Introduction - If you have any usage issues, please Google them yourself
Information Hiding and Watermarking five series of experiments: Watermark_1, Watermark_2, Watermark_3, Watermark_4 Experimental instructions. Through these four algorithms are familiar with, simply amend the embedding, extraction, attack source function, you can quickly achieve a variety of image watermarking algorithm.