Research Article

A Relative Phase Based Audio Integrity Protection Method: Model and Strategy

Figure 10

The simulation results of the recovered I.O. of different malicious attacks.