Research Article

Speech Watermarking for Tampering Detection Based on Modifications to LSFs

Figure 1

Block diagram of the proposed approach: (a) embedding, (b) detection ((i) nonblind and (ii) blind), and (c) tampering identification.