Normal view MARC view ISBD view

Information Security for Automatic Speaker Identification [electronic resource] / by Fathi E. Abd El-Samie.

By: El-Samie, Fathi E. Abd [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Speech Technology: Publisher: New York, NY : Springer New York, 2011Description: XIII, 122p. 110 illus., 45 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781441996985.Subject(s): Engineering | Telecommunication | Engineering | Signal, Image and Speech Processing | Communications Engineering, NetworksDDC classification: 621.382 Online resources: Click here to access online
Contents:
1: Fundamentals of Speech Processing -- 2: Chaos Concepts -- 3: Speech Watermarking -- 4: Speech Encryption -- 5. Speech Communication -- 6: Applications in Multi-level Security Systems.
In: Springer eBooksSummary: The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

1: Fundamentals of Speech Processing -- 2: Chaos Concepts -- 3: Speech Watermarking -- 4: Speech Encryption -- 5. Speech Communication -- 6: Applications in Multi-level Security Systems.

The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue