Research Article

Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks

Figure 8

The extracted images under different processing operations. (a) No attack. (b) MP3 compression with 64 kbps. (c) MP3 compression with 128 kbps. (d) Noise corruption with 20 dB. (e) Noise corruption with 30 dB. (f) Noise corruption with 40 dB. (g) Requantization. (h) Resampling. (i) Echo addition with 50 s. (j) Echo addition with 100 s. (k) Low-pass filtering (4 kHz). (l) Low-pass filtering (8 kHz). (m) Low-pass filtering (12 kHz). (n) Amplitude scaling by 0.8. (o) Amplitude scaling by 1.2. (p) The original image.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)