IBM Systems Journal
A DCT-domain system for robust image watermarking
Signal Processing
Wireless Networking Handbook
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Wireless and Mobile Network Architectures
Wireless and Mobile Network Architectures
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
MELP: The New Federal Standard at 2400 Bps
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97)-Volume 2 - Volume 2
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
Robust audio watermarking in the time domain
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
A secure mobile communication approach is proposed in this paper. The security of our approach is guaranteed by certification authority and information hiding technique. During the communication, the identity of users will be validated first. The secure speech will be transferred hidden in the public speech. When the public speech arrives at the receiving side, the secure speech will be restored. This approach solves the problem of wiretapping attack, voice-imitating attack and denials after communicating during communication. The experimental results show that this approach is a good solution to mobile secure communication.