Skip to main content

Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.

Save up to 30% on print and eBooks.

Information Hiding in Speech Signals for Secure Communication

  • 1st Edition - August 27, 2014
  • Author: Zhijun Wu
  • Language: English
  • Paperback ISBN:
    9 7 8 - 0 - 1 2 - 8 0 1 3 2 8 - 1
  • eBook ISBN:
    9 7 8 - 0 - 1 2 - 8 0 1 4 8 1 - 3

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding yo… Read more

Information Hiding in Speech Signals for Secure Communication

Purchase options

LIMITED OFFER

Save 50% on book bundles

Immediately download your ebook while waiting for your print delivery. No promo code is needed.

Institutional subscription on ScienceDirect

Request a sales quote

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.

This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.