Figure 5From: An enhanced audio ownership protection scheme based on visual cryptographyExamples of extracted watermark over various durations. We take audio with duration 00:02:20 as a sample. (a to v) The extracted watermark from StirMark attacks reported in Table 2.Back to article page