Welcome![Sign In][Sign Up]
Location:
Search - audio data hiding

Search list

[Software Engineeringvm

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 207872 | Author: vinay | Hits:

[Software Engineeringamorph

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 199680 | Author: vinay | Hits:

[Software Engineeringvm2

Description: Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technology, an audio watermarking algorithm is proposed where the low-frequency wavelet coefficients are chosen for cepstrum transforming. Then, the obtained cepstrum data shows stable for watermark hiding by the methods of edging data cutting and statistical mean modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for the mobile audio in secure broadcast and management in the
Platform: | Size: 346112 | Author: vinay | Hits:

[Audio programmatlabcodeechohiding

Description: this the sample of matlab coding for echo hiding data audio steganography... use your own input-this is the sample of matlab coding for echo hiding data audio steganography... use your own input
Platform: | Size: 9216 | Author: shahmin | Hits:

[Multimedia programstegnography

Description: Data hiding in the still image presets a variety of challenges that arises due to the way human visual system (HVS) works and the typical modifications that image undergoes. Additionally, still images priced a relatively small host signal in which to hide data. A fairly typical 8-bit picture of 200*200 pixels provides approximately 40 KB of data space in which to work. This is equivalent to around 5 seconds of telephone-quality audio or less than a single frame NTSC television.
Platform: | Size: 199680 | Author: rupesh | Hits:

[Special Effects2010Robust

Description: 强大的音频数据隐藏的使用以及相关量化直方图检测器-Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector
Platform: | Size: 622592 | Author: wangtong | Hits:

[File Formataudio

Description: Audio steganography Hiding data extracting data main algrithm
Platform: | Size: 1024 | Author: Nitish joe | Hits:

[Other Embeded programsteganography

Description: data hiding in audio signal, using matlab
Platform: | Size: 1024 | Author: mike | Hits:

[Software EngineeringIJETTCS-2013-11-11-007

Description: Data hiding in audio by using image steganography technique
Platform: | Size: 120832 | Author: selva | Hits:

[Internet-Networkkttsw_v8.0

Description: KT听书网KT有声小说网源码,集成了优秀的小说CMP播放器和KT小说联盟的采集插件,资源丰富。 支持对连载小说、推荐小说、热门小说、隐藏小说进行单独批量管理! 支持小说在线播放和小说下载。 全面支持本地小说批量添加,完美支持本地多服务器路径设置! 支持小说推荐,小说标题颜色以及数据隐藏! 安装说明: 一:将程序上传至空间 二:运行http://你的域名 首次登陆后会自动配置安装,重新安装程序,请先删除inc/install.lock文件 三:安装完毕,进入至后台管理 后台地址:http://你的域名/admin-KT listen to Shuwang KT audio novel network source, integrated excellent novel CMP player and KT novel alliance acquisition plug-in, is rich in resources. Support for the series of novels, fiction, popular fiction, recommended, hidden novel separate batch management! Support online play and download fiction novels. The full support of local novels to batch add, perfect support setting local multi server path! To support novel recommended, the novel title color and data hiding! Installation instructions: A: will be uploaded to the space program Two: run http:// your domain name first landing will automatically configure installed, reinstall the program, please delete the file inc/install.lock Three: after installation, to enter into the background management Background: the http:// address of your domain name /admin
Platform: | Size: 2282496 | Author: HanHn | Hits:

[Crack HackIJETTCS-2013-11-11-007

Description: Data hiding in audio by using image steganography technique
Platform: | Size: 120832 | Author: selva | Hits:

[Mathimatics-Numerical algorithmsData-Hiding-Using-Audio-Steganography

Description: INFORMATION HIDING USING AUDIO STEGANOGRAPHY – A SURVEY
Platform: | Size: 429056 | Author: selva | Hits:

[Delphi/CppBuilderdownload-(13)

Description: data hiding in audio signal, using matlab
Platform: | Size: 8192 | Author: Ramya | Hits:

[Audio programaudio

Description: this a steganography based program for hiding the info in the image file you can send the data across the network -this is a steganography based program for hiding the info in the image file you can send the data across the network
Platform: | Size: 60416 | Author: physcho sam | Hits:

[Report papersSpeech watermarking using Deep Neural Networks

Description: Watermarking is a process in which both physical and digital media are marked using watermarks in order to protect ownership of the watermarked media. Digital water- marking is a technique where a watermark gets embedded into the carrier signal while preserving the quality of the original media. Embedding can happen in various domains and could be both hidden and plain, but the quality and the information carried by the signal should not deteriorate. This paper deals with hiding watermarks into speech audio signals using deep neural networks. We present an encoder-decoder architecture that achieved PSNR value greater than 57dB, which we used as a preservation measure of the original signal and message transmission accuracy of almost 100%. Audio data, used in this paper, consists of speeches from the Parliament of Montenegro.
Platform: | Size: 1057925 | Author: bamzi334 | Hits:

CodeBus www.codebus.net