• No results found

Steganalysis of compressed speech to detect covert voice over Internet protocol channels

N/A
N/A
Protected

Academic year: 2020

Share "Steganalysis of compressed speech to detect covert voice over Internet protocol channels"

Copied!
24
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1: The bit allocation of the 6.3kb/s coding algorithm
Table 2: Capability of Noise Tolerance (CNT) of G.723.1 speech parameters
Table 3:  fTp values for different speech parameters before and after embedding messages
Table 4: The real and estimated embedding rates for different compressed speech cover objects
+6

References

Related documents

With the procedures shown through Kieran and Timberlake’s denouncing of traditional construction techniques in order to develop an efficient and successful prefabricated module

We conclude with recom- mendations for the types of policy changes needed in BC (and Canada) that are in line with best practices from high performing health systems,

I will present empirical evidence to show that the possibility of structural reform is determined by the strength and level of opposition of the organized civil society. As table

tab. Enable the Prompt at Print-Time checkbox 5. This is nowhere near as long a process as the above sequence suggests and only takes a few seconds. Still, this used to be the

Metso, with over half a century of experience in designing and Metso, with over half a century of experience in designing and manufacturing rotary kiln-based thermal processing

The second reason for undertaking this research came to light when the researcher was carrying out research for the Masters in Education and Training Management, where she found

Disseminated tumor cells in bone marrow of gastric cancer patients: correlation with tumor hypoxia and clinical relevance. International Union Against Cancer, TNM Classifica- tion

Given a statistical model consisting of a set of observed data, a set of unobserved latent data or missing values , and a vector of unknown parameters , along with a