Research Article

A Relative Phase Based Audio Integrity Protection Method: Model and Strategy

Table 3

The similarity between the original and recovered I.O. in malicious attack experiments.

No.Attack typesSimilarity
Random embedding (RP-AIP)0-coefficient embeddingn-coefficient embedding

(a)Original1.001.001.00
(b)Without attacks0.970.990.95
(h)Cutting0.310.440.50
(i)Tampering (self-media)0.240.460.62
(j)Tampering (non-self-media)0.190.330.57
(k)Resampling (upsampling)0.970.980.92
(l)Resampling (downsampling)0.200.420.22