Research Article
Robust and Blind Audio Watermarking Scheme Based on Genetic Algorithm in Dual Transform Domain
Figure 9
The extracted watermarks under different attacks: (a) additive noise (35 dB); (b) additive noise (30 dB); (c) additive noise (20 dB); (d) amplitude scaling (0.8); (e) amplitude scaling (1.2); (f) low-pass filtering (4 kHz); (g) low-pass filtering (8 kHz); (h) MP3 compression (64 kbps); (i) MP3 compression (128 kbps); (j) echo jamming (10 s); (k) echo jamming (50 s); (l) resampling; (m) requantizing; (n) no attack.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |