Research Article
Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks
Figure 14
The extracted images under random cropping. (a) 100 points (front). (b) 100 points (middle). (c) 100 points (back). (d) 200 points (front). (e) 200 points (middle). (f) 200 points (back). (g) 500 points (front). (h) 500 points (middle). (i) 500 points (back). (j) 800 points (front). (k) 800 points (middle). (l) 800 points (back).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |