Description: Based on the histogram of the watermark embedding and extraction to achieve a variety of watermark attacks, such as re sampling, noise, filtering, scale transform, local cropping
To Search:
File list (Check if you may need any files):
Histogram_codes\Attack.m
...............\CalcDR.m
...............\CalcHist.m
...............\CalcSNR.m
...............\CNET.wav
...............\Extraction.m
...............\Liebesleid.wav
...............\Main.m
...............\Modify.m
...............\MyHeartWillGoOn.wav
...............\MyLove.wav
...............\OneZero.m
...............\Procedure.m
...............\RndSeq.m
...............\t1.wav
...............\t2_30.wav
...............\t2_35.wav
...............\t2_40.wav
...............\t2_45.wav
...............\t2_50.wav
...............\t3_12.wav
...............\t3_14.wav
...............\t3_16.wav
...............\t3_18.wav
...............\t3_20.wav
...............\t4a_128.m4a
...............\t4a_160.m4a
...............\t4a_192.m4a
...............\t4a_96.m4a
...............\t5h_100.wav
...............\t5h_150.wav
...............\t5h_200.wav
...............\t5h_50.wav
...............\t5l_10000.wav
...............\t5l_4000.wav
...............\t5l_6000.wav
...............\t5l_8000.wav
...............\test.wav
...............\Unity.wav
...............\ValueInside.m
Histogram_codes