Research Article

A Relative Phase Based Audio Integrity Protection Method: Model and Strategy

Figure 11

The comparison of the simulation results of different malicious attacks and embedding methods. W: without processing; CT: cutting attack; TP (i): self-media tampering attack; TP (ii): non-self-media tampering attack; RS (i): upsampling attack; RS (ii): downsampling attack.