Research Article
Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks
Table 5
Attack types and specifications.
| Item | Attack type | Description |
| H | TSM | Apply TSM from −10% to 10% on the audio, respectively. | I | PSM | Apply PSM from −5% to 5% on the audio, respectively. | J | Jittering | Delete or add one sample every some samples in the audio. | K | Random cropping | Randomly cut out several samples in the different parts. |
|
|