ktekeli / audio-steganography-algorithms
A Library of Audio Steganography & Watermarking Algorithms
☆255Updated last year
Related projects ⓘ
Alternatives and complementary repositories for audio-steganography-algorithms
- Audio Watermarking by DWT-SVD☆25Updated 5 years ago
- An audio steganalysis method based on CNN in the time domain.☆9Updated 3 years ago
- The source code of "Audio steganalysis with Improved CNN"☆13Updated 5 years ago
- Audio Watermark using DWT-DCT approach and scrambling image for embedding of binary or grayscale image into audio signal☆26Updated 4 years ago
- DNN-based audio watermarking☆41Updated 11 months ago
- 🎓 "Digital audio-watermarking for analog transmission channels", 2014, Bachelor Thesis, TU Wien☆20Updated 3 years ago
- Add digital watermarks to audio files☆33Updated 13 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆20Updated last year
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆24Updated 4 years ago
- Implementations of different audio watermarking techniques☆17Updated 2 years ago
- ☆35Updated 3 years ago
- A Matlab project uses Signal Processing Technique — Digital Watermark to hide data in an audio track☆18Updated 5 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆13Updated 3 years ago
- AI-based Audio Watermarking Tool☆228Updated 10 months ago
- This is MATLAB code for blind audio watermarking using Arnold transform and ECC☆15Updated 4 years ago
- Audio Watermarking☆396Updated 5 months ago
- Hide image in audio. Image in audio steganography with deep learning. Deep learning-based psychoacoustic steganography within earshot.☆23Updated 2 years ago
- Audio Coding Tutorials☆35Updated 2 weeks ago
- Digital audio watermarker that can encode and extract secret messages from sound files. Written using MATLAB.☆15Updated 4 years ago
- ☆40Updated last month
- Performed Sound Source Localization in a Reverberant Environment☆31Updated 3 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆101Updated 2 years ago
- Adversarial Attacks☆55Updated 5 years ago
- For "Deep Learning class" at ETHZ. Evaluate how well the fake voice of Barack Obama 1. confuses the voice verification system, 2. can be …☆36Updated last year
- Blind Source Separation for Audio Recognition Tasks☆101Updated 2 years ago
- JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with Squeeze-Excitation and Residual neTworks (ASSERT).☆57Updated last year
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆16Updated 4 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆33Updated 4 years ago
- Data split we use during the ASVspoof 2019 challenge☆16Updated 4 years ago
- C++ and MATLAB code for fast and accurate fundamental frequency estimation☆98Updated last year