Research Article
Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks
Table 3
Attack types and specifications.
| Item | Attack type | Description |
| A | MP3 compression | Applying MP3 compression with 64 kbps and 128 kbps. | B | Noise corruption | Adding Gaussian noise with 20 dB, 30 dB, and 40 dB. | C | Requantization | Quantizing the carried audio with 16 bit-8 bit-16 bit per sample. | D | Resampling | Dropping the sampling rate with 44.1 kHz-22.05 kHz-44.1 kHz. | E | Echo addition | Adding an echo with a delay of 50 ms and 100 ms. | F | Low-pass filtering | Applying low-pass filter with 4 kHz, 8 kHz, and 12 kHz. | G | Amplitude scaling | Scaling the carried audio’s amplitude by 0.8 and 1.2. |
|
|