{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:10:25Z","timestamp":1725664225624},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_25","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:54:01Z","timestamp":1330289641000},"page":"213-236","source":"Crossref","is-referenced-by-count":0,"title":["Coding and cryptography for speech and vision"],"prefix":"10.1007","author":[{"given":"E. V.","family":"Stansfield","sequence":"first","affiliation":[]},{"given":"M.","family":"Walker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"issue":"No.7","key":"25_CR1","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1049\/el:19950379","volume":"31","author":"I. A. Atkinson","year":"1995","unstructured":"Atkinson I. A., Kondoz A.M., Evans B.G.: 1. 6 kbit\/s LP vocoder using time envelope. IEE Electronics Letters 31 No. 7 (30 March 1995) pp. 517\u2013518","journal-title":"IEE Electronics Letters"},{"key":"25_CR2","unstructured":"Beaumont J.M.: Advances in block based fractal coding of still images. IEE Colloquium \u201cApplication of fractal techniques in image processing\u201d, Digest 1990\/171 (3 December 1990)"},{"key":"25_CR3","unstructured":"Beker H.J., Piper F.: Secure speech communications. Academic Press (1985)"},{"key":"25_CR4","unstructured":"Cattermole K.W.: Principles of PCM. Iliffe (1969)"},{"key":"25_CR5","unstructured":"C-Cube Microsystems: CL550 JPEG Image Compression master Processor. Preliminary data Book (Novemer 1990)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chater-Lea, D.: Security in PMR systems. IEE Colloquium \u201cSecurity in Networks\u201d Digest 1995\/024 (February 1995)","DOI":"10.1049\/ic:19950133"},{"key":"25_CR7","unstructured":"Cheetham B.M., Wong W.T.K.: Adaptive LSP filter for sub-band coding of speech. IEE Colloquium \u201cDigital signal processing\u201d Digest 1987\/14 (26 January 1987)"},{"issue":"No.1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/26.126715","volume":"COM-40","author":"N.-T. Cheng","year":"1992","unstructured":"Cheng N.-T., Kingsbury N.G.: The ERPC \u2014 an efficient error resilient technique for encoding positional information or sparse data. IEEE Trans COM-40 No. 1 (January 1992) pp. 140\u2013148","journal-title":"IEEE Trans"},{"issue":"No.6","key":"25_CR9","first-page":"356","volume":"128","author":"R.J. Clarke","year":"1981","unstructured":"Clarke R.J.: Relation between Karhunen-Loeve and cosine transforms. IEE Proc-F 128 No. 6 (November 1981) pp. 356\u2013360","journal-title":"IEE Proc-F"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Flanagan J.L.: Speech Analysis, synthesis and perception. Springer-Verlag (1972)","DOI":"10.1007\/978-3-662-01562-9"},{"issue":"No.11","key":"25_CR11","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1109\/26.241752","volume":"COM-41","author":"F. Huang","year":"1993","unstructured":"Huang F., Stansfield E.V.: Time sample speech scrambler which does not require synchronisation. IEEE Trans COM-41 No. 11 (November 1993) pp. 1715\u20131722","journal-title":"IEEE Trans"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Jacquin A.E.: A novel fractal block coding technique for digital images. IEEE ICASSP (1990) pp. 2225\u20138","DOI":"10.1109\/ICASSP.1990.116007"},{"key":"25_CR13","unstructured":"Jayant N.S., Noll P.: Digital coding of waveforms. Prentice Hall (1984)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Jefferies, N., Mitchell, C. and Walker, M.: Proposed architecture for trusted third party services. Proc. Cryptography: policy and algorithms conference, Brisbane (July 1995)","DOI":"10.1007\/BFb0032349"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Kleijn W.B.: Continuous representations in linear prediction. IEEE ICASSP (1991) pp. 201\u20134","DOI":"10.1109\/ICASSP.1991.150312"},{"key":"25_CR16","unstructured":"Kondoz A.M.: Digital speech. Wiley (1994)"},{"issue":"No.4","key":"25_CR17","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/PROC.1975.9792","volume":"63","author":"J. Makhoul","year":"1975","unstructured":"Makhoul J.: Linear prediction: a tutorial review. Proc. IEEE 63 No. 4 (1975) pp. 561\u2013580","journal-title":"Proc. IEEE"},{"key":"25_CR18","unstructured":"Malvar H.S.: Signal Processing with lapped transforms. Artech House (1992)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Markel J.D., Gray A.H.: Linear prediction of speech. Springer-Verlag (1975)","DOI":"10.1007\/978-3-642-66286-7"},{"key":"25_CR20","unstructured":"Mouly, M. and Pautet, Marie-Bernadette: The GSM system for mobile communications. (1992)"},{"key":"25_CR21","unstructured":"NIST, FIPS Publication 185: Escrowed Encryption Standard. (February 1994)"},{"key":"25_CR22","unstructured":"Rabiner L.R., Schafer R.W.: Digital processing of speech signals. Prentice Hall (1978)"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Shelswell P.: The COFDM modulation system: the heart of digital audio broadcast. IEE ECEJ (June 1995) pp. 127\u2013136","DOI":"10.1049\/ecej:19950309"},{"issue":"No.1","key":"25_CR24","first-page":"25","volume":"136","author":"E.V. Stansfield","year":"1989","unstructured":"Stansfield E.V., Harmer D., Kerrigan M.F.: Speech processing techniques for HF radio security. IEE Proc-I 136 No. 1 (February 1989) pp. 25\u201346","journal-title":"IEE Proc-I"},{"key":"25_CR25","unstructured":"Steele R.: Delta modulation systems. Pentech (1975)"},{"issue":"No.1","key":"25_CR26","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/ip-vis:19951688","volume":"142","author":"A.-N. Suen","year":"1995","unstructured":"Suen A.-N., Wang J.-F., Yao T.-C: Dynamic partial search scheme for stochastic codebook of FS1016 CELP coder. IEE Proc. Vis. Image Signal Processing 142 No. 1 (February 1995) pp. 52\u201358","journal-title":"IEE Proc. Vis. Image Signal Processing"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Walker, M.: Security in mobile and cordless telecommunications. IEEE Computer Society (1992)","DOI":"10.1109\/CMPEUR.1992.218434"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:01:32Z","timestamp":1605646892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}