Research Article

Robust and Blind Audio Watermarking Scheme Based on Genetic Algorithm in Dual Transform Domain

Figure 9

The extracted watermarks under different attacks: (a) additive noise (35 dB); (b) additive noise (30 dB); (c) additive noise (20 dB); (d) amplitude scaling (0.8); (e) amplitude scaling (1.2); (f) low-pass filtering (4 kHz); (g) low-pass filtering (8 kHz); (h) MP3 compression (64 kbps); (i) MP3 compression (128 kbps); (j) echo jamming (10 s); (k) echo jamming (50 s); (l) resampling; (m) requantizing; (n) no attack.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)