Matlab is a registered trademark of The Mathworks, Inc.

 Advanced Source Code . Com

Source code for fingerprint recognition, face recognition and much more

Software Info    About us     
Go To Matlab Official Website

.: Click here to download :.

The outstanding progress of digital technology has increased the ease with which digital data is reproduced and retransmitted. However, since the advantages of such a progress are broadly available, they offer equally increasing potential to both legal and unauthorized data manipulation. Consequently, the necessity arises for copyright protection of digital products against unauthorized recording attempts, knows as data piracy. Current research in image, audio and video copyright protection exploits the fact that the human visual and audio perception cannot detect slight changes in certain temporal or frequency domains of the image and the audio signal, respectively. This property is called masking, according to which a faint but perceptible signal becomes non-perceptible in the presence of another one under certain conditions. Most research methods consider a watermark signal produced in a unique way by a function of one or more input keys. These keys can be both owner and signal dependent and generate a signal which is embedded on the original one. The embedding signal is known as a watermark or copyright label. Temporal and frequency characteristics of the original signal should be taken into account in the watermark casting process to reduce perceptible distortions in the watermarked signal. Each individual that produces or possesses digital data owns a unique key that identifies its legal possession and is required for the watermark detection. Besides copyright purposes, a watermark serves authentication purposes, as well.

A watermark has to be statistically undetectable by others to prevent the efforts of its unauthorized removal. This condition is fulfilled if the potential number of keys that produce distinct watermarks is large enough to ensure statistical safety. The detection scheme should be as statistically reliable as possible. False rejection or acceptance of the existence of the watermark should be minimal. Finally, a watermark has to be robust to signal manipulation and impossible to be removed without significant alteration of the signal. In other words, a pirate should have to destroy the audio signal before he accomplishes to destroy the watermark. The robustness should extend to common signal processing operations, such as filtering, compression, resampling, requantization, cropping, noise, D/A conversion.

Index Terms: Matlab, source, code, watermarking, watermark, detection, embedding, audio, copyright, protection.






Figure 1. Copyright protection

A simple and effective source code for Digital Audio Watermarking.

Demo code (protected P-files) available for performance evaluation. Matlab Signal Processing Toolbox is required.

Major features


We recommend to check the secure connection to PayPal, in order to avoid any fraud.
This donation has to be considered an encouragement to improve the code itself.

Digital Audio Watermarking - Click here for your donation. In order to obtain the source code you have to pay a little sum of money: 90 EUROS (less than 126 U.S. Dollars).

Once you have done this, please email us
As soon as possible (in a few days) you will receive our new release of Digital Audio Watermarking.

Alternatively, you can bestow using our banking coordinates:
Name :
Luigi Rosa
Address :
Via Pozzo Strada 5 10139 Torino Italy
Bank name:
Poste Italiane
Bank address:
Viale Europa 190 00144 Roma Italy
IBAN (International Bank Account Number) :
BIC (Bank Identifier Code) :

The authors have no relationship or partnership with The Mathworks. All the code provided is written in Matlab language (M-files and/or M-functions), with no dll or other protected parts of code (P-files or executables). The code was developed with Matlab 2006a. Matlab Signal Processing Toolbox is required. The code provided has to be considered "as is" and it is without any kind of warranty. The authors deny any kind of warranty concerning the code as well as any kind of responsibility for problems and damages which may be caused by the use of the code itself including all parts of the source code.

New - Python Face Recognition
 Biometric Authentication with Python We have developed a fast and reliable Python code for face recognition based on Principal Component Analysis (PCA). Proposed algorithm results computationally inexpensive and it can run also in a low-cost pc such as Raspberry PI.
New - Raspberry PI Remote Desktop
 Raspberry PI Remote Desktop A complete and detailed PDF tutorial to learn how to connect to and from a Raspberry PI using Remote Desktop.
New - Speaker Verification System
 Text-Independent Speaker Authentication There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication.
New - Java Face Recognition
 Java-based Biometric Authentication System Face recognition is essential in many applications, including mugshot matching, surveillance, access control and personal identification, and forensic and law enforcement applications.
New - White Papers
 High Capacity Wavelet Watermarking Using CDMA Multilevel Codes This paper proposes a technique based on CDMA and multilevel coding in order to achieve a high capacity watermarking scheme. The bits of watermark are grouped together and for each sequence a different modulation coefficient is used.
New - WebCam Face Identification
 Face Recognition Based on Fractional Gaussian Derivatives Local photometric descriptors computed for interest regions have proven to be very successful in applications such as wide baseline matching, object recognition, texture recognition, image retrieval, robot localization, video data mining, building panoramas, and recognition of object categories.
New - Speaker Recognition System
 Source code for speaker recognition
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.
New - Speech Recognition System
 Source code for isolated words recognition
Speech recognition technology is used more and more for telephone applications like travel booking and information, financial account information, customer service call routing, and directory assistance. Using constrained grammar recognition, such applications can achieve remarkably high accuracy.

The MathWorks, Inc. Google NeuralNetworks.It Octave Scilab The R Project for Statistical Computing Python Other available resources English Dictionary Download .Com
Software Info    About us