Critical analysis of security in voice hiding techniques
暂无分享,去创建一个
[1] Ira S. Moskowitz,et al. Covert Channels - A Context-Based View , 1996, Information Hiding.
[2] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[3] A.P. Benguerel,et al. Speech analysis , 1981, Proceedings of the IEEE.
[4] John R. Pierce,et al. The science of musical sound , 1983 .
[5] John G. Proakis,et al. Digital Communications , 1983 .
[6] Ross Anderson,et al. Information hiding terminology , 1996 .
[7] J. L. Hall. Auditory Distortion Products f2−f1 and 2f1−f2 , 1972 .
[8] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[9] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[10] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.