Research Article

Speech Watermarking for Tampering Detection Based on Modifications to LSFs

Figure 7

Robustness of the proposed approach under (a) normal, (b) G.711, and (c) G.729.
(a)
(b)
(c)