Audio Watermarking by DWT-SVD
☆26Feb 16, 2019Updated 7 years ago
Alternatives and similar repositories for DWT-SVD
Users that are interested in DWT-SVD are comparing it to the libraries listed below
Sorting:
- Deep Reinforcement Learning library for Python☆10Jun 9, 2022Updated 3 years ago
- automatic music transcription application written in java☆12Jan 13, 2013Updated 13 years ago
- A dead simple library to simulate Minecraft biomes in pure Java☆10Jun 15, 2023Updated 2 years ago
- How to create a Minecraft server using WireGuard & PiVPN!☆14Feb 24, 2025Updated last year
- Inform 7 with illustrative examples of play☆12Aug 23, 2024Updated last year
- Playdate Horror game being written in Love2D, then refactored to be playable on the Playdate.☆14Jul 1, 2022Updated 3 years ago
- An Implementation of the MLS (Messaging Layer Security) Standard (RFC 9420) in Kotlin☆12Mar 15, 2024Updated last year
- From barbarism to civilization requires a century; from civilization to barbarism needs but a day.☆12Jul 17, 2023Updated 2 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- ☆12Oct 8, 2025Updated 4 months ago
- ☆10Apr 5, 2019Updated 6 years ago
- Implementation of the single-step key derivation function (KDF) as described in NIST Special Publication 800-56C Rev1 supporting messages…☆10Mar 12, 2023Updated 2 years ago
- This is a Node.js wrapper around ZoKrates.☆10May 18, 2020Updated 5 years ago
- ☆10Sep 4, 2021Updated 4 years ago
- Format-Preserving-Encryption for .NET☆13Dec 12, 2024Updated last year
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Various improvements to voice chat groups.☆13Dec 10, 2025Updated 2 months ago
- Password management and cracking training☆13Jul 15, 2025Updated 7 months ago
- Start a Hardhat Network node from the command line☆12Oct 1, 2021Updated 4 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- An infinite canvas built for brainstorming.☆13Jul 31, 2024Updated last year
- A watertight chamber used in construction work under water or as a foundation.☆11Jul 16, 2024Updated last year
- ☆17Apr 25, 2023Updated 2 years ago
- A standalone AES-KW (AES Key Wrap) implementation.☆14Dec 31, 2023Updated 2 years ago
- Using NFT (Non-fungible tokens) and Zero Knowledge to enable privacy and traceability of data sharing on the Blockchain☆11Jul 12, 2023Updated 2 years ago
- Experimental committing AEAD designed by Soatok.☆10Sep 10, 2020Updated 5 years ago
- Source code and usage information for C# Glulx interpreter and state machine wrapper.☆13Jan 14, 2014Updated 12 years ago
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated 11 months ago
- FPE - Format Preserving Encryption with FF3 in C☆14Jan 26, 2026Updated last month
- Use Easy Dice to roll dice of your choosing.☆15Dec 31, 2024Updated last year
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- Playdate Examples☆11May 1, 2023Updated 2 years ago
- Official implementation of paper "HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platfor Efficiency"☆19Nov 11, 2025Updated 3 months ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- A small, self-contained SHA512 and HMAC-SHA512 implementation.☆10Feb 13, 2026Updated 3 weeks ago
- An implementation of the ROCCA-S encryption scheme.☆20Jan 29, 2026Updated last month
- IPFS gateway for the POB project☆12Apr 26, 2021Updated 4 years ago
- AEGIS-256☆11Apr 17, 2022Updated 3 years ago