Introduction - If you have any usage issues, please Google them yourself
Based on the histogram of the watermark embedding and extraction to achieve a variety of watermark attacks, such as re sampling, noise, filtering, scale transform, local cropping