margaritageleta / PixInWav
Hide image in audio. Image in audio steganography with deep learning. Deep learning-based psychoacoustic steganography within earshot.
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for PixInWav
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆20Updated last year
- ☆35Updated 3 years ago
- ☆11Updated last year
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆13Updated 3 years ago
- ☆38Updated 3 weeks ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆26Updated last year
- ICASSP 2021 accepted paper☆18Updated 3 years ago
- ☆10Updated last year
- Adversarial attack and defense strategies for deep speaker recognition systems☆40Updated 3 years ago
- Dataset/code for AudioMarkBench: Benchmarking Robustness of Audio Watermarking☆16Updated 2 months ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆23Updated 4 years ago
- The source code of "Audio steganalysis with Improved CNN"☆13Updated 5 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Updated 2 years ago
- DNN-based audio watermarking☆41Updated 10 months ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆27Updated 5 years ago
- Robust Audio Adversarial Example for a Physical Attack☆60Updated 5 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆33Updated 4 years ago
- ☆15Updated 2 months ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆35Updated this week
- ☆36Updated 5 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆101Updated 2 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆23Updated last year
- Official Implementation of VoxTracer (MM' 23)☆10Updated last year
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆33Updated 3 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆30Updated 7 months ago
- Image steganography usings Generative Adverserial Networks☆32Updated last month
- Implementations of different audio watermarking techniques☆17Updated 2 years ago
- This is the codebase for defense framework described in USENIX '21 paper "WaveGuard: Understanding and Mitigating Audio Adversarial Examp…☆16Updated 3 years ago
- The official implementation of the paper "Defending Your Voice: Adversarial Attack on Voice Conversion".☆43Updated 6 months ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆25Updated last year