CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - audio
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - audio - List
[
Crack Hack
]
fft2melmx
DL : 0
the convert the audio from the cep unit fft to mel spectrum-the convert the audio from the probes unit fft t o mel spectrum
Date
: 2008-10-13
Size
: 2.2kb
User
:
雷柏英
[
Crack Hack
]
melfccfingerprint
DL : 0
use the matlab tool to do the mel analysis in the audio fingerprinting system.-use the Matlab tool to do the analysis in mel the audio fingerprinting system.
Date
: 2008-10-13
Size
: 2.64kb
User
:
雷柏英
[
Crack Hack
]
PsychoAcoustic_MPEG_1_Layer_I_Matlab
DL : 0
音频的水印加入算法,采用matlab实现-joined audio watermarking algorithm, using Matlab to achieve
Date
: 2025-12-27
Size
: 24kb
User
:
张海滨
[
Crack Hack
]
fft2melmx
DL : 0
the convert the audio from the cep unit fft to mel spectrum-the convert the audio from the probes unit fft t o mel spectrum
Date
: 2025-12-27
Size
: 2kb
User
:
雷柏英
[
Crack Hack
]
melfccfingerprint
DL : 0
use the matlab tool to do the mel analysis in the audio fingerprinting system.-use the Matlab tool to do the analysis in mel the audio fingerprinting system.
Date
: 2025-12-27
Size
: 2kb
User
:
雷柏英
[
Crack Hack
]
powspec
DL : 0
power spectrum analysis of the audio fingerprint system-power spectrum analysis of the audio finger rprint system
Date
: 2025-12-27
Size
: 1kb
User
:
雷柏英
[
Crack Hack
]
USB_Complete_Develop_Custom_Peripherals
DL : 0
For developers who design and program devices that use the USB interface. Introduce the USB and help to get your devices and communicating as quickly and easily as possible.The USB is versatile enough for a wide range of peripheral devices. Standard peripherals that use USB include mice, keyboards, drives, printers, and audio/video devices. USB is also suitable for data-acquisition units, control systems, and other devices with specialized functions, including one-of-a-kind designs.
Date
: 2025-12-27
Size
: 5.34mb
User
:
jbarragan
[
Crack Hack
]
DMIS_Ch3_InfoHiding
DL : 0
信息隐藏基础 数字媒体包括了图像、文字以及音频、视频等各种形式,以及传播形式和传播内容中采用数字化,即信息的采集、存取、加工和分发的数字化过程。数字媒体已经成为继语言、文字和电子技术之后的最新的信息载体。 通过本文你可以了解现代密码系统的基本知识,掌握常用的图像加密技术的基本思想。 具体包含: 1 信息隐藏概述 2 隐写术的基本原理 3 隐写 4 隐写分析技术-Information hiding based on digital media including images, text and audio, video and other forms, as well as the spread and dissemination of the contents of the form used in digital, that is, information collection, access, processing and distribution of the digital process. Digital media has become the language and the latest electronic technology of the information carrier. Through this article you can learn the basic of modern cryptography knowledge, the images used to master the basic idea of encryption technology. Specifically includes: 1 information hiding steganography outlined 2 of the 3 basic principles of steganography steganalysis technique 4
Date
: 2025-12-27
Size
: 362kb
User
:
Yummy
[
Crack Hack
]
code
DL : 0
此算法用于实现一种基于查找表的混沌加密,将随机产生的一个数组加密后输出,同时也可以将解密后的数据与原始数据进行对照,本算法已经在5509芯片上进行实时运行过,用于对16bit语音信号的高16位加密,能满足实时性。-The algorithm used to achieve a look-up table based chaotic encryption, will be an array of randomly generated encrypted output, but also can decrypt the original data and control data, the algorithm has been in the 5509 chip for real-time operation, and 16bit audio signal for 16-bit high encryption, to meet the real-time.
Date
: 2025-12-27
Size
: 1kb
User
:
张司兴
[
Crack Hack
]
watermarking
DL : 0
对音频信号分帧加窗,对每帧进行三阶小波变换,取其逼近系数平均值(一般为零).在此嵌入二值图像 并有对潜入水印信号进行盲检,恢复其嵌入水印-Sub-frame of the audio signal increases the Hamming window for each frame impletment third-order wavelet transform, whichever is close to the average coefficient (usually zero). according to this embedding binary image and resume its embedded watermark from the watermark signal by the Blind detection
Date
: 2025-12-27
Size
: 2kb
User
:
wangyapeng
[
Crack Hack
]
waterprint
DL : 0
音频添加水印的详细程序 源码 希望对大家有所帮助-Add audio watermark detailed procedures
Date
: 2025-12-27
Size
: 1.67mb
User
:
黄话
[
Crack Hack
]
steg1
DL : 0
this program steganographs an image into another image. however the host and the specimen are image equivalents of audio signals which are rearranged to form an image. thus effectively it is audio steganography
Date
: 2025-12-27
Size
: 504kb
User
:
Abhishek Sharma
[
Crack Hack
]
an_intellegent_audio_water_marking_based_on_dwt-s
DL : 0
All three, Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) and Adaptive Tabu Search (ATS) have been used as mathematical tools for embedding data into an audio signal. In this paper, we present a new robust audio watermarking scheme based on DWT-SVD and ATS. After applying the DWT to the cover audio signal, we map the DWT coefficients, and apply the SVD, we search for the optimal intensity of audio watermarking by using the ATS. Experimental results show that the watermarking method performs well in both security and robustness to many digital signals processing, such as filtering, cropping, mp3 and random noise.
Date
: 2025-12-27
Size
: 261kb
User
:
Rishi
[
Crack Hack
]
dessoundsignal
DL : 0
运用DES算法对音频信号进行加密处理,主要采用置换和移位运算来实现加解密.-DES algorithm used to encrypt the audio signal processing, mainly replacement and shift operations to achieve encryption.
Date
: 2025-12-27
Size
: 3kb
User
:
yuanyuan
[
Crack Hack
]
lsbsoundsignal
DL : 0
最不 重 要 位(LSB)方法DO是将秘密数据(水印数据)嵌入到载体数据中最简单的一种方法,它是在时域里隐藏数据。任何的秘密数据都可以看作是一串二进制位流,而音频文件的每一个采样数据也是以二进制数来表示。这样,可以将部分采样值的最不重要位用代表秘密数据的二进制位替换掉,以达到在音频信号中嵌入秘密数据的目的。-The most significant bits (LSB) method of DO is the secret data (watermark data) embedded into the data in the simplest way, which is hidden data in the time domain. Any secret data can be viewed as a string of binary bit stream, and audio files of data for each sample is expressed in binary numbers. This value can be part of the sample with the least bit representative of the secret bits of data and replace the audio signal to achieve the purpose of embedding the secret data.
Date
: 2025-12-27
Size
: 1kb
User
:
yuanyuan
[
Crack Hack
]
matlab
DL : 1
基于回声隐藏的信息隐藏算法,是一种音频信号的水印技术,包括隐藏信息的嵌入和提取,以及对于噪声,MP3压缩,滤波,重采样和延迟攻击的模拟。-Based on echo hiding information hiding algorithm, is an audio signal watermarking techniques, including embedding and extracting hidden information, as well as for noise, MP3 compression, filtering, resampling and delay attack simulation.
Date
: 2025-12-27
Size
: 517kb
User
:
张小小
[
Crack Hack
]
hundunjiami
DL : 0
一个关于加密音频,图像的VB程序,功能还算可以,希望可以帮到人-One on encryption of audio, images VB program, function OK, the desire to help people! !
Date
: 2025-12-27
Size
: 766kb
User
:
张建萍
[
Crack Hack
]
Audio-Power-Amplifier-Design-Handbook--4th-Ed.---
DL : 0
Audio Power Amplifi er Design Handbook Douglas Self MA, MSc
Date
: 2025-12-27
Size
: 6.98mb
User
:
2sa1943
[
Crack Hack
]
Audio-Steganography-by-Least-Significant-Bit-Meth
DL : 0
audio watermarking embeddin , use algorithm DCT DWT-audio watermarking embeddin , use algorithm DCT DWT
Date
: 2025-12-27
Size
: 126kb
User
:
mbarka
[
Crack Hack
]
Audio-encryption
DL : 0
利用密码学的算法,在频域以及时域进行音频进行加解密的代码-Cryptography to encrypt and decrypt the audio code
Date
: 2025-12-27
Size
: 8.66mb
User
:
123
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.