ktekeli / audio-steganography-algorithms
A Library of Audio Steganography & Watermarking Algorithms
☆249Updated 10 months ago
Related projects: ⓘ
- Audio Watermarking by DWT-SVD☆25Updated 5 years ago
- The source code of "Audio steganalysis with Improved CNN"☆13Updated 5 years ago
- An audio steganalysis method based on CNN in the time domain.☆9Updated 3 years ago
- Audio Watermark using DWT-DCT approach and scrambling image for embedding of binary or grayscale image into audio signal☆26Updated 4 years ago
- 🎓 "Digital audio-watermarking for analog transmission channels", 2014, Bachelor Thesis, TU Wien☆20Updated 3 years ago
- ☆34Updated 3 years ago
- Add digital watermarks to audio files☆33Updated 13 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆22Updated 4 years ago
- Digital audio watermarker that can encode and extract secret messages from sound files. Written using MATLAB.☆15Updated 4 years ago
- Hide image in audio. Image in audio steganography with deep learning. Deep learning-based psychoacoustic steganography within earshot.☆23Updated last year
- Implementations of different audio watermarking techniques☆17Updated last year
- DNN-based audio watermarking☆39Updated 8 months ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆19Updated last year
- A Matlab project uses Signal Processing Technique — Digital Watermark to hide data in an audio track☆18Updated 5 years ago
- This is MATLAB code for blind audio watermarking using Arnold transform and ECC☆15Updated 4 years ago
- AI-based Audio Watermarking Tool☆212Updated 8 months ago
- Image & video steganography in Matlab☆41Updated 11 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆67Updated 4 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆97Updated last year
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆33Updated 4 years ago
- ☆36Updated 5 years ago
- JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with Squeeze-Excitation and Residual neTworks (ASSERT).☆55Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆34Updated 4 months ago
- Data split we use during the ASVspoof 2019 challenge☆16Updated 4 years ago
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆16Updated 4 years ago
- ☆10Updated last year
- Official implementation of the SPL paper "One-class Learning Towards Synthetic Voice Spoofing Detection"☆103Updated 3 weeks ago
- Environmental sound classification using Deep Learning with extracted features☆161Updated 4 years ago
- Adversarial Attacks☆55Updated 5 years ago
- Speech Processing Toolbox for MATLAB☆235Updated this week