Skip to main content

Advertisement

Springer Nature is making Coronavirus research free. View research | View latest news | Sign up for updates

Figure 18 | EURASIP Journal on Advances in Signal Processing

Figure 18

From: Audio Signal Processing Using Time-Frequency Approaches: Coding, Classification, Fingerprinting, and Watermarking

Figure 18

Overview of watermarking procedure for POP voiced segment ("viorg. wav"). Several robustness tests based on StirMark Benchmark [60] attacks were performed on the five different audio files to examine the reliability of our algorithm against signal manipulations. In an attempt to standardize this, Petitcolas et al. [60] realized that many claims of robustness have been made in several papers without following the same criteria. They have published a work with 4 popular audio watermarking algorithms, three of which were submitted by companies have been exposed to several attacks. The algorithms are referred to as A, B, C, and D. The summary of these results can be seen in Table 4. For each algorithm, 6 audio segments were watermarked and it was noted whether the watermark was completely destroyed or somewhat changed by the attacks. As can be seen from the above tests, our technique offers several improvements over existing algorithms.

Back to article page