Figure 3From: An enhanced audio ownership protection scheme based on visual cryptographyWatermark extraction result without being attacked. (a) Original audio signal, (b) original watermark, (c) secret share, (d) public share, (e) extracted watermark, and (f) reduced watermark.Back to article page