Audio Watermarking: Review, Analysis, and Classification of the Most Recent Conventional Cutting-Edge Results
Abstract
1. Introduction
2. Audio Watermarking
2.1. Applications
2.2. Performance Criteria
3. Systematization Based on the Processes
- Audio Signal Preprocessing
- Embedding/Recovery Method
- Watermark Process
- Adaptive Process
- Auxiliary Signal Process
3.1. Audio Signal Preprocessing
- Wavelet Transform: According to [47], “wavelets provide a flexible basis for representing a signal that can be regarded as a generalization of Fourier analysis to non-stationary processes, or as a filter bank that can represent complex functions that might include abrupt changes in functional form or signals with time-varying frequency and amplitude.” The use of this representation in different variations has been explored in different digital watermarking algorithms to decrease the trade-offs. The wavelet transforms include discrete wavelet transform (DWT), lifting as wavelet transform (LWT), stationary wavelet transform (SWT), dual-tree complex wavelet transform (DTCWT), and integer wavelet transform (IWT). Whether alone or in combination with other domains, the wavelet domain is the most frequently utilized in the most recently reported works. Approximately 60% of the reviewed works in this paper employ some variation of this domain.“Wavelet transforms decompose the signal into sub-bands characterized by two types of coefficients: approximation coefficients, which capture low-frequency components, and detail coefficients, which capture high-frequency components” [8]. The watermark is most commonly embedded in the approximation coefficients, likely because classical attacks—such as MP3 compression—primarily affect the high-frequency components. This decomposition can be performed at multiple levels; however, increasing the level of granularity raises computational complexity due to the additional signal processing required. Consequently, two-level decompositions are the most commonly employed in the reviewed works. Table 1 summarizes the variety of wavelets, the coefficients, and the decomposition level used.Table 1 presents the variety, coefficients, and level of wavelet used in the reviewed works.
- Cosine Transform: The signal is transformed from the time domain to the frequency domain, like a sum of the cosine functions in various frequencies [31]. The discrete cosine transform (DCT) is employed in works [21,22,23,30,31,32,33,42,43,45]. A variant of DCT, called quantum discrete cosine transform (qDCT), uses quantum computing and quantum information processing and is the domain where the watermark is embedded [23].
- Matrix Decomposition: The signal or some representation of this is presented as a vector. This transformation converts the vector into a square matrix and employs a factorization technique to embed information about the values of one of the factorization elements. Among the reported factorization techniques are singular value decomposition (SVD) and LU decomposition.
- ○
- SVD: Based on linear algebra, “SVD is a method of matrix decomposition where a rectangular matrix A can be broken down into the product of three matrices: a unitary matrix U, a diagonal matrix S, and a unitary matrix V” [7,31]. SVD can be represented as follows:where V*V^T = I, being I an identity matrix, while U and V are orthogonal matrices, and S is a diagonal matrix, the elements of which are called singular values [25]. SVD is utilized in the watermarking process of the following works [7,8,25,26,31,32,33,36,42,44,45]. The watermark is usually embedded in S; only [8] reports using U and S in the process.
- ○
- Spikegram: According to [29], the host signal is decomposed over a dictionary to render a sparse vector with only a few non-zero coefficients and add the watermark in this domain.
- The fractional Charlier moment transform (FrCMT): It is considered a generalization of the Charlier moment transform, where a signal function is projected on fractional Charlier polynomials [35].
- Singular-spectrum analysis (SSA) is a technique used in [25] to identify and extract meaningful information by decomposing a signal into several additive oscillatory components.
3.2. Embedding/Recovery Method
3.3. Watermark Process
3.4. Adaptive Process
3.4.1. Adaptive Process Based on HAS
3.4.2. Adaptive Process Based on Energy
3.4.3. Adaptive Process Based on Audio Features
3.4.4. Adaptive Process Using Filters
3.4.5. Adaptive Process Using Iterative Parameter Adjustment
3.4.6. Adaptive Process Based on Evolutionary Computation (EC)
3.4.7. Others
3.5. Auxiliary Signals
3.5.1. Synchronization
3.5.2. Reconstruction
3.5.3. Assistance in Extraction
4. Classification According to Performance Criterion
4.1. Imperceptibility
4.2. Capacity
4.3. Security
4.4. Computational Complexity
4.5. Robustness
Attacks
- (a)
- Resampling: The sampling frequency is changed; it usually goes from 44.1 kHz to another frequency, and later, to recover the message, it is returned to 44.1 kHz. The frequencies reported in the resampling attack are the following: 11.0025 kHz, 16 kHz, 22.05 kHz, 36 kHz, and 48 kHz.
- (b)
- Requantization: The bits used in quantization are changed; usually, the host signal uses 16 bits of quantization and reported attacks of re-quantization change for eight or twenty-four bits.
- (c)
- Low-pass filter (LPF): Filter the signal with an LPF with a given cut frequency. Reported cut frequency values are 3.5, 4, 6, 8, 9, 10, 11, 15, and 20 kHz. The filter will impact a wider bandwidth if the cutoff frequency is lower. Consequently, the robustness is affected because the filter can affect frequencies where the watermark is embedded.
- (d)
- Noise corruption: Adding noise is usually zero-mean Gaussian noise with a given SNR. 15, 20, 30, and 35 dB are commonly reported SNR in tests.
- (e)
- MPGE-1 layer three compression: Compressing and decompressing an audio watermarked signal at a given bit rate, where the bit rates reported to test robustness are 32, 64, 128, 192, and 256 kbps.
- (f)
- Cropping: Some samples are removed; the attack is described with the number of samples removed or the percentage removed from the host signal.
- (g)
- Amplitude scaling: Scaling the amplitude by a factor.
- (h)
- Pitch scaling: Increase or decrease the pitch by a percentage.
- (i)
- DA/AD conversion: Convert the digital audio file to an analog signal and convert it to a digital signal.
- (j)
- Echo addition: Adding an echo signal with a time delay and a percentage of decay.
- (k)
- Jittering: Deleting or adding one sample for every given number of samples.
- (l)
- Bandpass filter (BPF): Filter the signal with a BPF with a pair of given cut frequencies; as mentioned in c, the cutoff frequencies will influence the affected bandwidth and consequently, the aggressiveness of the attack.
- (m)
- Mp4 conversion: Compressing a decompressing audio watermarked signal through Mp4 at a given bit rate, also known as AAC conversion.
- (n)
- Equalizer: Increasing and decreasing the power spectral density in some frequencies.
- (o)
- Brumm addition: Adding a sinus tone of a given frequency with an amplitude of a certain factor of the maximum dynamic range.
- (p)
- Zero adding: Zeroing out all samples below a threshold.
- (q)
- Time shift: Shifting some samples of the audio signal.
- (r)
- High pass filter (HPF): Filter the signal with an HPF with a given cut frequency.
- (s)
- De-noising: Processing the audio signal to quiet sounds with a characteristic noise spectral.
- (t)
- Reverberation: Add a reverberation that is multiple smoothed copies of the audio signal in a set time.
- (u)
- Pitch-invariant time-scale modification: The time is changed, whereas the audio pitch is preserved, having a longer duration with a slower tempo or a shorter duration with a faster tempo.
- (v)
- Collusion: Different watermarks are embedded in copies of the host signal, and the watermarked signal is an average of the watermarked copies.
- (w)
- Multiple watermarking: The host signal is sequentially watermarked with different messages.
- (x)
- Speed scaling attack: Pitch and time are modified at the same time.
- (y)
- Mask attack: Delete information under the masking threshold.
- (z)
- Replacement: Taking advantage of similitudes in the same host signal and replacing these with a similar part of the same signal.
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Nematollahi, M.A.; Vorakulpipat, C.; Rosales, H.G. Digital Watermarking: Techniques and Trends, 1st ed.; Springer: Singapore, 2016. [Google Scholar]
- Lin, Y.T.; Abdulla, W.H. Audio Watermark; A Comprehensive Foundation Using MATLAB: A Comprehensive Foundation Using MATLAB, 2015th ed.; Springer International Publishing: Berlin/Heidelberg, Germany, 2014. [Google Scholar]
- Shelke, R.D.; Nemade, M.U. Audio watermarking techniques for copyright protection: A review. In Proceedings of the 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, 22–24 December 2016. [Google Scholar]
- Bajpai, J.; Kaur, A. A literature survey—Various audio watermarking techniques and their challenges. In Proceedings of the 2016 6th International Conference—Cloud System and Big Data Engineering (Confluence), Noida, India, 14–15 January 2016. [Google Scholar]
- Hua, G.; Huang, J.; Shi, Y.Q.; Goh, J.; Thing, V.L. Twenty years of digital audio watermarking—A comprehensive review. Signal Process. 2016, 128, 222–242. [Google Scholar] [CrossRef]
- Attari, A.A.; Shirazi, A.A.B. Robust and transparent audio watermarking based on spread spectrum in wavelet domain. In Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9–11 April 2019. [Google Scholar]
- Safitri, I.; Ginanjar, R.R. Multilevel adaptive wavelet BCH code method for copyright protection in audio watermarking system. In Proceedings of the 2017 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), Bandung, Indonesia, 28–29 November 2017. [Google Scholar]
- Kaur, A.; Dutta, M.K. A blind watermarking algorithm for audio signals in multi-resolution and singular value decomposition. In Proceedings of the 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 9–10 February 2018. [Google Scholar]
- Li, R.; Xu, S.; Yang, H. Spread spectrum audio watermarking based on perceptual characteristic aware extraction. IET Signal Process. 2016, 10, 266–273. [Google Scholar] [CrossRef]
- Hu, H.-T.; Hsu, L.-Y. Incorporating spectral shaping filtering into DWT-based vector modulation to improve blind audio watermarking. Wirel. Pers. Commun. 2017, 94, 221–240. [Google Scholar] [CrossRef]
- Renza, D.; Lemus, C. Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst. Appl. 2018, 91, 211–222. [Google Scholar] [CrossRef]
- Kaur, A.; Dutta, M.K.; Soni, K.; Taneja, N. Localized & self adaptive audio watermarking algorithm in the wavelet domain. J. Inf. Secur. Appl. 2017, 33, 1–15. [Google Scholar] [CrossRef]
- Hu, H.-T.; Hsu, L.-Y. Supplementary schemes to enhance the performance of DWT-RDM-based blind audio watermarking. Circuits Syst. Signal Process. 2017, 36, 1890–1911. [Google Scholar] [CrossRef]
- Kaur, A.; Dutta, M.K. An optimized high payload audio watermarking algorithm based on LU-factorization. Multimed. Syst. 2018, 24, 341–353. [Google Scholar] [CrossRef]
- Kaur, A.; Dutta, M.K. High embedding capacity and robust audio watermarking for secure transmission using tamper detection. ETRI J. 2018, 40, 133–145. [Google Scholar] [CrossRef]
- Karajeh, H.; Khatib, T.; Rajab, L.; Maqableh, M. A robust digital audio watermarking scheme based on DWT and Schur decomposition. Multimed. Tools Appl. 2019, 78, 18395–18418. [Google Scholar] [CrossRef]
- Pourhashemi, S.M.; Mosleh, M.; Erfani, Y. A novel audio watermarking scheme using ensemble-based watermark detector and discrete wavelet transform. Neural Comput. Appl. 2021, 33, 6161–6181. [Google Scholar] [CrossRef]
- Hu, H.-T.; Chang, J.-R.; Lin, S.-J. Synchronous blind audio watermarking via shape configuration of sorted LWT coefficient magnitudes. Signal Process. 2018, 147, 190–202. [Google Scholar] [CrossRef]
- Hu, H.-T.; Lee, T.-T. Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 2019, 7, 180395–180408. [Google Scholar] [CrossRef]
- Mushgil, B.M.; Adnan, W.A.W.; Al-hadad, S.A.-R.; Ahmad, S.M.S. An efficient selective method for audio watermarking against DE-synchronization attacks. J. Electr. Eng. Technol. 2018, 13, 476–484. [Google Scholar]
- Jeyhoon, M.; Asgari, M.; Ehsan, L.; Jalilzadeh, S.Z. Blind audio watermarking algorithm based on DCT, linear regression and standard deviation. Multimed. Tools Appl. 2017, 76, 3343–3359. [Google Scholar] [CrossRef]
- Mosleh, M.; Setayeshi, S.; Barekatain, B.; Mosleh, M. High-capacity, transparent and robust audio watermarking based on synergy between DCT transform and LU decomposition using genetic algorithm. Analog. Integr. Circuits Signal Process. 2019, 100, 513–525. [Google Scholar] [CrossRef]
- Wu, Q.; Ding, R.; Wei, J. Audio watermarking algorithm with a synchronization mechanism based on spectrum distribution. Secur. Commun. Netw. 2022, 2022, 1–13. [Google Scholar] [CrossRef]
- Chen, K.; Yan, F.; Iliyasu, A.M.; Zhao, J. Dual quantum audio watermarking schemes based on quantum discrete cosine transform. Int. J. Theor. Phys. 2019, 58, 502–521. [Google Scholar] [CrossRef]
- Karnjana, J.; Unoki, M.; Aimmanee, P.; Wutiwiwatchai, C. Singular-spectrum analysis for digital audio watermarking with automatic parameterization and parameter estimation. IEICE Trans. Inf. Syst. 2016, E99.D, 2109–2120. [Google Scholar] [CrossRef]
- Bhat, K.V.; Das, A.K.; Lee, J.-H. Design of a blind quantization-based audio watermarking scheme using singular value decomposition. Concurr. Comput. 2020, 32, e5253. [Google Scholar] [CrossRef]
- Pourhashemi, S.M.; Mosleh, M.; Erfani, Y. Audio watermarking based on synergy between Lucas regular sequence and Fast Fourier Transform. Multimed. Tools Appl. 2019, 78, 22883–22908. [Google Scholar] [CrossRef]
- Wang, S.; Yuan, W.; Unoki, M. Multi-subspace echo hiding based on time-frequency similarities of audio signals. IEEE ACM Trans. Audio Speech Lang. Process. 2020, 28, 2349–2363. [Google Scholar] [CrossRef]
- Erfani, Y.; Pichevar, R.; Rouat, J. Audio watermarking using spikegram and a two-dictionary approach. IEEE Trans. Inf. Forensics Secur. 2017, 12, 840–852. [Google Scholar] [CrossRef]
- Hu, H.-T.; Chang, J.-R. Efficient and robust frame-synchronized blind audio watermarking by featuring multilevel DWT and DCT. Clust. Comput. 2017, 20, 805–816. [Google Scholar] [CrossRef]
- Mosleh, M.; Setayeshi, S.; Barekatain, B.; Mosleh, M. A novel audio watermarking scheme based on fuzzy inference system in DCT domain. Multimed. Tools Appl. 2021, 80, 20423–20447. [Google Scholar] [CrossRef]
- Su, Z.; Zhang, G.; Yue, F.; Chang, L.; Jiang, J.; Yao, X. SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking. IEEE Trans. Multimed. 2018, 20, 2631–2644. [Google Scholar] [CrossRef]
- Novamizanti, L.; Budiman, G.; Astuti, E.N.F. Robust audio watermarking based on transform domain and SVD with compressive sampling framework. TELKOMNIKA 2020, 18, 1079. [Google Scholar] [CrossRef]
- Salah, E.; Amine, K.; Redouane, K.; Fares, K. A Fourier transform based audio watermarking algorithm. Appl. Acoust. 2021, 172, 107652. [Google Scholar] [CrossRef]
- Yamni, M.; Karmouni, H.; Sayyouri, M.; Qjidaa, H. Robust audio watermarking scheme based on fractional charlier moment transform and dual tree complex wavelet transform. Expert Syst. Appl. 2022, 203, 117325. [Google Scholar] [CrossRef]
- Singha, A.; Ullah, M.A. Development of an audio watermarking with decentralization of the watermarks. J. King Saud Univ. Comput. Inf. Sci. 2020, 34, 3055–3061. [Google Scholar] [CrossRef]
- Elshazly, A.R.; Nasr, M.E.; Fouad, M.M.; Abdel-Samie, F.E. Abdel-Samie. Intelligent high payload audio watermarking algorithm using colour image in DWT-SVD domain. J. Phys. Conf. Ser. 2021, 2128, 012019. [Google Scholar] [CrossRef]
- Zhang, G.; Zheng, L.; Su, Z.; Zeng, Y.; Wang, G. M-Sequences and sliding window based audio watermarking robust against large-scale cropping attacks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1182–1195. [Google Scholar] [CrossRef]
- Islam, S.; Naqvi, N.; Abbasi, A.T.; Hossain, I.; Ullah, R.; Khan, R.; Islam, M.S.; Ye, Z. Robust dual domain twofold encrypted image-in-audio watermarking based on SVD. Circuits Syst. Signal Process. 2021, 40, 4651–4685. [Google Scholar] [CrossRef]
- Suresh, G.; Narla, V.L.; Gangwar, D.P.; Sahu, A.K. False-Positive-Free SVD based audio watermarking with integer wavelet transform. Circuits Syst. Signal Process. 2022, 41, 5108–5133. [Google Scholar] [CrossRef]
- Maiti, C.; Dhara, B.C. A blind audio watermarking based on singular value decomposition and quantization. Int. J. Speech Technol. 2022, 25, 759–771. [Google Scholar] [CrossRef]
- Narla, V.L.; Gulivindala, S.; Chanamallu, S.R.; Gangwar, D.P. Gangwar. BCH encoded robust and blind audio watermarking with tamper detection using hash. Multimed. Tools Appl. 2021, 80, 32925–32945. [Google Scholar] [CrossRef]
- Hu, Y.; Lu, W.; Ma, M.; Sun, Q.; Wei, J. A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Multimed. Tools Appl. 2022, 81, 17729–17746. [Google Scholar] [CrossRef]
- SAlshathri, S.; Hemdan, E.E.-D. An efficient audio watermarking scheme with scrambled medical images for secure medical internet of things systems. Multimed. Tools Appl. 2023, 82, 20177–20195. [Google Scholar] [CrossRef] [PubMed]
- Zhao, J.; Zong, T.; Xiang, Y.; Gao, L.; Hua, G.; Sood, K.; Zhang, Y. SSVS-SSVD based desynchronization attacks resilient watermarking method for stereo signals. IEEE/ACM Trans. Audio Speech Lang. Process. 2023, 31, 448–461. [Google Scholar] [CrossRef]
- Cruz, C.J.S.; Dolecek, G.J. Exploring Performance of a Spread Spectrum-Based Audio Watermarking System Using Convolutional Coding. In Proceedings of the 2021 IEEE URUCON, Montevideo, Uruguay, 24–26 November 2021; pp. 104–107. [Google Scholar] [CrossRef]
- Ramsey, J.B. Wavelets. In The New Palgrave Dictionary of Economics; Palgrave Macmillan: London, UK, 2018; pp. 14510–14516. [Google Scholar] [CrossRef]
- Farzaneh, M.; Toroghi, R.M.; Asgari, M. Audio Compression Using Graph-based Transform. In Proceedings of the 2018 9th International Symposium on Telecommunications (IST), Tehran, Iran, 17–19 December 2018; pp. 410–415. [Google Scholar] [CrossRef]
- Moffat, D.; Ronan, D.; Reiss, J. An Evaluation of Audio Feature Extraction Toolboxes. Available online: https://www.semanticscholar.org/paper/3ecb74b72cc1eae55b7db18622f576aa31d006c2 (accessed on 1 August 2025).
- Zhan, Z.-H.; Shi, L.; Tan, K.C.; Zhang, J. A survey on evolutionary computation for complex continuous optimization. Artif. Intell. Rev. 2022, 55, 59–110. [Google Scholar] [CrossRef]
- Method for Objective Measurements of Perceived Audio Quality, ITU Recommendation ITU-R BS.1387-1. 2001. Available online: https://www.itu.int/dms_pubrec/itu-r/rec/bs/R-REC-BS.1387-1-200111-S!!PDF-E.pdf (accessed on 1 October 2025).
- Methods for the Subjective Assessment of Small Impairments in Audio Systems, ITU Recommendation ITU-R BS.1116-3. 2015. Available online: https://www.itu.int/dms_pubrec/itu-r/rec/bs/R-REC-BS.1116-3-201502-I!!PDF-E.pdf (accessed on 1 October 2025).
- Mean Opinion Score (MOS) Terminology, ITU Recommendation ITU-R p.800.1. 2016. Available online: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-P.800.1-201607-I!!PDF-E&type=items (accessed on 1 October 2025).



| Work | Variety | Coefficients | Level |
|---|---|---|---|
| [6] | DWT | Approximation | 6 |
| [7] | DWT | Not reported | 2 |
| [8] | DWT | Not reported | 4 |
| [10] | DWT | Approximation | 3 |
| [11] | DWT | Approximation | 2 |
| [12] | DWT | Detail | 5 |
| [13] | DWT | Approximation | 4 |
| [14] | DWT | Approximation | 5 |
| [15] | DWT | Detail | 3 |
| [16] | DWT | Approximation | 2 |
| [17] | DWT | Not reported | 2 |
| [18] | LWT | Approximation | 3 |
| [19] | LWT | Approximation | 3 |
| [20] | SWT | Not reported | Not reported |
| [30] | DWT | Not reported | 9–11 |
| [32] | DWT | Not reported | Not reported |
| [33] | LWT | Not reported | Not reported |
| [35] | DTCWT | Approximation | 3 |
| [36] | DWT | Not reported | 5–16 |
| [37] | DWT | Approximation | 2 |
| [38] | DWT | Approximation | 3 |
| [39] | DTCWT | Detail | 2 |
| [40] | IWT | Approximation | 2 |
| [42] | DWT | Approximation | 1 |
| [43] | DWT | Detail | 2 |
| Specific Domain | Works |
|---|---|
| DWT, SVD | [7,8,36,37] |
| DWT, DCT | [30,43] |
| DCT, SVD | [31,45] |
| DWT, DCT SVD | [32,42] |
| Time, SWT | [20] |
| Time, LWT, DCT, SVD | [33] |
| DTCWT, FRCMT | [35] |
| DWT, GBT, SVD | [38] |
| DTCWT, STFT, SVD | [38] |
| LWT, DCT, SVD | [40] |
| Quality | Impairment | ODG | Quality |
|---|---|---|---|
| Excellent | Imperceptible | 0 | 5 |
| Good | Perceptible but not annoying | −1 | 4 |
| Fair | Slightly annoying | −2 | 3 |
| Poor | Annoying | −3 | 2 |
| Bad | Very annoying | −4 | 1 |
| Method | Threshold | Work |
|---|---|---|
| SNR | Not reported | [7,9,12,25,26,29,36,45] |
| <20 dB | [10,13,18,19,30] | |
| ≥20 dB | [6,8,11,12,14,15,16,17,20,21,22,23,24,25,27,28,31,32,34,35,37,38,39,40,41,42,43,44] | |
| ODG | Not reported | [7,8,11,12,14,15,20,24,34,35,36,37,39,41,42,43,44] |
| ≥−1 | [6,7,8,13,16,17,18,19,21,22,23,25,26,27,28,29,30,31,32,33,38,40,45] | |
| SDG | Not reported | [6,7,8,9,10,11,13,14,17,18,19,23,24,25,27,28,29,30,31,32,33,34,35,36,37,38,39,41,42,43,44,45] |
| ≥4 | [12,15,16,20,21,22,26,40] |
| Group | Work |
|---|---|
| Low Capacity | [25,28] |
| Medium Capacity | [6,9,10,11,12,13,16,20,21,23,26,29,30,31,33,35,41,42,45] |
| High Capacity | [8,14,15,17,19,22,27,37,39,40] |
| Not Reported | [7,24,32,34,36,38,43,44] |
| Group | Method | Work |
|---|---|---|
| No key reported | Not Apply | [7,8,12,16,17,21,22,23,24,25,27,30,31,33,34,36,45] |
| Reported Key | PN | [6,9,28,29] |
| Scramble Bits | [13,18,19,26,41,43] | |
| Chaotic Maps | [10,20,32,38,42] | |
| Arnold Transform | [14,15,37,39,40,44] | |
| Parameters | [25,35,41] |
| Group | Work |
|---|---|
| No computational complexity report | [6,7,8,9,10,11,12,13,14,15,16,19,20,21,22,24,25,26,30,31,33,34,35,36,38,39,41,42,43,44] |
| Computational complexity report | [17,18,23,27,28,29,32,37,40,45] |
| Attack | Category | Work |
|---|---|---|
| a | Fully Robust | [6,9,10,12,13,14,17,19,20,21,26,29,33,35,37,38,39,41,42,45] |
| a | Robust | [8,16,23,25,27,34,36,40] |
| a | Not Robust | [24,43] |
| a | Not Reported | [7,11,15,18,22,28,30,31,32,44] |
| b | Fully Robust | [6,9,10,11,13], [16] *, [17,19,20,21,23,29,35,37,38,41] |
| b | Robust | [8,12], [16] *, [18,26,27,34,36,40,45] |
| b | Not Reported | [7,14,15,22,24,25,28,30,31,32,33,39,42,43,44] |
| c | Fully Robust | [6,9,10,12,13,17,18,19,20], [23] *, [29,30,33], [35] *, [37], [42] *, [45] |
| c | Robust | [14,16], [23] *, [27,34], [35] *, [38,40,41], [42] * |
| c | Not Robust | [24,43] |
| c | Not Reported | [7,8,11,15,21,22,25,26,28,31,32,36,39,44] |
| d | Fully Robust | [6,9,14,17,21,26,29], [35] *, [37] *, [38,39,42] |
| d | Robust | [8,9,10,12,13,16,18,19,20,24,25,27,30,34], [35] *, [37] *, [36,40,41,44,45] |
| d | Not Reported | [7,11,15,22,23,31,32,33,43] |
| e | Fully Robust | [6,12,17,29], [35] *, [37,39,41,45] |
| e | Robust | [8,9,10,13,14,15,16,18,19,21,23,25,26,27,30], [35] *, [38], [43] * |
| e | Not Robust | [20,24,43] |
| e | Not reported | [7,11,20,22,24,28,31,32,33,34,36,40,42,44] |
| f | Fully Robust | [10,13,15,17,29], [35] *, [38,41] |
| f | Robust | [23,30], [35] *, [37,39,42] |
| f | Not Robust | [44] |
| f | Not reported | [6,7,8,9,11,12,14,16,18,19,20,21,22,24,25,26,27,28,31,32,33,34,36,40,43,45] |
| g | Fully Robust | [9,10,13,18,19,20,23,29,35,37,38,45] |
| g | Not reported | [6,7,8,11,12,14,15,16,17,21,22,24,25,26,27,28,30,31,32,33,36,39,40,41,42,43,44] |
| h | Fully Robust | [8,13,20,29] |
| h | Robust | [45] |
| h | Not Robust | [38] |
| h | Not reported | [6,7,9,10,11,12,14,15,16,17,18,19,21,22,23,24,25,26,27,28,30,31,32,33,34,35,36,37,39,40,41,42,43,44] |
| i | Fully Robust | [39] |
| i | Robust | [10,13,18,19,30] |
| i | Not reported | [6,7,8,9,11,12,14,15,16,17,20,21,22,23,24,25,26,27,28,29,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] |
| j | Fully Robust | [23] *, [35,39] |
| j | Robust | [10,13,16,18,19,20,21], [23] *, [36,41,42,45] |
| j | Not reported | [6,7,8,9,11,12,14,15,17,22,24,25,26,27,28,29,30,31,32,33,34,37,38,40,43,44] |
| k | Fully Robust | [15,20] |
| k | Robust | [10,13,18,19,23,30,45] |
| k | Not reported | [6,7,8,9,11,12,14,16,17,21,22,24,25,26,27,28,29,31,32,33,34,35,36,37,38,39,40,41,42,43,44] |
| l | Fully Robust | [25,28,39] |
| l | Not reported | [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,26,27,29,30,31,32,33,34,35,36,37,38,40,41,42,43,44,45] |
| m | Fully Robust | [9,25,39,45] |
| m | Not reported | [6,7,8,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,26,27,28,29,30,31,32,33,34,35,36,37,38,40,41,42,43,44] |
| n | Fully Robust | [8,16] |
| n | Not reported | [6,7,9,10,11,12,13,14,15,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,36,37,38,39,40,41,42,43,44,45] |
| o | Fully Robust | [13] |
| o | Not reported | [6,7,8,9,10,11,12,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] |
| p | Fully Robust | [13,19,20] |
| p | Not reported | [6,7,8,9,10,11,12,14,15,16,17,18,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] |
| q | Fully Robust | [13,18] |
| q | Robust | [35] |
| q | Not reported | [6,7,8,9,10,11,12,14,15,16,17,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,36,37,38,39,40,41,42,43,44,45] |
| r | Fully Robust | [7,20] |
| r | Not reported | [6,8,9,10,11,12,13,14,15,16,17,18,19,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] |
| s | Fully Robust | [28] |
| s | Robust | [41] |
| s | Not reported | [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,29,30,31,32,33,34,35,36,37,38,39,40,42,43,44,45] |
| t | Fully Robust | [28] |
| t | Not reported | [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Santin-Cruz, C.J.; Dolecek, G.J. Audio Watermarking: Review, Analysis, and Classification of the Most Recent Conventional Cutting-Edge Results. Appl. Sci. 2025, 15, 11514. https://doi.org/10.3390/app152111514
Santin-Cruz CJ, Dolecek GJ. Audio Watermarking: Review, Analysis, and Classification of the Most Recent Conventional Cutting-Edge Results. Applied Sciences. 2025; 15(21):11514. https://doi.org/10.3390/app152111514
Chicago/Turabian StyleSantin-Cruz, Carlos Jair, and Gordana Jovanovic Dolecek. 2025. "Audio Watermarking: Review, Analysis, and Classification of the Most Recent Conventional Cutting-Edge Results" Applied Sciences 15, no. 21: 11514. https://doi.org/10.3390/app152111514
APA StyleSantin-Cruz, C. J., & Dolecek, G. J. (2025). Audio Watermarking: Review, Analysis, and Classification of the Most Recent Conventional Cutting-Edge Results. Applied Sciences, 15(21), 11514. https://doi.org/10.3390/app152111514

