Research Article

Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks

Figure 11

The extracted images under TSM. (a) TSM (−30%). (b) TSM (−20%). (c) TSM (−15%. (d) TSM (−9%). (e) TSM (−7%). (f) TSM (−5%). (g) TSM (−4%). (h) TSM (−3%). (i) TSM (−2%). (j) TSM (−1%). (k) TSM (1%). (l) TSM (2%). (m) TSM (3%). (n) TSM (4%). (o) TSM (5%). (p) TSM (7%). (q) TSM (9%). (r) TSM (15%). (s) TSM (20%). (t) TSM (+30%).
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(t)