零零教育信息网 首页 > 图书 > 科技 > 正文 返回 打印

语音信息隐藏:面向网络的实时语音保密通信方法

  2020-08-02 00:00:00  

语音信息隐藏:面向网络的实时语音保密通信方法 本书特色

《语音信息隐藏——面向网络的实时语音保密通信方法(英文版)》主要研究采用信息隐藏技术实现网络保密通信的方法,针对voip网络通信,利用滤波器相似度计算,在合成语音编码的线性预测参数lpc中嵌入秘密语音信息,达到voip保密传输的目的。主要的内容包括:(1)建立具有约束条件的面向voip网络保密通信的语音信息隐藏模型;(2)提出基于分析-合成编码中线性预测参数lpc滤波器相似度的秘密语音信息隐藏算法;(3)提出基于*小均方误差的秘密语音信息"盲"检测提取方法;(4)设计面向实时保密通信的语音信息隐藏性能评估体系。

语音信息隐藏:面向网络的实时语音保密通信方法 内容简介

NULL

语音信息隐藏:面向网络的实时语音保密通信方法 目录

preface
acknowledgments
overview
chapter 1 introduction
  1.1 background
    1.1.1 progress in secure communication
    1.1.2 a new technique for secure communication: information hiding
  1.2 introduction to speech coding
    1.2.1 basic principles of speech coding
    1.2.2 speech coding standards
  1.3 related work
  1.4 analysis of available information hiding methods
    1.4.1 least significant bit
    1.4.2 phase hiding method
    1.4.3 echo hiding method
    1.4.4 hiding method based on statistics
    1.4.5 transform domain method
  1.5 organization of this book
chapter 2 the information hiding model for speech secure communication
  2.1 introduction and motivation
  2.2 model of information hiding as a communication problem
  2.3 speech information hiding model
    2.3.1 hiding capacity
    2.3.2 security
    2.3.3 speech quality
  2.4 experiments and results analysis
    2.4.1 hiding capacity
    2.4.2 security
    2.4.3 speech quality
  2.5 summary
chapter 3 the abs speech information hiding algorithm based on filter similarity
  3.1 introduction and motivation
    3.1.1 brief introduction to the abs scheme
    3.1.2 analysis of the abs scheme
  3.2 filter similarity
  3.3 lpc coefficient substitution based on filter similarity
    3.3.1 lpc substitution algorithm
    3.3.2 multicodebook
  3.4 secret speech information hiding and extraction algorithm
    3.4.1 speech information hiding algorithm
    3.4.2 speech information extraction algorithm
  3.5 experimental results and analysis
    3.5.1 selection of test parameters
    3.5.2 experimental results
    3.5.3 calculation complexity
    3.5.4 speech quality
  3.6 summary
chapter 4 the g.721-based speech information hiding approach
  4.1 introduction to the g.721 coding standard
    4.1.1 differential pulse code modulation
    4.1.2 adaptive schemes
  4.2 the approach to hide secret speech in g.721
    4.2.1 embedding algorithm
    4.2.2 extraction algorithm
  4.3 experimental results and analysis
    4.3.1 hiding capacity
    4.3.2 speech quality
  4.4 summary
chapter 5 the g.728-based speech information hiding approach
  5.1 code excited linear prediction
    5.1.1 the celp speech production model
    5.1.2 coding principles
    5.1.3 encoder operation
    5.1.4 perceptual weighting
    5.1.5 vector quantization
  5.2 introduction to the g.728 coding standard
  5.3 the celp-based scheme of speech information hiding and extraction
    5.3.1 embedding scheme
    5.3.2 extraction scheme
  5.4 approach to hide secret speech in g.728
    5.4.1 embedding algorithm
    5.4.2 extraction algorithm
  5.5 experimental results and analysis
  5.6 summary
chapter 6 the g.729-based speech information hiding approach
  6.1 introduction to the g.729 coding standard
    6.1.1 algebraic codebook structure
    6.1.2 adaptive codebook
    6.1.3 g.729 coding scheme
  6.2 the acelp-based scheme of speech information hiding and extraction
    6.2.1 embedding scheme
    6.2.2 extraction scheme
  6.3 approach to hide secret speech in g.729
    6.3.1 embedding algorithm
    6.3.2 extraction algorithm
  6.4 experimental results and analysis
  6.5 summary
chapter 7 the gsm (rpe-ltp)-based speech information hiding approach
  7.1 introduction to the gsm (rpe-ltp) coding standard
    7.1.1 rpe-ltp coding scheme
    7.1.2 gsm coding scheme
  7.2 approach to hide secret speech in gsm (rpe-ltp)
    7.2.1 embedding algorithm
    7.2.2 extraction algorithm
  7.3 experimental results and analysis
  7.4 summary
chapter 8 covert communication based on the volp system
  8.1 introduction to the voip-based covert communication system
    8.1.1 introduction to the volp system
    8.1.2 an outline for volp steganography
    8.1.3 classifications of the embedding method
  8.2 modeling and realization of volp-based covert communication
  8.3 embedding secret speech into voip g.729 speech flows
    8.3.1 the cnt of g.729 parameters
    8.3.2 embedding approach based on matrix coding
    8.3.3 embedding procedure
    8.3.4 experimental results and analysis
  8.4 summary
chapter 9 design of real-time speech secure communication over pstn
  9.1 secure communication plan
    9.1.1 introduction
    9.1.2 requirements analysis
  9.2 design and realization of a secure communication system based on pc
    9.2.1 framework for design
    9.2.2 coding scheme selection
    9.2.3 multimedia programming
    9.2.4 system realization
  9.3 speech information hiding telephony (siht) based on pstn
    9.3.1 introduction
    9.3.2 description of the siht
    9.3.3 speech information hiding scheme
    9.3.4 siht module
    9.3.5 siht operating modes
    9.3.6 architecture of siht
  9.4 summary
references
index 语音信息隐藏:面向网络的实时语音保密通信方法

http://www.00-edu.com/tushu/kj1/202008/2680586.html十二生肖
十二星座