MATH408-master

所属分类:加密解密
开发工具:matlab
文件大小:7KB
下载次数:2
上传日期:2013-04-13 16:08:17
上 传 者hemalchevli
说明:  This has functions to embed files in wav files

文件列表:
Algorithms (0, 2011-09-28)
Algorithms\Echo Hiding (0, 2011-09-28)
Algorithms\Echo Hiding\autoceps.m (797, 2011-09-28)
Algorithms\Echo Hiding\detect_echo_watermark.m (2763, 2011-09-28)
Algorithms\Echo Hiding\echo_watermark.m (3153, 2011-09-28)
Algorithms\Echo Hiding\exponential_decay.m (385, 2011-09-28)
Algorithms\Echo Hiding\single_echo.m (346, 2011-09-28)
Algorithms\LSB Hiding (0, 2011-09-28)
Algorithms\LSB Hiding\lsb_hiding.py (4514, 2011-09-28)

Watermarking Audio Data ======================= A Survey and Comparison of Techniques for Audio Steganography ------------------------------------------------------------- Fred Hatfull April 29, 2011 Case Western Reserve University --------------------------------------------------- This repository is a collection of algorithms accompanying my paper for MATH 408 in the spring of 2011 at Case Western Reserve University. An overview of the talk given supporting the paper is available on [my website](http://fredhatfull.com/2011/04/29/how-to-watermark-audio/) and the paper itself can be downloaded [here](http://fredhatfull.com/media/talks/watermarking_audio/Watermarking%20Audio%20Data.pdf). Included in this collection of algorithms are implementations of an LSB hiding scheme and an echo hiding scheme. Requirements for this software have been estimated but not explored. To run the algorithms, you'll need: * Python 2.7 (other 2.x versions might work, but I have only tested against 2.7) * MATLAB and the Signal Processing Toolbox _References_ 1. P. Dutta, D. Bhattacharyya, and T. Kim, "Data Hiding in Audio Signal: A Review," in _International Journal of Database Theory and Application_, vol. 2, no. 2, June 2009. 2. D. Gruhl, W. Bender, and A. Lu, "Echo hiding," in _Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science)_, vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag, 1996, pp. 295-315. 3. L. Boney, A. H. Tewfik, and K. N. Hamdy, "Digital watermarks for audio signals," in _Proc. 1996 IEEE Int. Conf. Multimedia Computing and Systems_, Hiroshima, Japan, June 17-23, 1996, pp. 473-480. 4. F. Petitcolas, R. Anderson, and M. Kuhn, "Attacks on copyright marking systems," in _Information Hiding, ser. Lecture Notes in Computer Science_. Berlin, Heidelberg: Springer Berlin / Heidelberg, Nov. 19***, vol. 1525, ch. 16, pp. 218-238. 5. Y. Wu, "Nonlinear Collusion Attack on a Watermarking Scheme for Buyer Authentication," in _IEEE Transactions on Multimedia_, vol. 8, no. 3, June 2006, pp. 626-629.

近期下载者

相关文件


收藏者