Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 207872 |
Author:vinay |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 199680 |
Author:vinay |
Hits:
Description: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the Platform: |
Size: 346112 |
Author:vinay |
Hits:
Description: this the sample of matlab coding for echo hiding data audio steganography... use your own input-this is the sample of matlab coding for echo hiding data audio steganography... use your own input Platform: |
Size: 9216 |
Author:shahmin |
Hits:
Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television. Platform: |
Size: 199680 |
Author:rupesh |
Hits:
Description: KT听书网KT有声小说网源码,集成了优秀的小说CMP播放器和KT小说联盟的采集插件,资源丰富。
支持对连载小说、推荐小说、热门小说、隐藏小说进行单独批量管理!
支持小说在线播放和小说下载。
全面支持本地小说批量添加,完美支持本地多服务器路径设置!
支持小说推荐,小说标题颜色以及数据隐藏!
安装说明:
一:将程序上传至空间
二:运行http://你的域名 首次登陆后会自动配置安装,重新安装程序,请先删除inc/install.lock文件
三:安装完毕,进入至后台管理
后台地址:http://你的域名/admin-KT listen to Shuwang KT audio novel network source, integrated excellent novel CMP player and KT novel alliance acquisition plug-in, is rich in resources.
Support for the series of novels, fiction, popular fiction, recommended, hidden novel separate batch management!
Support online play and download fiction novels.
The full support of local novels to batch add, perfect support setting local multi server path!
To support novel recommended, the novel title color and data hiding!
Installation instructions:
A: will be uploaded to the space program
Two: run http:// your domain name first landing will automatically configure installed, reinstall the program, please delete the file inc/install.lock
Three: after installation, to enter into the background management
Background: the http:// address of your domain name /admin Platform: |
Size: 2282496 |
Author:HanHn |
Hits:
Description: this a steganography based program for hiding the info in the image file you can send the data across the network -this is a steganography based program for hiding the info in the image file you can send the data across the network Platform: |
Size: 60416 |
Author:physcho sam |
Hits:
Description: Watermarking is a process in which both physical
and digital media are marked using watermarks in order to
protect ownership of the watermarked media. Digital water-
marking is a technique where a watermark gets embedded into
the carrier signal while preserving the quality of the original
media. Embedding can happen in various domains and could
be both hidden and plain, but the quality and the information
carried by the signal should not deteriorate. This paper deals
with hiding watermarks into speech audio signals using deep
neural networks. We present an encoder-decoder architecture
that achieved PSNR value greater than 57dB, which we used
as a preservation measure of the original signal and message
transmission accuracy of almost 100%. Audio data, used in this
paper, consists of speeches from the Parliament of Montenegro. Platform: |
Size: 1057925 |
Author:bamzi334 |
Hits: