Research Article
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy
Table 3
The similarity
between the original and recovered I.O. in malicious attack experiments.
| No. | Attack types | Similarity | | Random embedding (RP-AIP) | 0-coefficient embedding | n-coefficient embedding |
| (a) | Original | 1.00 | 1.00 | 1.00 | (b) | Without attacks | 0.97 | 0.99 | 0.95 | (h) | Cutting | 0.31 | 0.44 | 0.50 | (i) | Tampering (self-media) | 0.24 | 0.46 | 0.62 | (j) | Tampering (non-self-media) | 0.19 | 0.33 | 0.57 | (k) | Resampling (upsampling) | 0.97 | 0.98 | 0.92 | (l) | Resampling (downsampling) | 0.20 | 0.42 | 0.22 |
|
|