Authentication in VoIP Telephony with Use of the Echo Hiding Method
暂无分享,去创建一个
[1] Hyoung Joong Kim,et al. Audio Watermarking Techniques , 2004 .
[2] B. P. Bogert,et al. The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .
[3] M. Ross,et al. Average magnitude difference function pitch extractor , 1974 .
[4] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[5] Patrick Park. Voice over IP Security , 2008 .
[6] Li Li,et al. Experimental research on parameter selection of echo hiding in voice , 2009, 2009 International Conference on Machine Learning and Cybernetics.
[7] Piotr Gajewski,et al. Voice spoofing as an impersonation attack and the way of protection , 2007 .
[8] Shih-Fu Hsieh,et al. An Echo-Hiding Watermarking Technique Based on Bilateral Symmetric Time Spread Kernel , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[9] Z. Piotrowski,et al. Novel Method For Watermarking SystemOperating On The HF And VHF Radio Links , 2007 .