Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
508 Military Communications and Information Technology... References [1] H.I. Shahadi, R. Jidin, High capacity and inaudibility audio steganography scheme, Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011, 2011, Article number 6122803, pp. 104-109. [2] D.M.L. Ballesteros, J.M.A. Moreno, Highly transparent steganography model of speech signals using Efficient Wavelet Masking, Expert Systems with Applications, vol. 39, Issue 10, 2012, pp. 9141-9149. [3] M. Baritha Begum, Y. Venkataramani, LSB based audio steganography based on text compression, Procedia Engineering, vol. 30, 2012, pp. 702-710. [4] W. Zeng, R. Hu, H. Ai, Audio steganalysis of spread spectrum information hiding based on statistical moment and distance metric, Multimedia Tools and Applications, vol. 55, Issue 3, December 2011, pp. 525-556. [5] M. Sliskovic, Sampling frequency offset estimation and correction in OFDM systems”, Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, vol. 1, 2001, Article number 957773, pp. 437-440. [6] P.H. Moose, Technique for orthogonal frequency division multiplexing frequency offset correction, IEEE Transactions on Communications, vol. 42, Issue 10, October 1994, pp. 2908-2914. [7] P. Gajewski, J. Łopatka, Z. Piotrowski, A New method of frequency correction using coherent averaging, Journal of Telecommunications and Information Technology, 1/2005, pp. 142-146. [8] Z. Piotrowski, Drift correction modulation scheme for digital audio watermarking, Proceedings – 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, 2010, Article number 5670982, pp. 392-397. [9] P. Dymarski, R. Markiewicz, Time and sampling frequency offset correction in audio watermarking, International Conference on Systems, Signals, and Image Processing, 2011, Article number 5977417, pp. 291-294. [10] Z. Piotrowski, Precise psychoacoustic correction method based on calculation of JND level, Acta Physica Polonica A, vol. 116, Issue 3, September 2009, pp. 375-379.
Index
- Page 457 and 458: Chapter 4: Information Assurance &
- Page 459 and 460: Chapter 4: Information Assurance &
- Page 461 and 462: Chapter 4: Information Assurance &
- Page 463: Chapter 4: Information Assurance &
- Page 466 and 467: 466 Military Communications and Inf
- Page 468 and 469: 468 Military Communications and Inf
- Page 470 and 471: 470 Military Communications and Inf
- Page 472 and 473: 472 Military Communications and Inf
- Page 474 and 475: 474 Military Communications and Inf
- Page 476 and 477: 476 Military Communications and Inf
- Page 478 and 479: 478 Military Communications and Inf
- Page 480 and 481: 480 Military Communications and Inf
- Page 482 and 483: 482 Military Communications and Inf
- Page 485 and 486: Modern Usage of “Old” One-Time
- Page 487 and 488: Chapter 4: Information Assurance &
- Page 489 and 490: Chapter 4: Information Assurance &
- Page 491 and 492: Chapter 4: Information Assurance &
- Page 493 and 494: Chapter 4: Information Assurance &
- Page 495: Chapter 4: Information Assurance &
- Page 498 and 499: 498 Military Communications and Inf
- Page 500 and 501: 500 Military Communications and Inf
- Page 502 and 503: 502 Military Communications and Inf
- Page 504 and 505: 504 Military Communications and Inf
- Page 506 and 507: 506 Military Communications and Inf
- Page 511 and 512: A Abut Fatih 161 Akcaoglu Ismail 11
Index