Normal view MARC view ISBD view

Information Security for Automatic Speaker Identification [electronic resource] /by Fathi E. Abd El-Samie.

by El-Samie, Fathi E. Abd [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Speech Technology: Publisher: New York, NY : Springer New York, 2011.Description: XIII, 122p. 110 illus., 45 illus. in color. online resource.ISBN: 9781441996985.Subject(s): Engineering | Telecommunication | Engineering | Signal, Image and Speech Processing | Communications Engineering, NetworksDDC classification: 621.382 Online resources: Click here to access online
Contents:
1: Fundamentals of Speech Processing -- 2: Chaos Concepts -- 3: Speech Watermarking -- 4: Speech Encryption -- 5. Speech Communication -- 6: Applications in Multi-level Security Systems.
In: Springer eBooksSummary: The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

1: Fundamentals of Speech Processing -- 2: Chaos Concepts -- 3: Speech Watermarking -- 4: Speech Encryption -- 5. Speech Communication -- 6: Applications in Multi-level Security Systems.

The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha