Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Type of Publication
Consortium
Language
  • 1
    Online Resource
    Online Resource
    Singapore [u.a.] : World Scientific | [Ann Arbor, Michigan] : [ProQuest]
    UID:
    (DE-603)379915316
    Format: xii, 230 p. , Ill.
    Note: Includes bibliographical references and index
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    (DE-605)HT021642753
    Format: 1 Online-Ressource
    ISBN: 9780128013281
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Oxford, [England] : Syngress
    UID:
    (DE-627)825918901
    Format: Online-Ressource (200 pages) , illustrations
    Edition: First edition
    Edition: Online-Ausg.
    Content: While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. --
    Content: While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. --
    Note: Includes bibliographical references and index
    Additional Edition: 0128014814
    Additional Edition: 0128013281
    Additional Edition: 9780128014813
    Additional Edition: 9780128013281
    Additional Edition: Print version Information hiding in speech signal for secure communication
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Oxford, [England] : Syngress
    UID:
    (DE-627)1659344883
    Format: Online-Ressource (1 online resource (200 pages)) , illustrations
    Edition: First edition (Online-Ausg.)
    ISBN: 9780128014813 , 9780128013281
    Note: Includes bibliographical references and index. - Description based on print version record
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Oxford, U.K. : Syngress ;
    UID:
    (DE-627)1680255460
    Format: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    ISBN: 9780128014813 , 0128014814
    Content: In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. Presents information hiding theory and the mathematical model used for information hiding in speech. Provides a number of methods to hide secret speech information using the most common digital speech coding standards. A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Oct. 7, 2014)
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Oxford, U.K. : Syngress
    UID:
    (DE-627)1655940023
    Format: 1 Online-Ressource , illustrations
    Edition: 1st ed.
    Edition: Online-Ausg.
    ISBN: 9780128014813 , 0128014814 , 9780128014813
    Content: While traditional digital encryption methods are useful, there are many other options for hiding your information. This book provides a number of methods to hide secret speech information using a variety of digital speech coding standards. It shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN. --
    Note: Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed Oct. 7, 2014) , Includes bibliographical references and index
    Additional Edition: 0128013281
    Additional Edition: 0128014814
    Additional Edition: Erscheint auch als Druck-Ausgabe Zhijun, Wu Information hiding in speech signal for secure communication Oxford, [England] ; Waltham, Massachusetts : Syngress, ©2015 9780128013281
    Language: English
    Keywords: Electronic books ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Amsterdam [u.a.] : Syngress/Elsevier
    UID:
    (DE-627)797499431
    Format: XVI, 183 S. , graph. Darst.
    Edition: 1. ed.
    ISBN: 9780128013281
    Note: Literaturverz. S. 165 - 173 , Chapter 1 : Introduction -- Chapter 2 : The Information hiding model for speech secure communication -- Chapter 3 : ABS speech information hiding algorithm based on filer similarity -- Chapter 4 : G.721-based speech information hiding approach -- Chapter 5 : G.728-based speech information hiding approach -- Chapter 6 : G.729-based speech information hiding approach -- Chapter 7 : GSM (RPE-LTP)-based speech information hiding approach -- Chapter 8 : Covert communication based on VoIP system -- Chapter 9 : Design of a real-time speech secure communication over PSTN -- References
    Language: English
    Keywords: Sprachcodierung ; Steganographie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore : World Scientific Publishing Co Pte Ltd
    UID:
    (DE-627)1658003772
    Format: 1 online resource (244 pages)
    ISBN: 9789812814784
    Content: Key Features:Introduces computational and mathematical problems, their solution methods, and the research developmentsPresents self-contained rather than overly technical contents for better understanding of the materials used.
    Content: Intro -- Contents -- Preface -- 1 Introduction -- 1.1 Protein Structure -- 1.1.1. DNA, RNA, and protein -- 1.1.2. Hierarchy of structures -- 1.1.3. Properties of amino acids -- 1.1.4. Sequence, structure, and function -- 1.2 Structure Determination -- 1.2.1. Experimental approaches -- 1.2.2. Theoretical approaches -- 1.2.3. Knowledge-based methods -- 1.2.4. Structural refinement -- 1.3 Dynamics Simulation -- 1.3.1. Potential energy and force field -- 1.3.2. Monte Carlo simulation -- 1.3.3. Solution of equations of motion -- 1.3.4. Normal mode analysis -- 1.4 The Myth of Protein Folding -- 1.4.1. Folding of a closed chain -- 1.4.2. Biological and physical basis -- 1.4.3. Computer simulation -- 1.4.4. Alternative approaches -- Selected Further Readings -- Protein structure -- Structure determination -- Dynamics simulation -- Protein folding -- 2 X-ray Crystallography Computing -- 2.1 The Phase Problem -- 2.1.1. X-ray diffraction -- 2.1.2. Electron scattering -- 2.1.3. Atomic scattering factor -- 2.1.4. Crystal lattice -- 2.2 Least Squares Solutions -- 2.2.1. Diffraction equations -- 2.2.2. Sayre's equations -- 2.2.3. Cochran distributions -- 2.2.4. Minimal principles -- 2.3 Entropy Maximization -- 2.3.1. Entropy vs. probability -- 2.3.2. Maximizing entropy -- 2.3.3. Newton method -- 2.3.4. Fast Fourier transform (FFT) and discrete convolution -- 2.4 Indirect Methods -- 2.4.1. Patterson function -- 2.4.2. Isomorphous replacement -- 2.4.3. Molecular replacement -- 2.4.4. Anomalous scattering -- Selected Further Readings -- The phase problem -- Least squares solutions -- Entropy maximization -- Indirect methods -- 3 NMR Structure Determination -- 3.1 Nuclear Magnetic Resonance -- 3.1.1. Nuclear magnetic fields -- 3.1.2. NMR spectra -- 3.1.3. COSY experiment -- 3.1.4. Nuclear Overhauser effect (NOE) -- 3.2 Distance Geometry.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9789812705891
    Additional Edition: Erscheint auch als Druck-Ausgabe 9789812705891
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore, SG : World Scientific | Birmingham, AL, USA : EBSCO Industries, Inc.
    UID:
    (DE-603)420466703
    Format: 1 Online-Ressource (xii, 230 pages) , Illustrations (some color)
    ISBN: 9812814787 , 9789812814784 , 128196817X , 9781281968173
    Content: While the field of computational structural biology or structural bioinformatics is rapidly developing, there are few books with a relatively complete coverage of such diverse research subjects studied in the field as X-ray crystallography computing, NMR structure determination, potential energy minimization, dynamics simulation, and knowledge-based modeling. This book helps fill the gap by providing such a survey on all the related subjects. Comprising a collection of lecture notes for a computational structural biology course for the Program on Bioinformatics and Computational Biology at Iowa State University, the book is in essence a comprehensive summary of computational structural biology based on the author's own extensive research experience, and a review of the subject from the perspective of a computer scientist or applied mathematician. Readers will gain a deeper appreciation of the biological importance and mathematical novelty of the research in the field.
    Note: Includes bibliographical references and index
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    Passau
    UID:
    (DE-604)BV046828755
    Format: viii, 135, lxxxii Seiten , Illustrationen, Diagramme
    Note: Dissertation Universität Passau 2017
    Additional Edition: Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-6510
    Language: German
    Subjects: Comparative Studies. Non-European Languages/Literatures
    RVK:
    Keywords: Hochschulschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages