Login / Signup
Critical analysis of security in voice hiding techniques.
Liwu Chang
Ira S. Moskowitz
Published in:
ICICS (1997)
Keyphrases
</>
neural network
image analysis
statistical analysis
data sets
intrusion detection
risk analysis
security informatics
data mining
case study
quantitative analysis