An examiner told me there is a grammatical error in your paragraph but I cannot find it.

For BPF attack, the watermarked speech signals were

passed through a BPF with bandwidth of from 100 Hz to

7500 Hz and the central frequency of 4 KHz. By changing

the bandwidth of the BPF, the watermarked speech signals

were filtered. Then, the fragile watermark was extracted as

in Figure 10. As seen, the random nature of the extracted

watermark shows that any BPF can be detected.

More Mohammad Ali Nematollahi's questions See All
Similar questions and discussions