Research Article
Speech Watermarking for Tampering Detection Based on Modifications to LSFs
Figure 9
Robustness evaluation of the nonblind approach (left side) and the blind approach (right side): (a) embedded watermarks ( binary image) and detected watermarks under (b) no modification, (c) scaling by 0.5, (d) scaling by 2.0, (e) resampling at 12 kHz, (f) resampling at 24 kHz, (g) requantization with 8 bits, (h) requantization with 24 bits, and (i) STFT.