Fig. 7From: Existence detection and embedding rate estimation of blended speech in covert speech communicationsDetection accuracy under different types of attacksBack to article page