Figure 4From: An enhanced audio ownership protection scheme based on visual cryptographyExamples of extracted watermark from attacked audio by StirMark. The music type of Instrumental is taken as an example. (a to v) The extracted watermark from StirMark attacks.Back to article page