 153

9.3.3 Speech Information Hiding Scheme 155

9.3.4 SIHT Module 156

9.3.5 SIHT Operating Modes 160

9.3.6 Architecture of SIHT 161

9.4 Summary 163

References 165

Index 175

精品推荐