Research Article

Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks

Table 3

Attack types and specifications.

ItemAttack typeDescription

AMP3 compressionApplying MP3 compression with 64 kbps and 128 kbps.
BNoise corruptionAdding Gaussian noise with 20 dB, 30 dB, and 40 dB.
CRequantizationQuantizing the carried audio with 16 bit-8 bit-16 bit per sample.
DResamplingDropping the sampling rate with 44.1 kHz-22.05 kHz-44.1 kHz.
EEcho additionAdding an echo with a delay of 50 ms and 100 ms.
FLow-pass filteringApplying low-pass filter with 4 kHz, 8 kHz, and 12 kHz.
GAmplitude scalingScaling the carried audio’s amplitude by 0.8 and 1.2.