2017 3rd International Conference on Frontiers of Signal Processing (ICFSP) 2017
DOI: 10.1109/icfsp.2017.8097052
|View full text |Cite
|
Sign up to set email alerts
|

Velody — A novel method for music steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…2; 3; 4 The first one describes simple LSB (Least Significant Bit) algorithm, however the latter two take a more sophisticated approach. Velody 3 uses the first note's velocity as the reference value and then encodes secret message in following notes' velocities by either adding or subtracting one from reference velocity value. Wu et al 4 took even more complicated approach using velocities in sequences of either non-increasing or non-decreasing pitches.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…2; 3; 4 The first one describes simple LSB (Least Significant Bit) algorithm, however the latter two take a more sophisticated approach. Velody 3 uses the first note's velocity as the reference value and then encodes secret message in following notes' velocities by either adding or subtracting one from reference velocity value. Wu et al 4 took even more complicated approach using velocities in sequences of either non-increasing or non-decreasing pitches.…”
Section: Related Workmentioning
confidence: 99%
“…Wu et al 4 took even more complicated approach using velocities in sequences of either non-increasing or non-decreasing pitches. The idea similar to the one presented in this paper was briefly mentioned in 3 and described as utilization of natural properties of music and binary substitution (choosing two notes, each representing one binary value), however it was not investigated further in that paper.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Only a few investigations of information hiding via MIDI files can be found in the literature [16]- [23]. Some of them insert new events into MIDI files that can be ignored by MIDI instruments, or reorganize the messages in MIDI files without altering the musical expressions [16]- [19].…”
Section: Introductionmentioning
confidence: 99%
“…A third group of methods [18], [21], [23] perform secret data hiding via MIDI files by modifying the velocity values of musical notes. Adli and Nakao [18] adopted such an approach by replacing the least significant bits (LSBs) of the velocity values with secret bits.…”
Section: Introductionmentioning
confidence: 99%