Research Article
Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks
Figure 11
The extracted images under TSM. (a) TSM (−30%). (b) TSM (−20%). (c) TSM (−15%. (d) TSM (−9%). (e) TSM (−7%). (f) TSM (−5%). (g) TSM (−4%). (h) TSM (−3%). (i) TSM (−2%). (j) TSM (−1%). (k) TSM (1%). (l) TSM (2%). (m) TSM (3%). (n) TSM (4%). (o) TSM (5%). (p) TSM (7%). (q) TSM (9%). (r) TSM (15%). (s) TSM (20%). (t) TSM (+30%).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |
(q) |
(r) |
(s) |
(t) |