Research Article
Speech Watermarking for Tampering Detection Based on Modifications to LSFs
Figure 10
Fragility evaluation of the nonblind approach (left side) and the blind approach (right side): (a) embedded watermarks ( binary image) and detected watermarks under (b) no modifications, (c) GTFB, (d) adding white noise, (e) reverberation, (f) filtering with low-pass filter, (g) filtering with high-pass filter, and (h) concatenation.