Sign in

Critical analysis of security in voice hiding techniques.

Liwu ChangIra S. Moskowitz
Published in: ICICS (1997)
Keyphrases
  • neural network
  • image analysis
  • statistical analysis
  • data sets
  • intrusion detection
  • risk analysis
  • security informatics
  • data mining
  • case study
  • quantitative analysis