A New Algorithm for a Steganography System
A New Algorithm for a Steganography System

Atheer Alaa Sabri; Marwa Jaleel Mohsin

Volume 33, 8A , October 2015, , Page 1955-1970

https://doi.org/10.30684/etj.2015.108835

Abstract
  Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties.This paper,displays othersteganographic algorithms for ...  Read More ...
Content-Based Authentication Using Digital Speech Data
Content-Based Authentication Using Digital Speech Data

Hanaa M. Salman

Volume 26, Issue 2 , February 2008, , Page 228-239

https://doi.org/10.30684/etj.26.2.10

Abstract
  A watermarking technique for speech content and speaker authenticationscheme, which is based on using abstracts of speech features relevant to semanticmeaning and combined with an ID ...  Read More ...
A Content-Based Authentication Using Digital Speech Data
A Content-Based Authentication Using Digital Speech Data

Hanaa M. Salman

Volume 25, Issue 10 , December 2007, , Page 1162-1170

https://doi.org/10.30684/etj.25.10.7

Abstract
  A watermarking technique for speech content and speaker authenticationscheme, which is based on using abstracts of speech features relevant tosemantic meaning and combined with an ID ...  Read More ...
Channel Equalization Using Wavelet Denoising
Channel Equalization Using Wavelet Denoising

M. H. Miry

Volume 25, Issue 9 , November 2007, , Page 1081-1091

https://doi.org/10.30684/etj.25.9.6

Abstract
  A problem in digital signal transmission occurs when a signal in onesignal interval overlaps the signal in an adjacent interval. This problem is calledintersymbol interference and limits ...  Read More ...